Online Material
1. Barkley, John . “Aspects of Security Policies” (http://hissa.nist.gov).
2. Coar, Ken . “Security and Apache: An Essential Primer Mandatory Versus Discretionary Access Control” (http://www.linuxplanet.com).
3. Gerck, E. “Overview of Certification Systems: X.509, CA, PGP and SKIP” (http://www.mcg.org.br).
4. Gibson, Steve . “The Strange Tale of Denial-of-Service Attacks Against GRC.COM” (http://www.grc.com).
5. Grand, Joe . “Authentication Tokens: Balancing the Security Risks with Business Requirements” (http://www.atstake.com).
6. Lynch, Clifford . “A White Paper on Authentication and Access Management Issues in Cross-organizational Use of Networked Information Resources” (http://www.cni.org).
7. Suares, Stuart . “Biometric ...
Get Security+ Training Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.