Books General principles Passwords, security questions, biometrics Phishing Web security Stream ciphers used badly Memory corruption attacks Viruses, rootkits, trojans, worms, botnets Spam Firewalls and intrusion detection SSL and certificates