Documenti:
- Computer Security: Principles and Practice (3rd Edition)
- CPR 2020 Cyber Security Report (2020)
- Symantec 2019 Internet Security Threath Report (2020)
- 13th Worldwide Infrastructure Security Report (2017)
- Usable Security: How to Get it (Butler Lampson)
- The 60 Minute Network Security Guide
- Cyber Insecurity: The Cost of Monopoly
- Phishing Activity Trends Report (January-June 2009)
- Symantec Report on the Underground Economy (November 2008)
- A Security Analysis of the Secure Electronic Registration and Voting Experiment
- An Introduction to Cryptography (PGP Corporation)
-
The Protection of Information in Computer Systems (Saltzer, Schroeder)
- Prudent
Engineering Practice for Cryptographic Protocols
- Authentication
in Distributed Systems: Theory and Practice (Lampson, et al)
- Kerberos: An
Authentication Service for Computer Networks (Neuman,
Ts'o)
- The Evolution of the Kerberos
Authentication Service (Kohl, Neuman, Ts'o)
- Java Security: From HotJava
to Netscape and Beyond (Dean, Felten, Wallach)
- Protection in Operating Systems (Harrison, Ruzzo, Ullman)
- PayWorld and
MicroMint: Two Simple Micropayment Schemes (Rivest, Shamir)
- iKP - A Family of
Secure Electronic Payment Protocols (Bellare et al)
- Surmounting the Effects of
Lossy Compression on Steganography (Currie, Ervine)
- The Internet
Worm: Crisis and Aftermath (Spafford)
- Decreto Legislativo 23 febbraio 2002, n. 10 sulle firme elettroniche
Siti: