Raw IP Networking FAQ - Thamer Al-Herbish's Raw IP Networking FAQ about networking below TCP/UDP and sniffing networks. Includes raw socket source code. - http://www.faqs.org/faqs/internet/tcp-ip/raw-ip-faq/index.html
Secure UNIX Programming FAQ - Definitions of security holes, security principles, how to access files safely, and untainting input. - http://www.faqs.org/faqs/unix-faq/programmer/secure-programming/
Auditing UNIX Systems: A Case Study - This report, written as a case study, presents results of a detailed information security audit of UNIX systems that belong to a fictitious company. It illustrates an approach to performing such an examination. - http://www.zeltser.com/auditing-unix-systems/
Writing Safe Setuid Programs - Collection of papers on writing safe setuid programs by Matt Bishop. - http://nob.cs.ucdavis.edu/~bishop/secprog/index.html
Adminschoice - Securing solaris OS - Details some of the focus areas for security and provides suggestions to make it strong. - http://adminschoice.com/docs/securing_solaris.htm
NIST Computer Security Resource Clearinghouse - Collects and disseminates computer security information and resources to help users, systems administrators, managers, and security professionals better protect their data and systems. - http://csrc.ncsl.nist.gov/
Unix security basics, Part 1 - Understanding file attribute bits and modes - http://www.itworld.com/Comp/3380/swol-1020-unix101/
Absence of Malice - Editorial from Dr. Dobb's Journal about Randal Schwartz's felony convictions for running Crack on unauthorized machines. - http://www.lightlink.com/fors/press/ddj9603.html
AIX 4.3 Network Hardening - Recipes to secure network services on AIX. Download of scripts available. - http://ist.uwaterloo.ca/security/howto/2001-01-15/