Security IT
Jump to navigation
Jump to search
This book is an undeveloped draft or outline. You can help to develop the work, or you can ask for assistance in the project room. |
FNORD! You are reading this article on their own responsibility! |
Introduce[edit | edit source]
- The Art of War from Sun Tzu
- Open Source
- Open Hardware
Hardware[edit | edit source]
Software[edit | edit source]
- OpenBIOS
- Running - disk encryption
- First line of defense - Operating Systems
- Check the authenticity of software
Internet[edit | edit source]
Suplements[edit | edit source]
- Sumpletent A: LiveCD
- Suplement B: Fake identity