http://uw714doc.sco.com/en/SEC_admin/IS_HowObjReuseRelatesScur.html
This article describes UnixWare prevention of object reuse. It notes that the administrator need not do anything to enforce the secure reuse of system objects. This requirement is handled by the kernel automatically.
US-CERT – Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies
3.13 3.13.2 System and Communications Protection
https://www.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf
This white paper describes strategies to securely configure Industrial Control Systems.
Vaulted – The DNS server implementation must prevent unauthorized and unintended information transfer via shared system resources.
3.13 3.13.4 System and Communications Protection
https://vaulted.io/library/disa-stigs-srgs/domain_name_system_dns_security_requirements_guide/V-54837
This article provides a good explanation of this issue and shows how the finding is resolved by preventing object reuse.
https://www.veracode.com/security/mobile-code-security
This article describes the two main categories of mobile code security risks
https://www.vmware.com/topics/glossary/content/network-infrastructure-security.html
Network Infrastructure Security, typically applied to enterprise IT environments, is a process of protecting the underlying networking infrastructure by installing preventative measures to deny unauthorized access, modification, deletion, and theft of resources and data.
https://www.youtube.com/watch?v=Gi-niOoVAm4
This video from SANS educates viewers on the positive and negative aspects of using full disk encryption for security.