http://uw714doc.sco.com/en/SEC_admin/IS_HowObjReuseRelatesScur.html
This article describes UnixWare prevention of object reuse. It notes that the administrator need not do anything to enforce the secure reuse of system objects. This requirement is handled by the kernel automatically.
US-CERT – Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies
3.13 3.13.2 System and Communications Protection
https://www.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf
This white paper describes strategies to securely configure Industrial Control Systems.
https://www.veracode.com/security/mobile-code-security
This article describes the two main categories of mobile code security risks
https://www.vmware.com/topics/network-infrastructure-security
Network Infrastructure Security, typically applied to enterprise IT environments, is a process of protecting the underlying networking infrastructure by installing preventative measures to deny unauthorized access, modification, deletion, and theft of resources and data.
https://www.youtube.com/watch?v=Gi-niOoVAm4
This video from SANS educates viewers on the positive and negative aspects of using full disk encryption for security.