Security IT
![]() |
This book is an undeveloped draft or outline. You can help to develop the work, or you can ask for assistance in the project room. |
![]() | FNORD! You are reading this article on their own responsibility! |
Introduce[edit | edit source]
- The Art of War from Sun Tzu
- Open Source
- Open Hardware
Hardware[edit | edit source]
Software[edit | edit source]
- OpenBIOS
- Running - disk encryption
- First line of defense - Operating Systems
- Check the authenticity of software
Internet[edit | edit source]
Suplements[edit | edit source]
- Sumpletent A: LiveCD
- Suplement B: Fake identity