Chapter 24. More Security Systems
With every release, software gets more complex and less secure until the only security left is job security.
A lot of systems have been deployed with security features, and it is rather surprising how different they can be from one another. In this chapter we give an overview of some of the systems we have found interesting. Some of them are quite old and have died out, but we describe them anyway because they have some interesting features, either positive or negative. Since these are not standards, we are not attempting to describe them in sufficient detail to implement them, but rather only enough to describe their interesting concepts.
Why haven’t these systems been fully documented in the public ...