Security IT
Appearance
This book is an undeveloped draft or outline. You can help to develop the work, or you can ask for assistance in the project room. |
FNORD! You are reading this article on their own responsibility! |
Introduce
[edit | edit source]- The Art of War from Sun Tzu
- Open Source
- Open Hardware
Hardware
[edit | edit source]Software
[edit | edit source]- OpenBIOS
- Running - disk encryption
- First line of defense - Operating Systems
- Check the authenticity of software
Internet
[edit | edit source]Suplements
[edit | edit source]- Sumpletent A: LiveCD
- Suplement B: Fake identity