Computer Security, Network Security, Web Security and Encryption

(last updated: 16-May-2015 09:31)
 

Books

  1. Applied Cryptography: Protocols, Algorithms, and Source Code in C; Bruce Schneier; John Wiley & Sons, 1994.
     
  2. Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition; Bruce Schneier; John Wiley & Sons, 1996.
     
  3. Authentication: From Passwords to Public Keys; Richard E. Smith; Addison-Wesley, 2001.
     
  4. Authentication Systems for Secure Networks; Rolf Oppliger; Artech House, 1996.
     
  5. Bandits on the Information Superhighway; Daniel J. Barrett; O'Reilly & Associates, 1996.
     
  6. Basic Methods of Cryptography; Jan C. A. Van Der Lubbe; Cambridge University Press, 1998.
     
  7. Building a Secure Computer System; Morrie Gasser; Van Nostrand Reinhold Company, 1988.
     
  8. Building Secure Software: How To Avoid Security Problems the Right Way; John Viega and Gary McGraw; Addison-Wesley, 2001.
     
  9. The CERT Guide to System and Network Security Practices; Julia H. Allen; Addison-Wesley, 2001.
     
  10. The Complete Guide to Internet Security; Mark S. Merkow and James Breithaupt; American Management Association, 2000.
     
  11. Computer Communications Security: Principles, Standard Protocols and Techniques; Warwick Ford; Prentice Hall, 1994.
     
  12. Computer Forensics: Incident Response Essentials; Warren G. Kruse II and Jay G. Heiser; Addison-Wesley, 2001.
     
  13. Computer Networks; Andrew S. Tanenbaum; Prentice-Hall, Inc., 1981 (Sections 9.1, 9.1.1 thru 9.1.5: Network Security and Privacy).
     
  14. Computer Networks and Their Protocols; D.W. Davies, D.L.A. Barber, W.L. Price, and C.M. Solomonides; John Wiley & Sons, 1979 (Chapter 9: Message Authentication).
     
  15. Computer Security; Dieter Gollman; John Wiley & Sons, 1999.
     
  16. Computer Security: Art and Science; Matt Bishop; Addison-Wesley, 2002.
     
  17. Computer Security Basics; Deborah Russell and G.T. Gangemi Sr.; O'Reilly & Associates, 1991.
     
  18. Computer Security Handbook; Arthur Hutt et al.; Macmillan, 1988.
     
  19. Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses; Ed Skoudis; Prentice Hall, 2001.
     
  20. Cracking DES: Secrets of Encryption Research, Wiretap Politics, & Chip Design; Electronic Frontier Foundation; O'Reilly & Associates, 1998.
     
  21. Cryptography: Theory and Practice; Douglas R. Stinson; CRC Press, 1995.
     
  22. Cryptography: Theory and Practice, Second Edition; Douglas R. Stinson; Chapman & Hall/CRC Press, 2002.
     
  23. Cryptography Decrypted; H.X. Mel and Doris M. Baker; Prentice Hall, 2000.
     
  24. Cryptography Demystified; John E. Hershey; McGraw-Hill, 2003.
     
  25. Cryptography and Network Security: Principles and Practice; William Stallings; Prentice Hall, 1994.
     
  26. Cryptography and Network Security: Principles and Practice, Second Edition; William Stallings; Prentice Hall, 1998.
     
  27. Cryptography and Secure Communications; Man Young Rhee; McGraw-Hill, 1994.
     
  28. The Design of Rijndael: AES -- The Advanced Encryption Standard; Joan Daemen and Vincent Rijmen; Springer-Verlag, 2002.
     
  29. Digital Certificates: Applied Internet Security; Jalal Feghhi, Jalil Feghhi, and Peter Williams; Addison-Wesley, 1998.
     
  30. Disaster Recovery Planning, Second Edition; Jon William Toigo; Prentice Hall, 2000.
     
  31. Disappearing Cryptography; Peter Wayner; Academic Press, 1996.
     
  32. The Electronic Privacy Papers: Documents On the Battle for Privacy in the Age of Surveillance; Bruce Schneier and David Banisar; John Wiley & Sons, 1997.
     
  33. E-Mail Security; Bruce Schneier; John Wiley & Sons, 1995.
     
  34. Firewalls and Internet Security: Repelling the Wily Hacker; William R. Cheswick and Steven M. Bellovin; Addison-Wesley, 1994.
     
  35. Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition; William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin; Addison-Wesley, 2003.
     
  36. Hacking Exposed; Joel Scambray, Stuart McClure, and George Kurtz; McGraw-Hill/Osborne, 2000.
     
  37. Hardening Cisco Routers; Thomas Akin; O'Reilly & Assciates, 2002.
     
  38. Honeypots: Tracking Hackers; Lance Spitzner; Addison-Wesley, 2002.
     
  39. ICSA Guide to Cryptography; Randall K. Nichols; McGraw-Hill, 1999.
     
  40. Incident Response; Kenneth R. Van Wyk and Richard Forno; O'Reilly & Associates, 2001.
     
  41. Incident Response: Investigating Computer Crime; Chris Prosise and Kevin Mandia; McGraw-Hill/Osborne, 2001.
     
  42. Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems; Stephen Northcutt, Lenny Zeltser, Scott Winters, Karen Fredrick, and Ronald W. Ritchey; New Riders Publishing, 2002.
     
  43. Internet Cryptography; Richard E. Smith; Addison-Wesley, 1997.
     
  44. Internet Firewalls and Network Security; Karanjit Siyan and Chris Hare; New Riders Publishing, 1995.
     
  45. Internet and Intranet Security; Rolf Oppliger; Artech House, 1998.
     
  46. Internet Security: Risk Analysis, Strategies, and Firewalls; Othmar Kyas; International Thomson Computer Press, 1997.
     
  47. Internet Site Security; Erik Schetina, Ken Green, and Jacob Carlson; Addison-Wesley, 2002.
     
  48. An Introduction to Operating Systems, Second Edition; Harvey M. Deitel; Addison-Wesley, 1990: Chapter 17 - Operating Systems Security.
     
  49. Introduction to the Public Key Infrastructure for the Internet; Messaoud Benantar; Prentice Hall, 2002.
     
  50. Intrusion Detection; Rebecca Gurley Bace; Macmillan Technical Publishing, 2000.
     
  51. Intrusion Detection: Network Security Beyond the Firewall; Terry Escamilla; John Wiley & Sons, 1999.
     
  52. Intrusion Signatures and Analysis; Mark Cooper, Stephen Northcutt, Matt Fearnow, and Karen Fredrick; New Riders Publishing, 2001.
     
  53. Invitation to Cryptology; Thomas H. Barr; Prentice Hall, 2002.
     
  54. KERBEROS: A Network Authentication System; Brian Tung; Addison-Wesley, 1999.
     
  55. Maximum Security, Fourth Edition; Sams.net Publishing, 2002.
     
  56. Modeling and Design of Security Protocols; Peter Ryan and Steve Schneider; Prentice Hall, 2000.
     
  57. The NCSA Guide to Enterprise Security: Protecting Information Assets; Michael E. Kabay; McGraw-Hill, 1996.
     
  58. Network and Internetwork Security: Principles and Practice; William Stallings; Prentice Hall, 1995.
     
  59. Network Intrusion Detection: An Analyst's Handbook; Stephen Northcutt; New Riders Publishing, 1999.
     
  60. Network Intrusion Detection, Third Edition; Stephen Northcutt and Judy Novak; New Riders Publishing, 2002.
     
  61. Network Security: A Hacker's Perspective; Ankit Fadia; Premier Press, 2003.
     
  62. Network Security: Private Communication in a Public World; Charlie Kaufman, Radia Perlman, and Mike Speciner; Prentice Hall, 1995.
     
  63. Network Security: Private Communication in a Public World, Second Edition; Charlie Kaufman, Radia Perlman, and Mike Speciner; Prentice Hall, 2002.
     
  64. Network Security Essentials: Applications and Standards; William Stallings; Prentice Hall, 2000.
     
  65. Personal Encryption Clearly Explained; Pete Loshin; AP Professional, 1998.
     
  66. Practical Computer Network Security; Mike Hendry; Artech House, 1995.
     
  67. The Practical Intrusion Detection Handbook; Paul E. Proctor; Prentice Hall, 2000.
     
  68. Practical Unix & Internet Security, Second Edition; Simson Garfinkel and Gene Spafford; O'Reilly & Associates, 1996.
     
  69. Practical Unix & Internet Security, Third Edition; Simson Garfinkel, Gene Spafford, and Alan Schwartz; O'Reilly & Associates, 2003.
     
  70. Privacy on the Line: The Politics of Wiretapping and Encryption; Whitfield Diffie and Susand Landau; The MIT Press, 1998.
     
  71. Protecting Networks with SATAN; Martin Freiss; O'Reilly & Associates, 1998.
     
  72. Secrets and Lies: Digital Security in a Networked World; Bruce Schneier; John Wiley & Sons, 2000.
     
  73. Secure Computing: Threats and Safeguards; Rita C. Summers; McGraw-Hill, 1997.
     
  74. Securing the Network from Malicious Code: A Complete Guide to Defending Against Viruses, Worms, and Trojans; Douglas Schweitzer; Wiley Publishing, 2002.
     
  75. Security for Computer Networks; D.W. Davies and W.L. Price; John Wiley & Sons, 1984.
     
  76. Security in Computing; Charles P. Pfleeger; Prentice Hall, 1989.
     
  77. Security in Computing, Second Edition; Charles P. Pfleeger; Prentice Hall, 1997.
     
  78. Security in Computing, Third Edition; Charles P. Pfleeger and Shari Lawerence Pfleeger; Prentice Hall, 2003.
     
  79. Security in Distributed Computing: Did You Lock the Door?; Glen Bruce and Rob Dempsey; Hewlett Packard Company/Prentice Hall, 1997.
     
  80. Security Engineering: A Guide to Building Dependable Distributed Systems; Ross Anderson; John Wiley & Sons, 2001.
     
  81. The Twofish Encryption Algorithm: A 128-Bit Block Cipher; Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, and Neils Ferguson; John Wiley & Sons, 1999.
     
  82. The Underground Guide to Computer Security; Michael Alexander; Addison-Wesley, 1996.
     
  83. Understanding Digital Signatures: Establishing Trust Over the Internet and Other Networks; Gail Grant; McGraw-Hill, 1997.
     
  84. Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations; Carlisle Adams and Steve Lloyd; Macmillan Technical Publishing, 1999.
     
  85. Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations; Carlisle Adams and Steve Llloyd; New Riders Publishing, 1999.
     
  86. Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition; Carlisle Adams and Steve Lloyd; Addison-Wesley, 2002.
     
  87. Web Security: A Step-by-Step Reference Guide; Lincoln D. Stein; Addison-Wesley, 1998.
     
  88. Web Security & Commerce; Simson Garfinkel with Gene Spafford; O'Reilly & Associates, 1997.
     
  89. Web Security, Privacy & Commerce, Second Edition; Simson Garfinkel with Gene Spafford; O'Reilly & Associates, 2001.
     
  90. Writing Secure Code, Second Edition; Michael Howard and David LeBlanc; Microsoft Press, 2002.

Periodical Articles and Conference Papers

  1. "Cryptography and Computer Privacy", SA May 1973.
     
  2. "A Critique of the Proposed Data Encryption Standard", CACM 19:3 Mar 1976 pgs 164-165.
     
  3. "New Directions in Cryptography", IEEE Transactions on Information Theory IT-22:6 Nov 1976 pgs 644-654.
     
  4. "Exhaustive Cryptanalysis of the NBS Data Encryption Standard", IEEE Computer 10:6 Jun 1977 pgs 74-84.
     
  5. "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", CACM 21:2 Feb 1978 pgs 120-126.
     
  6. "Hiding Information and Receipts in Trap Door Knapsacks", IEEE Transactions on Information Theory IT-24:5 Sep 1978 pgs 525-530.
     
  7. "Unclassified Summary: Involvement of NSA in the Development of the Data Encryption Standard", United States Senate Select Committee on Intelligence, reprinted in the IEEE Communications Society Magazine 16:6 Nov 1978 pgs 53-55.
     
  8. "An Overview of Public-Key Cryptography", ITC 16:6 Nov 1978 pgs 24-32.
     
  9. "Privacy and Authentication: An Introduction to Cryptography", PIEEE 67:3 Mar 1979 pgs 397-427.
     
  10. "The Mathematics of Public-Key Cryptography", SA 241:2 Aug 1979 pgs 146-157.
     
  11. "Recent Results in Public-Key Cryptography", M. Willett NEC'79.
     
  12. "Cryptology Goes Public", ICM Mar 1980 pgs 19-28.
     
  13. "New Code Is Broken: An Israeli Mathematician Found a Way to Break the Trapdoor Knapsack Code - One of the Public Key Cryptosystems", Science 216:28 May 1982 pgs 971-972.
     
  14. "Opening the 'Trapdoor Knapsack'", Time Oct 25 1982 pg 88.
     
  15. "Encryption Surge Fails to Materialize; Chip Makers Await Algorithm Shakeout", EDN Aug 18 1983 pgs 83-85.
     
  16. "The Data Encryption Standard", TNAE 17:9 Sep 1983 pgs 77-83.
     
  17. "A Microprocessor-Based Cryptoprocessor", Christian Muller-Schloer, IEEE Micro Oct 1983 pgs 5-15.
     
  18. "Message Authentication", ICM 23:9 Sep 1985 pgs 29-40.
     
  19. "Commercial Encryption", IN 1:2 Apr 1987 pgs 6-10.
     
  20. "Public Key Management for Network Security", IN 1:2 Apr 1987 pgs 11-16.
     
  21. "Stalking the Wily Hacker", CACM 31:x 1988 pgs 484-497.
     
  22. "An Introduction to Contemporary Cryptology", PIEEE 76:5 May 1988 533-549.
     
  23. "The Data Encryption Standard: Past and Future", PIEEE 76:5 May 1988 550-559.
     
  24. "The First Ten Years of Public-Key Cryptography", PIEEE 76:5 May 1988 560-577.
     
  25. "Information Security: An Overview", ATTJ 67:3 May/Jun 1988 pgs 2-8.
     
  26. "Security Standards - Government and Commercial", ATTJ 67:3 May/Jun 1988 pgs 9-18.
     
  27. "Safe and Secure?", BYTE 14:5 May 1989 pgs 253-258.
     
  28. "How Safe Is It?", BYTE 14:6 Jun 1989 pgs 257-264.
     
  29. "Secret Codes", BYTE 14:6 Jun 1989 pgs 267-270.
     
  30. "Personal and Private", BYTE 14:6 Jun 1989 pgs 285-288.
     
  31. "E-Mail Privacy for the Internet", BCR 20:1 Jan 1990 pgs 55-58.
     
  32. "Threats to Your Data", PCM 9:3 Feb 13 1990 pgs 264-265.
     
  33. "Data and Program Defense Mechanisms", PCM 9:3 Feb 13 1990 pg 267.
     
  34. "Novel Applications of Cryptography in Digital Communications", ICM 28:5 May 1990 pgs 21-29.
     
  35. "Cloak and Data", BYTE 15:6 Jun 1990 pgs 311-324.
     
  36. "True Data", BYTE 16:9 Sep 1991 pgs 122-128.
     
  37. "Who Holds the Keys?", CACM 35:7 Jul 1992 pgs 13-15.
     
  38. "Decrypting the Puzzle Palace", CACM 35:7 Jul 1992 pgs 25-31.
     
  39. "Debating Encryption Standards", CACM 35:7 Jul 1992 pgs 32-34.
     
  40. "The Digital Signature Standard Proposed by NIST", CACM 35:7 Jul 1992 pgs 36-40.
     
  41. "Responses to NIST's Proposal", CACM 35:7 Jul 1992 pgs 41-54.
     
  42. "Public-Key Cryptography and Open Systems Interconnection", ICM 30:7 Jul 1992 pgs 30-35.
     
  43. "Cryptography = privacy?", IEEE Spectrum Aug 1992 pgs 29-35.
     
  44. "Digital Signatures", BYTE 18:12 Nov 1993 pgs 309-312.
     
  45. "Wire Pirates", SA 270:3 Mar 1994 pgs 90-101.
     
  46. "Security in Electronic Messaging Systems", ATTJ 73:3 May/Jun 1994 pgs 7-13.
     
  47. "How to Keep It a Secret", PCM 13:13 Jul 1994 pgs 315-322.
     
  48. "Crypto Policy Perspectives", CACM 37:8 Aug 1994 pgs 115-121.
     
  49. "Kerberos: An Authentication Service for Computer Networks", ICM 32:9 Sep 1994 pgs 33-38.
     
  50. "Access Control: Principles and Practice", ICM 32:9 Sep 1994 pgs 40-48.
     
  51. "Key Escrowing Today", ICM 32:9 Sep 1994 pgs 58-68.
     
  52. "Toward a National Public Key Infrastructure", ICM 32:9 Sep 1994 pgs 70-74.
     
  53. "Digital Signatures: Are They Legal for Electronic Commerce?", ICM 32:9 Sep 1994 pgs 76-80.
     
  54. "Securing a Global Village and Its Resources", ICM 32:9 Sep 1994 pgs 82-89.
     
  55. "Public Key Cryptography", ATTJ 73:5 Sep/Oct 1994 pgs 17-23.
     
  56. "How Secure Is Encrypted Data?", PCM 13:18 Oct 25 1994 pgs 291-293.
     
  57. "Secure Distributed Computing", SA 271:5 Nov 1994 pgs 72-76.
     
  58. "The Role of Cryptography in Network Security", BCR 25:9 Sep 1995 pgs 67-72.
     
  59. "SATAN and Courtney: A Devil of a Team", PCM 14:16 Sep 26 1995 pgs 265-266.
     
  60. "Picking the Crypto Locks", BYTE 20:10 Oct 1995 pgs 77-80.
     
  61. "How To Use Key Escrow" CACM 39:3 Mar 1996 pgs 32-33.
     
  62. "A Taxonomy for Key Escrow Encryption Systems", CACM 39:3 Mar 1996 pgs 34-40.
     
  63. "Commercial Key Recovery", CACM 39:3 Mar 1996 pgs 41-47.
     
  64. "Crypto Backup and Key Escrow", CACM 39:3 Mar 1996 pgs 48-53.
     
  65. "The Yaksha Security System", CACM 39:3 Mar 1996 pgs 55-60.
     
  66. "Internet Security: How Much Is Enough?", DC Apr 1996 pgs 60-72.
     
  67. "Digital Signatures: How They Work", PCM 15:7 Apr 9 1996 pgs 237-244.
     
  68. "Don't Loose Your Crypto Keys", BYTE May 1996.
     
  69. "Public-Key Security Systems", IEEE Micro 16:3 Jun 1996 pgs 10-13.
     
  70. "Securing the Commercial Internet", CACM 39:6 Jun 1996 pgs 29-35.
     
  71. "Entrust: The Key to Corporate Data Security", Telesis Issue 101 Sep 1996 pgs 42-54.
     
  72. "Protecting Your Data With Cryptography", UR 14:12 Nov 1996 pgs 55-61.
     
  73. "The Changing Environment for Security Protocols", IN 11:3 May/Jun 1997 pgs 12-15.
     
  74. "Who Goes There?", BYTE 22:6 Jun 1997 pgs 70-80.
     
  75. "Security in Data Networks", BTTJ 16:1 Jan 1998 pgs 52-75.
     
  76. "Internet Security Standards", PCM 17:2 Jan 20 1998 pgs 241-242.
     
  77. "Can't Say No: Denial-of-Service Attacks", PCM 17:8 Apr 21 1998 pgs 203-204.
     
  78. "Making E-Mail Secure", PCM 17:15 Sep 1 1998 pgs 263-268.
     
  79. "How Hackers Break In... and How They Are Caught", SA 279:4 Oct 1998 pgs 98-105.
     
  80. "How Computer Security Works", SA 279:4 Oct 1998 pgs 106-109.
     
  81. "Cryptography for the Internet", SA 279:4 Oct 1998 pgs 110-115.
     
  82. "The Case Against Regulating Encryption Technology", SA 279:4 Oct 1998 pgs 116-117.
     
  83. "Internet Privacy", CACM 42:2 Feb 1999 pgs 28-31.
     
  84. "Certificates, Keys, and Security", PCM 18:8 Apr 20 1999 pgs 227-230.
     
  85. "AAA Protocols: Authentication, Authorization, and Accounting for the Internet", IIC 3:6 Nov/Dec 1999 pgs 75-79.
     
  86. "Encryption Wars: Early Battles", IEEE Spectrum 37:4 Apr 2000 pgs 37-43.
     
  87. "Protect & Defend", PCM 19:12 Jun 27 2000 pgs 168-171.
     
  88. "Sign on the Digital Line" (product reviews), PCM 19:16 Sep 19 2000 pgs 32-36.
     
  89. "No Longer in Denial", IEEE Spectrum 38:1 Jan 2001 pgs 59-61.
     
  90. "Electronic Signatures", PCM 20:1 Jun 2 2001 pgs 102-105.
     
  91. "Intrusion Detection: A Brief History and Overview", IEEE Computer 35:4 Apr 2002 pgs 27-30.
     
  92. "PKI: It's Not Dead, Just Resting", IEEE Computer 35:8 Aug 2002 pgs 41-49.