The Art of Good Computer Security Writing

    Date07 Nov 2000
    3372
    Posted ByAnthony Pell
    Good computer security documentation teaches practical solutions clearly. Yet, too often security documents suffer from too little explanation and too technical language. Much technical documentation in general, and computer security material in particular, assumes too much on the reader's part. For . . . Good computer security documentation teaches practical solutions clearly. Yet, too often security documents suffer from too little explanation and too technical language. Much technical documentation in general, and computer security material in particular, assumes too much on the reader's part. For an example, read this opening sentence describing the Unix "find" command on a "man" (manual) page: The find utility recursively descends the directory hierarchy for each path seeking files that match a Boolean expression written in the primaries given below.
    You are not authorised to post comments.

    LinuxSecurity Poll

    Has your email account ever been pwned in a data breach?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    12
    radio
    [{"id":"53","title":"Yes","votes":"8","type":"x","order":"1","pct":88.89,"resources":[]},{"id":"54","title":"No","votes":"1","type":"x","order":"2","pct":11.11,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.