| |
The following is a list of potentially useful books and web sites related to
Security and Cryptography. It is not intended to be in any way a complete
or exhaustive list.
Books
- Bishop, David, Introduction to Cryptography with Java Applets,
published by Jones and Bartlett.
- Bishop, Matt, Computer Security: Art and Science, published
by Addison-Wesley
- Ferguson, Niels; Schneier, Bruce, Practical Cryptography,
published by Wiley
- Gaines, Helen, Cryptanalysis, published by Dover
- Gardner, Martin, Codes, Ciphers and Secret Writing,
published by Dover
- Garfinkel, Simson, Web Security, Privacy & Commerce,
published by O'Reilly & Associates
- Gong, Li, Inside Java 2 Platform Security: Architecture, API Design,
and Implementation, published by Addison-Wesley
- Kahn, David, The Codebreakers: The Story of Secret Writing,
published by Scribner
- Kaufman, Charlie; Perlman, Radia; Speciner, Mike, Network Security:
Private Communications in a Public World, Second Edition, published
by Prentice-Hall
- Levy, Steven, Crypto: How the Code Rebels Beat the
Government Saving Privacy in the Digital Age, published by Penguin
Putnam
- Levy, Steven, Hackers: Heroes of the Computer
Revolution, published by Penguin
- Menezes, Alfred J; Van Oorschot, Paul C; Vanstone,
Scott A, Handbook of Applied Cryptography,
published by CRC Press. (Freely downloadable
copy available at http://www.cacr.math.uwaterloo.ca/hac/
)
- Mitnick, Kevin D.; Simon, William L., The Art of
Deception : Controlling the Human Element of Security, published by
Wiley
- Schneier, Bruce, Applied Cryptography: Protocols, Algorithms, and
Source Code in C, published by Wiley
- Schneier, Bruce, Secrets and Lies: Digital Security in a Networked
World, published by Wiley
- Singh, Simon, The Code Book: The Science of Secrecy
from Ancient Egypt to Quantum Cryptography, published by Anchor
- Skoudis, Ed, Counter Hack: A Step-by-Step Guide to Computer Attacks
and Effective Defenses, Prentice-Hall PTR
- Skoudis, Ed, Malware: Fighting Malicious Code, published by
Prentice-Hall PTR
- Stallings, William, Cryptography and Network Security: Principles
and Practices, published by Prentice-Hall
- Stallings, William, Network Security Essentials: Applications and
Standards, Second Edition, published by Prentice-Hall.
- Stevenson, William, A Man Called Intrepid, published by The
Lyons Press
- Stoll, Clifford, The Cuckoo's Egg: Tracking a Spy Through the Maze
of Computer Espionage, published by Pocket Books
- Winterbotham, F. W., The Ultra Secret, published by Bantam
Doubleday Dell.
Web Sites
The following web sites are in no particular order.
There are lots and lots of other web sites relating to Security!
|