800-100 Information Security Handbook: A Guide for Managers
Information Systems Security - A Comprehensive Model
National Information Systems Security (INFOSEC) Glossary
Security Absurdity: The Complete, Unquestionable, And Total Failure of Information Security
Attack trees
Building an Information Technology Security Awareness and Training Program
Notes on Picking Pin Tumbler Locks.
Password Security: A Case History
Why passwords have never been weaker and crackers have never been stronger
Biometrics
RFID
Secure Programming.com (particularly their pages of links and articles).
Matt Bishop's Writing Safe Setuid Programs page has many useful items. Google cache here, if the main page isn't working.
DoD 5200.28-STD TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA
Salami Fraud