Technical Conceptual Cybersecurity Documents


Everything not done is nothing until someone decides to make something. Things are most typically decided to be infeasible because no advanced effort has been undertaken to take a first step. Most people walk on solid ground but the worm burrows through the earth to obtain victory.


This section includes mostly cybersecurity documents that are more conceptual and technical in nature. Documents that should be used as jumping-off points for discussion and/or innovation.

AMASE: Advanced MAC Address Security for Enterprises