O'Reilly logo

Security+ Training Guide by Todd King

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Online Material

1. Barkley, John . “Aspects of Security Policies” (http://hissa.nist.gov).

2. Coar, Ken . “Security and Apache: An Essential Primer Mandatory Versus Discretionary Access Control” (http://www.linuxplanet.com).

3. Gerck, E. “Overview of Certification Systems: X.509, CA, PGP and SKIP” (http://www.mcg.org.br).

4. Gibson, Steve . “The Strange Tale of Denial-of-Service Attacks Against GRC.COM” (http://www.grc.com).

5. Grand, Joe . “Authentication Tokens: Balancing the Security Risks with Business Requirements” (http://www.atstake.com).

6. Lynch, Clifford . “A White Paper on Authentication and Access Management Issues in Cross-organizational Use of Networked Information Resources” (http://www.cni.org).

7. Suares, Stuart . “Biometric ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required