Host and Infrastructure Security
Please pardon the dust... this section is under construction
Host Hardening
Principles    Host-Based Firewalls    Unix    Windows
Network Security
Firewalls    Switched Networks    VPN    SSL/TLS    IPSEC    SSH
Intrusion Detection & Intrusion Protection
Network    Host    Appliances
Encryption
Overview    PKI    PGP    GnuPG    OpenPGP standard    OpenSSL    APIs
Transparent file/directory encryption    Encrypted network shares
Authentication
GNU SASL    Kerberos    GSS-API    Single-Signon (SSO)    PAM
Certificates    Tokens, Smartcards & One-Time Passwords    Biometrics
Shortcomings of Password-Based Authentication (CMU Paper)
Evaluating Advanced Authentication Methodologies (Deloitte & Touche Presentation)
Authorisation Role-Based Access Control (RBAC)
Secure Development
Best Practices for Secure Development (Peteanu)
@stake Secure Development Lifecycle
User & Resource Management
Principles & Methods    Directory Services    Single-Signon (SSO)
Physical Security
http://www.computerworld.com/securitytopics/security/story/0,10801,81589,00.html (ComputerWorld article)
http://www.cccure.org/Documents/HISM/675-680.html (CCCure training)
Penetration Testing
Principles & Methods    Tools
Disaster Recovery / BCP
Principles & Methods    Tools