Selected Aspects of Computer Security in Open Systems
by Danny Smith
Publisher: Australian Computer Emergency Response Team 1993
Number of pages: 201
This report examines the threats a computer system might face, and details what tools and techniques are available to combat them. In addition, an examination of common authentication techniques is provided, including a comparison between X.509 Strong Authentication and Kerberos.
This document is no more available for free.
by Travis H. - subspacefield.org
This is an online book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting examples. It is not intended to be an introductory text, although a beginner could gain something from it.
by Jaydip Sen (ed.) - InTech
The purpose of this book is to present some of the security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defense mechanisms.
by Dorothy Elizabeth Robling Denning - Addison-Wesley
The book introduces the mathematical principles of data security and shows how these principles apply to operating systems, database systems, and computer networks. It is for students and professionals seeking an introduction to these principles.
by Kelvin Karanja
An in-depth look at passwords and what they really mean to us; what is their actual role; can it be said that we can't do without passwords, what are their vulnerabilities and what is their effect then on the bigger picture that is Cyber Security.