Computer Security, Network Security, Web Security and Encryption
(last updated: 16-May-2015 09:31)
Books
-
Applied Cryptography: Protocols, Algorithms, and Source Code in C;
Bruce Schneier; John Wiley & Sons, 1994.
-
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second
Edition; Bruce Schneier; John Wiley & Sons, 1996.
-
Authentication: From Passwords to Public Keys; Richard E. Smith;
Addison-Wesley, 2001.
-
Authentication Systems for Secure Networks; Rolf Oppliger; Artech House,
1996.
-
Bandits on the Information Superhighway; Daniel J. Barrett;
O'Reilly & Associates, 1996.
-
Basic Methods of Cryptography; Jan C. A. Van Der Lubbe; Cambridge
University Press, 1998.
-
Building a Secure Computer System; Morrie Gasser; Van Nostrand
Reinhold Company, 1988.
-
Building Secure Software: How To Avoid Security Problems the Right Way;
John Viega and Gary McGraw; Addison-Wesley, 2001.
-
The CERT Guide to System and Network Security Practices; Julia H. Allen;
Addison-Wesley, 2001.
-
The Complete Guide to Internet Security; Mark S. Merkow and James
Breithaupt; American Management Association, 2000.
-
Computer Communications Security: Principles, Standard Protocols and
Techniques; Warwick Ford; Prentice Hall, 1994.
-
Computer Forensics: Incident Response Essentials; Warren G. Kruse II and
Jay G. Heiser; Addison-Wesley, 2001.
-
Computer Networks; Andrew S. Tanenbaum; Prentice-Hall, Inc., 1981
(Sections 9.1, 9.1.1 thru 9.1.5: Network Security and Privacy).
-
Computer Networks and Their Protocols; D.W. Davies, D.L.A. Barber,
W.L. Price, and C.M. Solomonides; John Wiley & Sons, 1979
(Chapter 9: Message Authentication).
-
Computer Security; Dieter Gollman; John Wiley & Sons, 1999.
-
Computer Security: Art and Science; Matt Bishop; Addison-Wesley, 2002.
-
Computer Security Basics; Deborah Russell and G.T. Gangemi Sr.;
O'Reilly & Associates, 1991.
-
Computer Security Handbook; Arthur Hutt et al.; Macmillan, 1988.
-
Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective
Defenses; Ed Skoudis; Prentice Hall, 2001.
-
Cracking DES: Secrets of Encryption Research, Wiretap Politics, & Chip Design;
Electronic Frontier Foundation; O'Reilly & Associates, 1998.
-
Cryptography: Theory and Practice; Douglas R. Stinson; CRC Press, 1995.
-
Cryptography: Theory and Practice, Second Edition; Douglas R. Stinson;
Chapman & Hall/CRC Press, 2002.
-
Cryptography Decrypted; H.X. Mel and Doris M. Baker; Prentice Hall, 2000.
-
Cryptography Demystified; John E. Hershey; McGraw-Hill, 2003.
-
Cryptography and Network Security: Principles and Practice; William
Stallings; Prentice Hall, 1994.
-
Cryptography and Network Security: Principles and Practice, Second Edition;
William Stallings; Prentice Hall, 1998.
-
Cryptography and Secure Communications; Man Young Rhee;
McGraw-Hill, 1994.
-
The Design of Rijndael: AES -- The Advanced Encryption Standard; Joan Daemen
and Vincent Rijmen; Springer-Verlag, 2002.
-
Digital Certificates: Applied Internet Security; Jalal Feghhi, Jalil Feghhi,
and Peter Williams; Addison-Wesley, 1998.
-
Disaster Recovery Planning, Second Edition; Jon William Toigo; Prentice Hall,
2000.
-
Disappearing Cryptography; Peter Wayner; Academic Press, 1996.
-
The Electronic Privacy Papers: Documents On the Battle for Privacy in the
Age of Surveillance; Bruce Schneier and David Banisar; John Wiley & Sons,
1997.
-
E-Mail Security; Bruce Schneier; John Wiley & Sons, 1995.
-
Firewalls and Internet Security: Repelling the Wily Hacker; William R.
Cheswick and Steven M. Bellovin; Addison-Wesley, 1994.
-
Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition;
William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin;
Addison-Wesley, 2003.
-
Hacking Exposed; Joel Scambray, Stuart McClure, and George Kurtz;
McGraw-Hill/Osborne, 2000.
-
Hardening Cisco Routers; Thomas Akin; O'Reilly & Assciates, 2002.
-
Honeypots: Tracking Hackers; Lance Spitzner; Addison-Wesley, 2002.
-
ICSA Guide to Cryptography; Randall K. Nichols; McGraw-Hill, 1999.
-
Incident Response; Kenneth R. Van Wyk and Richard Forno;
O'Reilly & Associates, 2001.
-
Incident Response: Investigating Computer Crime; Chris Prosise and Kevin
Mandia; McGraw-Hill/Osborne, 2001.
-
Inside Network Perimeter Security: The Definitive Guide to Firewalls,
Virtual Private Networks (VPNs), Routers, and Intrusion Detection
Systems; Stephen Northcutt, Lenny Zeltser, Scott Winters, Karen Fredrick,
and Ronald W. Ritchey; New Riders Publishing, 2002.
-
Internet Cryptography; Richard E. Smith; Addison-Wesley, 1997.
-
Internet Firewalls and Network Security; Karanjit Siyan and Chris Hare;
New Riders Publishing, 1995.
-
Internet and Intranet Security; Rolf Oppliger; Artech House, 1998.
-
Internet Security: Risk Analysis, Strategies, and Firewalls; Othmar Kyas;
International Thomson Computer Press, 1997.
-
Internet Site Security; Erik Schetina, Ken Green, and Jacob Carlson;
Addison-Wesley, 2002.
-
An Introduction to Operating Systems, Second Edition; Harvey M.
Deitel; Addison-Wesley, 1990: Chapter 17 -
Operating Systems Security.
-
Introduction to the Public Key Infrastructure for the Internet;
Messaoud Benantar; Prentice Hall, 2002.
-
Intrusion Detection; Rebecca Gurley Bace; Macmillan Technical Publishing,
2000.
-
Intrusion Detection: Network Security Beyond the Firewall; Terry Escamilla;
John Wiley & Sons, 1999.
-
Intrusion Signatures and Analysis; Mark Cooper, Stephen Northcutt, Matt
Fearnow, and Karen Fredrick; New Riders Publishing, 2001.
-
Invitation to Cryptology; Thomas H. Barr; Prentice Hall, 2002.
-
KERBEROS: A Network Authentication System; Brian Tung; Addison-Wesley, 1999.
-
Maximum Security, Fourth Edition; Sams.net Publishing, 2002.
-
Modeling and Design of Security Protocols; Peter Ryan and Steve Schneider;
Prentice Hall, 2000.
-
The NCSA Guide to Enterprise Security: Protecting Information Assets;
Michael E. Kabay; McGraw-Hill, 1996.
-
Network and Internetwork Security: Principles and Practice; William Stallings;
Prentice Hall, 1995.
-
Network Intrusion Detection: An Analyst's Handbook; Stephen Northcutt;
New Riders Publishing, 1999.
-
Network Intrusion Detection, Third Edition; Stephen Northcutt and Judy Novak;
New Riders Publishing, 2002.
-
Network Security: A Hacker's Perspective; Ankit Fadia; Premier Press, 2003.
-
Network Security: Private Communication in a Public World; Charlie Kaufman,
Radia Perlman, and Mike Speciner; Prentice Hall, 1995.
-
Network Security: Private Communication in a Public World, Second Edition;
Charlie Kaufman, Radia Perlman, and Mike Speciner; Prentice Hall, 2002.
-
Network Security Essentials: Applications and Standards; William Stallings;
Prentice Hall, 2000.
-
Personal Encryption Clearly Explained; Pete Loshin; AP Professional, 1998.
-
Practical Computer Network Security; Mike Hendry; Artech House, 1995.
-
The Practical Intrusion Detection Handbook; Paul E. Proctor; Prentice Hall,
2000.
-
Practical Unix & Internet Security, Second Edition; Simson Garfinkel and
Gene Spafford; O'Reilly & Associates, 1996.
-
Practical Unix & Internet Security, Third Edition; Simson Garfinkel, Gene
Spafford, and Alan Schwartz; O'Reilly & Associates, 2003.
-
Privacy on the Line: The Politics of Wiretapping and Encryption; Whitfield
Diffie and Susand Landau; The MIT Press, 1998.
-
Protecting Networks with SATAN; Martin Freiss; O'Reilly & Associates, 1998.
-
Secrets and Lies: Digital Security in a Networked World; Bruce Schneier;
John Wiley & Sons, 2000.
-
Secure Computing: Threats and Safeguards; Rita C. Summers; McGraw-Hill, 1997.
-
Securing the Network from Malicious Code: A Complete Guide to Defending
Against Viruses, Worms, and Trojans; Douglas Schweitzer; Wiley Publishing,
2002.
-
Security for Computer Networks; D.W. Davies and W.L. Price; John Wiley
& Sons, 1984.
-
Security in Computing; Charles P. Pfleeger; Prentice Hall, 1989.
-
Security in Computing, Second Edition; Charles P. Pfleeger;
Prentice Hall, 1997.
-
Security in Computing, Third Edition; Charles P. Pfleeger and Shari Lawerence
Pfleeger; Prentice Hall, 2003.
-
Security in Distributed Computing: Did You Lock the Door?; Glen Bruce and
Rob Dempsey; Hewlett Packard Company/Prentice Hall, 1997.
-
Security Engineering: A Guide to Building Dependable Distributed Systems;
Ross Anderson; John Wiley & Sons, 2001.
-
The Twofish Encryption Algorithm: A 128-Bit Block Cipher; Bruce Schneier,
John Kelsey, Doug Whiting, David Wagner, Chris Hall, and Neils Ferguson;
John Wiley & Sons, 1999.
-
The Underground Guide to Computer Security; Michael Alexander;
Addison-Wesley, 1996.
-
Understanding Digital Signatures: Establishing Trust Over the Internet and
Other Networks; Gail Grant; McGraw-Hill, 1997.
-
Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment
Considerations; Carlisle Adams and Steve Lloyd; Macmillan Technical
Publishing, 1999.
-
Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment
Considerations; Carlisle Adams and Steve Llloyd; New Riders Publishing,
1999.
-
Understanding PKI: Concepts, Standards, and Deployment Considerations,
Second Edition; Carlisle Adams and Steve Lloyd; Addison-Wesley, 2002.
-
Web Security: A Step-by-Step Reference Guide; Lincoln D. Stein;
Addison-Wesley, 1998.
-
Web Security & Commerce; Simson Garfinkel with Gene Spafford;
O'Reilly & Associates, 1997.
-
Web Security, Privacy & Commerce, Second Edition; Simson Garfinkel with
Gene Spafford; O'Reilly & Associates, 2001.
-
Writing Secure Code, Second Edition; Michael Howard and David LeBlanc;
Microsoft Press, 2002.
Periodical Articles and Conference Papers
-
"Cryptography and Computer Privacy", SA May 1973.
-
"A Critique of the Proposed Data Encryption Standard", CACM 19:3 Mar 1976
pgs 164-165.
-
"New Directions in Cryptography",
IEEE Transactions on Information Theory IT-22:6 Nov 1976 pgs 644-654.
-
"Exhaustive Cryptanalysis of the NBS Data Encryption Standard",
IEEE Computer 10:6 Jun 1977 pgs 74-84.
-
"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems",
CACM 21:2 Feb 1978 pgs 120-126.
-
"Hiding Information and Receipts in Trap Door Knapsacks",
IEEE Transactions on Information Theory IT-24:5 Sep 1978 pgs 525-530.
-
"Unclassified Summary: Involvement of NSA in the Development of the
Data Encryption Standard", United States Senate Select Committee on
Intelligence, reprinted in the IEEE Communications Society Magazine
16:6 Nov 1978 pgs 53-55.
-
"An Overview of Public-Key Cryptography", ITC 16:6 Nov 1978 pgs 24-32.
-
"Privacy and Authentication: An Introduction to Cryptography",
PIEEE 67:3 Mar 1979 pgs 397-427.
-
"The Mathematics of Public-Key Cryptography", SA 241:2 Aug 1979 pgs 146-157.
-
"Recent Results in Public-Key Cryptography", M. Willett NEC'79.
-
"Cryptology Goes Public", ICM Mar 1980 pgs 19-28.
-
"New Code Is Broken: An Israeli Mathematician Found a Way to Break the
Trapdoor Knapsack Code - One of the Public Key Cryptosystems", Science
216:28 May 1982 pgs 971-972.
-
"Opening the 'Trapdoor Knapsack'", Time Oct 25 1982 pg 88.
-
"Encryption Surge Fails to Materialize; Chip Makers Await Algorithm
Shakeout", EDN Aug 18 1983 pgs 83-85.
-
"The Data Encryption Standard", TNAE 17:9 Sep 1983 pgs 77-83.
-
"A Microprocessor-Based Cryptoprocessor", Christian Muller-Schloer,
IEEE Micro Oct 1983 pgs 5-15.
-
"Message Authentication", ICM 23:9 Sep 1985 pgs 29-40.
-
"Commercial Encryption", IN 1:2 Apr 1987 pgs 6-10.
-
"Public Key Management for Network Security", IN 1:2 Apr 1987 pgs 11-16.
-
"Stalking the Wily Hacker", CACM 31:x 1988 pgs 484-497.
-
"An Introduction to Contemporary Cryptology", PIEEE 76:5 May 1988
533-549.
-
"The Data Encryption Standard: Past and Future", PIEEE 76:5 May 1988
550-559.
-
"The First Ten Years of Public-Key Cryptography", PIEEE 76:5 May 1988
560-577.
-
"Information Security: An Overview", ATTJ 67:3 May/Jun 1988 pgs 2-8.
-
"Security Standards - Government and Commercial", ATTJ 67:3 May/Jun 1988
pgs 9-18.
-
"Safe and Secure?", BYTE 14:5 May 1989 pgs 253-258.
-
"How Safe Is It?", BYTE 14:6 Jun 1989 pgs 257-264.
-
"Secret Codes", BYTE 14:6 Jun 1989 pgs 267-270.
-
"Personal and Private", BYTE 14:6 Jun 1989 pgs 285-288.
-
"E-Mail Privacy for the Internet", BCR 20:1 Jan 1990 pgs 55-58.
-
"Threats to Your Data", PCM 9:3 Feb 13 1990 pgs 264-265.
-
"Data and Program Defense Mechanisms", PCM 9:3 Feb 13 1990 pg 267.
-
"Novel Applications of Cryptography in Digital Communications", ICM
28:5 May 1990 pgs 21-29.
-
"Cloak and Data", BYTE 15:6 Jun 1990 pgs 311-324.
-
"True Data", BYTE 16:9 Sep 1991 pgs 122-128.
-
"Who Holds the Keys?", CACM 35:7 Jul 1992 pgs 13-15.
-
"Decrypting the Puzzle Palace", CACM 35:7 Jul 1992 pgs 25-31.
-
"Debating Encryption Standards", CACM 35:7 Jul 1992 pgs 32-34.
-
"The Digital Signature Standard Proposed by NIST", CACM 35:7 Jul 1992 pgs
36-40.
-
"Responses to NIST's Proposal", CACM 35:7 Jul 1992 pgs 41-54.
-
"Public-Key Cryptography and Open Systems Interconnection", ICM 30:7
Jul 1992 pgs 30-35.
-
"Cryptography = privacy?", IEEE Spectrum Aug 1992 pgs 29-35.
-
"Digital Signatures", BYTE 18:12 Nov 1993 pgs 309-312.
-
"Wire Pirates", SA 270:3 Mar 1994 pgs 90-101.
-
"Security in Electronic Messaging Systems", ATTJ 73:3 May/Jun 1994 pgs
7-13.
-
"How to Keep It a Secret", PCM 13:13 Jul 1994 pgs 315-322.
-
"Crypto Policy Perspectives", CACM 37:8 Aug 1994 pgs 115-121.
-
"Kerberos: An Authentication Service for Computer Networks",
ICM 32:9 Sep 1994 pgs 33-38.
-
"Access Control: Principles and Practice",
ICM 32:9 Sep 1994 pgs 40-48.
-
"Key Escrowing Today",
ICM 32:9 Sep 1994 pgs 58-68.
-
"Toward a National Public Key Infrastructure",
ICM 32:9 Sep 1994 pgs 70-74.
-
"Digital Signatures: Are They Legal for Electronic Commerce?",
ICM 32:9 Sep 1994 pgs 76-80.
-
"Securing a Global Village and Its Resources",
ICM 32:9 Sep 1994 pgs 82-89.
-
"Public Key Cryptography", ATTJ 73:5 Sep/Oct 1994 pgs 17-23.
-
"How Secure Is Encrypted Data?", PCM 13:18 Oct 25 1994 pgs 291-293.
-
"Secure Distributed Computing", SA 271:5 Nov 1994 pgs 72-76.
-
"The Role of Cryptography in Network Security", BCR 25:9 Sep 1995
pgs 67-72.
-
"SATAN and Courtney: A Devil of a Team", PCM 14:16 Sep 26 1995 pgs 265-266.
-
"Picking the Crypto Locks", BYTE 20:10 Oct 1995 pgs 77-80.
-
"How To Use Key Escrow"
CACM 39:3 Mar 1996 pgs 32-33.
-
"A Taxonomy for Key Escrow Encryption Systems",
CACM 39:3 Mar 1996 pgs 34-40.
-
"Commercial Key Recovery",
CACM 39:3 Mar 1996 pgs 41-47.
-
"Crypto Backup and Key Escrow",
CACM 39:3 Mar 1996 pgs 48-53.
-
"The Yaksha Security System",
CACM 39:3 Mar 1996 pgs 55-60.
-
"Internet Security: How Much Is Enough?", DC Apr 1996 pgs 60-72.
-
"Digital Signatures: How They Work", PCM 15:7 Apr 9 1996 pgs 237-244.
-
"Don't Loose Your Crypto Keys", BYTE May 1996.
-
"Public-Key Security Systems", IEEE Micro 16:3 Jun 1996 pgs 10-13.
-
"Securing the Commercial Internet", CACM 39:6 Jun 1996 pgs 29-35.
-
"Entrust: The Key to Corporate Data Security", Telesis Issue 101
Sep 1996 pgs 42-54.
-
"Protecting Your Data With Cryptography", UR 14:12 Nov 1996 pgs 55-61.
-
"The Changing Environment for Security Protocols", IN 11:3 May/Jun 1997
pgs 12-15.
-
"Who Goes There?", BYTE 22:6 Jun 1997 pgs 70-80.
-
"Security in Data Networks", BTTJ 16:1 Jan 1998 pgs 52-75.
-
"Internet Security Standards", PCM 17:2 Jan 20 1998 pgs 241-242.
-
"Can't Say No: Denial-of-Service Attacks", PCM 17:8 Apr 21 1998 pgs 203-204.
-
"Making E-Mail Secure", PCM 17:15 Sep 1 1998 pgs 263-268.
-
"How Hackers Break In... and How They Are Caught",
SA 279:4 Oct 1998 pgs 98-105.
-
"How Computer Security Works", SA 279:4 Oct 1998 pgs 106-109.
-
"Cryptography for the Internet",
SA 279:4 Oct 1998 pgs 110-115.
-
"The Case Against Regulating Encryption Technology",
SA 279:4 Oct 1998 pgs 116-117.
-
"Internet Privacy", CACM 42:2 Feb 1999 pgs 28-31.
-
"Certificates, Keys, and Security", PCM 18:8 Apr 20 1999 pgs 227-230.
-
"AAA Protocols: Authentication, Authorization, and Accounting for the
Internet", IIC 3:6 Nov/Dec 1999 pgs 75-79.
-
"Encryption Wars: Early Battles", IEEE Spectrum 37:4 Apr 2000 pgs 37-43.
-
"Protect & Defend", PCM 19:12 Jun 27 2000 pgs 168-171.
-
"Sign on the Digital Line" (product reviews), PCM 19:16 Sep 19 2000 pgs
32-36.
-
"No Longer in Denial", IEEE Spectrum 38:1 Jan 2001 pgs 59-61.
-
"Electronic Signatures", PCM 20:1 Jun 2 2001 pgs 102-105.
-
"Intrusion Detection: A Brief History and Overview", IEEE Computer 35:4
Apr 2002 pgs 27-30.
-
"PKI: It's Not Dead, Just Resting", IEEE Computer 35:8 Aug 2002 pgs 41-49.