Other links at |
1. |
Incident Response
|
|
Shows how to put in place an incident-response process that's as planned, efficient, and businesslike as any other IT operation in a mature organization. Includes both the technical and administrative aspects of building an effective incident response plan.
|
3. |
Stopping Spam
|
|
This book describes spam -- unwanted email messages and inappropriate news articles -- and explains what you and your Internet service providers and administrators can do to prevent it, trace it, stop it, and even outlaw it.
|
5. |
Computer Security Basics
|
|
Describes complicated concepts like trusted systems, encryption, and mandatory access control in simple terms.
|
|
|