Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 60. Chapters: Security through obscurity, Full disclosure, Automated information systems security, Trusted computing base, Security management, Exit procedure, Canary trap, Mobile device forensics, Identity management, Filesystem permissions, XTS-400, Computer forensics, Cyber security standards, Penetration test, Fuzz testing, Evaluation Assurance Level, Cyber-security regulation, Setuid, Control system security, XACML, Chroot, Host protected area, Cyber spying, Patch Tuesday, Same origin policy, Security controls, Security-evaluated operating system, Information technology security audit, AAA protocol, Protection Profile, Open Vulnerability and Assessment Language, Vulnerability management, Secure by default, Common Criteria Testing Laboratory, Off-site data protection, Privilege separation, Responsible disclosure, National Strategy to Secure Cyberspace, Computer Underground Digest, Computer security policy, CESG Claims Tested Mark, Need to know, Cryptographic Module Testing Laboratory, Defense in depth, Department of Defense Information Assurance Certification and Accreditation Process, Intruder detection, Trust negotiation, RISKS Digest, Privilege revocation, Network security policy, Presumed security, Protection mechanism, Google hacking, System High Mode, CBL Index, Hardening, Department of Defense Information Technology Security Certification and Accreditation Process, Secure error messages in software systems, National Information Assurance Training and Education Center, Shibboleth, Schneier's Law, Security Target, DShield, System Security Authorization Agreement, Commercial Product Assurance, Secure attention key, Not Just Another Bogus List, Internet ethics, Composite Blocking List, National Information Assurance Certification and Accreditation Process, Enterprise Privacy Authorization Language, Differentiated security, ...