Security audit
Applying Boyd's OODA Loop Strategy to Drive IT Security Decision and Action
Security Audit
Securing Citizen Facing Applications
1. introduction to semantics
1. Introduction to Semantics (1)
Introduction to semantics
Perspectives: Improving SSH-style Host Authentication or How to Strengthen Tofu Dan Wendlandt - [email protected] - Carnegie [email protected] Joint.
References Cranor & Garfinkel, Security and Usability, O’Reilly Sasse & Flechais, “Usable Security: Why Do We Need It? How Do We Get It?” McCracken.
Ravi Mukkamala Department of Computer Science Old Dominion University Norfolk, Virginia, USA [email protected] 11/18/20151.
Perspectives: Improving SSH-style Host Authentication or How to Strengthen Tofu