|
Computer Security EBooks
|
|
|
Free Computer Security EBooks for Download
Below we have listed all the Free Computer Security EBooks for download. Feel free to comment on any Computer Security EBooks for download or answer by the comment feature available on the page.
To buy an eBook containing 9000 Interview Questions, with Answers, Click Here.
|
Adaptive Network Security: Moving from Implicit to Explicit Permissions: With the frequency and severity of attacks increasing, and organizations relying increasingly on networked automation to gain a competitive edge, is it finally time to reconsider the prevailing approach to network security? How can corporations ensure that users get the network access they need, without jeopardizing the security of the network? Date Added: 9/15/2006 | Visits: 33464 |
Registry Hacks for Servers: Advanced users of Windows XP are used to digging around in the Registry looking for ways to tweak performance or push the envelope of Windows' abilities. Provided you back up your Registry before hacking it, no harm usually comes from such endeavors.
Date Added: 9/15/2006 | Visits: 32993 |
NT Security in an Open Academic Environment: Stanford Linear Accelerator Center (SLAC) was faced with the need to secure its PeopleSoft/Oracle business system in an academic environment which only has a minimal firewall. To provide protected access to the database servers for NT-based users all over the site while not hindering the lab's open connectivity with the Internet, we implemented a pseudo three-tier architecture for PeopleSoft with Windows Terminal Server and Citrix MetaFrame technology Date Added: 7/25/2006 | Visits: 32330 |
Remote Timing Attacks Are Practical: Timing attacks enable an attacker to extract secrets maintained in a security system by observing the time it takes the system to respond to various queries Date Added: 7/25/2006 | Visits: 31827 |
Security Analysis of a Cryptographically-Enabled RFID Device : We describe our success in defeating the security of an RFID device known as a Digital Signature Transponder (DST). Manufactured by Texas Instruments, DST (and variant) devices help secure millions of SpeedPassTM payment transponders and automobile ignition keys. Date Added: 7/25/2006 | Visits: 32065 |
Understanding Data Lifetime via Whole System Simulation: Strictly limiting the lifetime (i.e. propagation and duration of exposure) of sensitive data (e.g. passwords) is an important and well accepted practice in secure software development. Unfortunately, there are no current methods available for easily analyzing data lifetime, and very little information available on the quality of today's software with respect to data lifetime Date Added: 7/25/2006 | Visits: 31528 |
Fairplay�A Secure Two-Party Computation System: Advances in modern cryptography coupled with rapid growth in processing and communication speeds make secure two-party computation a realistic paradigm. Yet, thus far, interest in this paradigm has remained mostly theoretical. Date Added: 7/25/2006 | Visits: 31476 |
<< Back | 1 | 2 | 3 | 4 | 5 |6| 7 | 8 | 9 | 10 | Next >>
Free Computer Security eBooks - Download Computer Security eBooks - List of Computer Security eBooks
|
|