Proactive Recovery in a Byzantine-Fault-Tolerant System
This paper describes an asynchronous state-machine replication system that tolerates Byzantine faults, which can be caused by malicious attacks or software errors.
IO-Lite: A Unified I/O Buffering and Caching System
Are your systems and network functioning correctly? Can you be sure at this moment? Every administrator has some need to be able to answer these or similar questions on an ongoing basis.
Intrusion Detection with SNORT
This free book explains and simplifies every aspect of deploying and managing Snort in your network. Includs custom scripts to integrate Snort with Apache, MySQL, PHP, and ACID so you can build and optimize a complete IDS solution in record time.
Open Source Security Tools
Free ebook Open-Source Security Tools is a practical, hands-on introduction to open-source security tools.
Firewalls and Internet Security
Firewalls and Internet Security: Repelling the Wily Hacker gives invaluable advice and practical tools for protecting our computers. You will learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services.
Rethinking Public Key Infrastructures and Digital Certificates
Proposes the use of digital certificates to ensure the privacy of electronic communications. Offers many explanations why this would be a good system to use instead of traditional signatures paper methods, and gives potential applications for the technology such as electronic postage and health care information storage.
Handbook of Applied Cryptography
Handbook of Applied Cryptography is available free of charge in pdf and postscript formats.
Handheld Computers for Doctors
The information in this book has shown hundreds of doctors how to use handheld computers to deal with information overload without dealing with computer jargon. It has been translated into two Spanish editions (one for Spain and for the Latin America) and one Chinese edition.
Who Goes There?:
Authentication Through the Lens of Privacy
Who Goes There?: Authentication Through the Lens of Privacy explores authentication technologies (passwords, PKI, biometrics, etc.) and their implications for the privacy of the individuals being authenticated. As authentication becomes ever more ubiquitous, understanding its interplay with privacy is vital
Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers (2001)
Embedded, Everywhere explores the potential of networked systems of embedded computers and the research challenges arising from embedding computation and communications technology into a wide variety of applications from precision agriculture to automotive telematics to defense systems.
Handbook of Applied Cryptography - Free eBook Handbook of Applied Cryptography - Download ebook Handbook of Applied Cryptography free
|