Bibliography

Home ] Topics ] Assignments ] [ Bibliography ] Short Stories ] Browser JDK ] Useful Tools ] False Positives ] Microsoft Equation ] Course Slides ]

 

The following is a list of potentially useful books and web sites related to Security and Cryptography.  It is not intended to be in any way a complete or exhaustive list.

Books

  • Bishop, David, Introduction to Cryptography with Java Applets, published by Jones and Bartlett.
  • Bishop, Matt, Computer Security: Art and Science, published by Addison-Wesley
  • Ferguson, Niels; Schneier, Bruce, Practical Cryptography, published by Wiley
  • Gaines, Helen, Cryptanalysis, published by Dover
  • Gardner, Martin, Codes, Ciphers and Secret Writing, published by Dover
  • Garfinkel, Simson, Web Security, Privacy & Commerce, published by O'Reilly & Associates
  • Gong, Li, Inside Java 2 Platform Security: Architecture, API Design, and Implementation, published by Addison-Wesley
  • Kahn, David, The Codebreakers: The Story of Secret Writing, published by Scribner
  • Kaufman, Charlie; Perlman, Radia; Speciner, Mike, Network Security: Private Communications in a Public World, Second Edition, published by Prentice-Hall
  • Levy, Steven, Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age, published by Penguin Putnam
  • Levy, Steven, Hackers: Heroes of the Computer Revolution, published by Penguin
  • Menezes, Alfred J; Van Oorschot, Paul C; Vanstone, Scott A, Handbook of Applied Cryptography, published by CRC Press.  (Freely downloadable copy available at http://www.cacr.math.uwaterloo.ca/hac/ )
  • Mitnick, Kevin D.; Simon, William L., The Art of Deception : Controlling the Human Element of Security, published by Wiley
  • Schneier, Bruce, Applied Cryptography: Protocols, Algorithms, and Source Code in C, published by Wiley
  • Schneier, Bruce, Secrets and Lies: Digital Security in a Networked World, published by Wiley
  • Singh, Simon, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, published by Anchor
  • Skoudis, Ed, Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses, Prentice-Hall PTR
  • Skoudis, Ed, Malware: Fighting Malicious Code, published by Prentice-Hall PTR
  • Stallings, William, Cryptography and Network Security: Principles and Practices, published by Prentice-Hall
  • Stallings, William, Network Security Essentials: Applications and Standards, Second Edition, published by Prentice-Hall.
  • Stevenson, William, A Man Called Intrepid, published by The Lyons Press
  • Stoll, Clifford, The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage, published by Pocket Books
  • Winterbotham, F. W., The Ultra Secret, published by Bantam Doubleday Dell.

Web Sites

The following web sites are in no particular order.

There are lots and lots of other web sites relating to Security!

This page was last changed on January 21, 2008