|
Computer Security EBooks
|
|
|
Free Computer Security EBooks for Download
Below we have listed all the Free Computer Security EBooks for download. Feel free to comment on any Computer Security EBooks for download or answer by the comment feature available on the page.
To buy an eBook containing 9000 Interview Questions, with Answers, Click Here.
|
Rethinking Public Key Infrastructures and Digital Certificates: Proposes the use of digital certificates to ensure the privacy of electronic communications. Offers many explanations why this would be a good system to use instead of traditional signatures paper methods, and gives potential applications for the technology such as electronic postage and health care information storage. Date Added: 7/20/2006 | Visits: 33230 |
Handbook of Applied Cryptography: Handbook of Applied Cryptography is available free of charge in pdf and postscript formats. Date Added: 7/20/2006 | Visits: 34192 |
Handheld Computers for Doctors: The information in this book has shown hundreds of doctors how to use handheld computers to deal with information overload without dealing with computer jargon. It has been translated into two Spanish editions (one for Spain and for the Latin America) and one Chinese edition. Date Added: 7/20/2006 | Visits: 32723 |
Who Goes There?:
Authentication Through the Lens of Privacy
: Who Goes There?: Authentication Through the Lens of Privacy explores authentication technologies (passwords, PKI, biometrics, etc.) and their implications for the privacy of the individuals being authenticated. As authentication becomes ever more ubiquitous, understanding its interplay with privacy is vital Date Added: 7/20/2006 | Visits: 31763 |
Intrusion Detection with SNORT: This free book explains and simplifies every aspect of deploying and managing Snort in your network. Includs custom scripts to integrate Snort with Apache, MySQL, PHP, and ACID so you can build and optimize a complete IDS solution in record time. Date Added: 7/20/2006 | Visits: 32726 |
The Protection of Information in Computer Systems: This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main sections. Section I describes desired functions, design principles, and examples of elementary protection and authentication mechanisms. Any reader familiar with computers should find the first section to be reasonably accessible. Section II requires some familiarity with descriptor-based computer architecture. It examines in depth the principles of modern protection architectures and the relation between capability systems and access control list systems, and ends with a brief analysis of protected subsystems and protected objects. The reader who is dismayed by either the prerequisites or the level of detail in the second section may wish to skip to Section III, which reviews the state of the art and current research projects and provides suggestions for further reading. Date Added: 1/31/2005 | Visits: 36159 |
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID: Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all your network traffic in real time; update Snort to reflect new security threats; automate and analyze Snort alerts; and more. Best of all, Rehman's custom scripts integrate Snort with Apache, MySQL, PHP, and ACID-so you can build and optimize a complete IDS solution more quickly than ever before. Date Added: 1/31/2005 | Visits: 35296 |
<< Back | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |9| 10 | Next >>
Free Computer Security eBooks - Download Computer Security eBooks - List of Computer Security eBooks
|
|