Module 6: Security (Supplement)
|
[Deutsch] |
| Books | Articles | Journals | Links
| Hands-On: Experiments (for Resources in German click on "Deutsch") |
|
Books
|
- Amorosa, E. (1994): Fundamentals of Computer Security Technology. Englewood Cliffs (NJ): Prentice-Hall.
- Anderson, Ross (2001): Security Engineering. A Guide to
Building Dependable Distributed Systems. New York: Wiley.
- Barken, Lee (2004): Hands-on Wireless LAN Security: Wi-Fi
Protected Access and 802.11i. Amsterdam: Addison Wesley Longman.
- Barett, Daniel J.; Silverman, Richard E. (2002): SSH: The Secure
Shell. London: O'Reilly.
- Castano, S.; Fugini, M.; Martella, G.; Samarati, P. (1995):
Database Security. Wokingham (UK): Addison-Wesley.
- Cheswick, W.R.; Bellovin,S.M. (1994): Firewalls and Internet Security.
Reading (MA):
Addison-Wesley.
- Cranor, Lorrie F. (2002): Web Privacy with P3P. London: O'Reilly.
- Denning, D. (1982): Cryptography and Data Security.
Wokingham (UK): Addison Wesley.
- Diffie, Whitfield; Landau, Susan (1998): Privacy on the Line. The Politics of
Wiretapping and Encryption. Cambridge (MA): MIT Press.
- Garfinkel, Simson (1995): PGP: Pretty Good Privacy. London:
O'Reilly.
- Garfinkel,
Simson; Spafford, Gene (1996): Practical UNIX and Internet Security.
O'Reilly.
- Garfinkel,
Simson; Spafford, Gene (1997): Web Security and eCommerce.
O'Reilly.
- Garfinkel, Simson (2000): Database Nation. The death of privacy in the 21st
century.
O'Reilly, 2000, ISBN 1-56592-653-6, 312 S.
- Ghosh, Sumit (2002): Principles of Secure Network System
Design. Berlin: Springer
- Held, Gilbert (2001): Data Over Wireless Networks: Bluetooth,
WAP, and Wireless LANs .London: McGraw-Hill / Osborne.
- Hodges, Andrew (1994): Alan Turing, Enigma.
Wien, New York: Springer.
- Holzmann, Jörg; Plate, Jürgen (2002): Linux-Server für Intranet und
Internet Den Server einrichten und administrieren. München: Hanser.
Kaufman, Charlie; Perlman, Radia; Speciner, Mike (2002): Network Security.
PRIVATE Communication in a PUBLIC World. Englewood Cliffs: Prentice Hall.
Lindskog, Helena; Lindskog, Stefan (2003): Web Site
Privacy with P3P. New York: Wiley.
- Menezes,
Alfred J.; van Oorschot, Paul C.; Vanstone, Scott A. (1996): Handbook of
Applied Cryptography. CRC Press Online:
http://cacr.math.uwaterloo.ca/hac/
- Neumann, P.G. (1995): Computer Related Risks. Reading (MA): Addison-Wesley.
-
Oppliger, Rolf (1996): Authentication Systems for Secure Networks.
Norwood (MA): Artech House Publishers.
-
Oppliger, Rolf (1999): Internet and Intranet Security.
Norwood (MA): Artech.
- Oppliger, Rolf (2002): Internet and Intranet Security. 2nd Ed.
Norwood (MA): Artech.
- Oppliger, Rolf (2000): Secure Messages with PGP and S/MIME. Norwood
(MA): Artech.
-
- Pfleeger, C.P. (1997): Security in Computing. Second Edition).
Englewood Cliffs (NJ): Prentice-Hall.
- Raymond, Eric S (1997):
The New Hacker's Dictionary.
Cambridge (MA): MIT Press.
- Rescorla, Eric (2000): SSL and TLS. Wokingham (UK):
Addison-Wesley.
- Schneier, B. (1996): Applied Cryptography. Second Edition. New York:
Wiley.
- Stallings, William (1999): Network and Internetwork Security:
Principles and Practice. Englewood Cliffs (NJ):
Prentice Hall.
- Schneier, Bruce (2000): Secrets & Lies: Digital Security in a Networked World.
New York: Wiley.
- Schneier, Bruce (2003): Beyond Fear: Thinking Sensibly About
Security in an Uncertain World. New York: Copernicus Books.
- Thomas, Stephen A. (2000): SSL and TLS Essentials. New
York: Wiley.
- Viega, John; Messier, Matt; Chandra, Pravier (2002): Network
Security with OpenSSL. London: O'Reilly.
|
| Articles |

|
- Borisov, N.; Goldberg, I.; Wagner, D.: Intercepting Mobile
Communications: The Insecurity of 802.11. Seventh Annual International
Conference on Mobile Computing And Networking, 16./21. Juli 2001,
verfügbar unter www.isaac.cs.berkeley. edu/isaac/mobicom.pdf
- Chaum, David (1985): Security without identification: Transaction
systems to make Big Brother obsolete. Communications of the ACM, 28,
1030-1044. http://www.digicash.com/news/archive/bigbro.html
- Cockburn, C.; Wilson, T. D. (1996): Business Use of the World-Wide Web. International Journal of Information Management, 16, 2,
83-102.
- Flohrs, Udo (1996): Electronic Money. Byte 6/96, 74-84.
- Lai, X.; Massey J.L. (1991): A Proposal for a New Block
Encryption Standard. Proceedings of Eurocrypt '90, Nr. 473 LNCS,
389-404.
- Oppliger, R. (1997): Internet Security: Firewalls and Beyond. Communications of
the ACM, Vol. 30, No. 5, May 97, 92-102.
-
R. Oppliger, R. (1998): Security at the Internet Layer. IEEE Computer Magazine, Vol.
31, No. 9, September 98, 43-47.
-
Rivest, R. L., Shamir, A. und Adleman, L. M. (1978): RSA: A
Method for obtaining Digital Signatures and Public Key Cryptosystems,
Communications of the ACM, 21(2), 120-126
-
Spam!
Lorrie Faith Cranor, Brian A. LaMacchia
August 1998 Communications of the ACM, Volume 41 Issue 8, 74-83.
|
|
| Journals |

|
|
|
|
| Links |

|
- W3C >
The World
Wide Web Security FAQ
|

|
|
|
|