Logo

Selected Aspects of Computer Security in Open Systems

Small book cover: Selected Aspects of Computer Security in Open Systems

Selected Aspects of Computer Security in Open Systems
by

Publisher: Australian Computer Emergency Response Team
Number of pages: 201

Description:
This report examines the threats a computer system might face, and details what tools and techniques are available to combat them. In addition, an examination of common authentication techniques is provided, including a comparison between X.509 Strong Authentication and Kerberos.

This document is no more available for free.

Similar books

Book cover: IT Security CookbookIT Security Cookbook
by - Boran Consulting
This document defines a security policy, outlines structure of a security organization, presents current security mechanisms, and provides technical guidelines for operating systems, applications and networks used in client/server systems.
(11349 views)
Book cover: Software Update as a Mechanism for Resilience and SecuritySoftware Update as a Mechanism for Resilience and Security
- The National Academies Press
Software update is an important mechanism by which security changes and improvements are made in software, and this seemingly simple concept encompasses a wide variety of practices, mechanisms, policies, and technologies.
(1563 views)
Book cover: Security and Privacy for Microsoft Office 2010 UsersSecurity and Privacy for Microsoft Office 2010 Users
by - Microsoft Press
This book is intended as a guide to how to use the powerful security and privacy features of Office 2010 platform effectively. Workers in organizations of all sizes, from small businesses to large enterprises, will benefit from this book.
(5151 views)
Book cover: Cyber Infrastructure ProtectionCyber Infrastructure Protection
by - Strategic Studies Institute
This book provides an integrated view of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development and an analysis of technology challenges that impede cyber infrastructure protection.
(6927 views)