- An introduction to computer security: The NIST Handbook
- Security awareness
- Building secure N-Tier environments
- Sun BluePrints OnLine—Security
- How to Share a Secret (Adi Shamir, MIT)
- What is Shamirs Secret Sharing Scheme?
- Access360s Top Ten Tips for Preventing Cyber Sabotage
- Managed Security Monitoring: Network Security for the 21st Century
- @stakes Assessment Guidelines for Securing the Enterprise
Home Cybersecurity