Online Material

1. Barkley, John . “Aspects of Security Policies” (http://hissa.nist.gov).

2. Coar, Ken . “Security and Apache: An Essential Primer Mandatory Versus Discretionary Access Control” (http://www.linuxplanet.com).

3. Gerck, E. “Overview of Certification Systems: X.509, CA, PGP and SKIP” (http://www.mcg.org.br).

4. Gibson, Steve . “The Strange Tale of Denial-of-Service Attacks Against GRC.COM” (http://www.grc.com).

5. Grand, Joe . “Authentication Tokens: Balancing the Security Risks with Business Requirements” (http://www.atstake.com).

6. Lynch, Clifford . “A White Paper on Authentication and Access Management Issues in Cross-organizational Use of Networked Information Resources” (http://www.cni.org).

7. Suares, Stuart . “Biometric ...

Get Security+ Training Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.