IT/Informatics - IN - Module 6: Security
Home ] Information Technology IT ] Informatics IK ] Internet IN ] < To the Table of Contents
IN - Module 1: Basic Concepts ] IN - Module 2: Access ] IN - Module 3: Services ] IN - Module 4: Languages ] IN - Module 5: Semantics ] [ IN - Module 6: Security ]

Module 6: Security (Supplement)

[Deutsch]

Books | Articles | Journals | Links | Hands-On: Experiments (for Resources in German click on "Deutsch")
Search Now:
 
In Association with Amazon.co.uk

Search Now:
 
In Association with Amazon.com  
 

Books

  1. Amorosa, E. (1994): Fundamentals of Computer Security Technology. Englewood Cliffs (NJ): Prentice-Hall.
  2. Anderson, Ross (2001): Security Engineering. A Guide to Building Dependable Distributed Systems. New York: Wiley.
  3. Barken, Lee (2004): Hands-on Wireless LAN Security: Wi-Fi Protected Access and 802.11i. Amsterdam: Addison Wesley Longman.
  4. Barett, Daniel J.; Silverman, Richard E. (2002): SSH: The Secure Shell. London: O'Reilly.
  5. Castano, S.; Fugini, M.; Martella, G.; Samarati, P. (1995): Database Security. Wokingham (UK): Addison-Wesley.
  6. Cheswick, W.R.; Bellovin,S.M. (1994): Firewalls and Internet Security. Reading (MA): Addison-Wesley.
  7. Cranor, Lorrie F. (2002): Web Privacy with P3P. London: O'Reilly.
  8. Denning, D. (1982): Cryptography and Data Security. Wokingham (UK): Addison Wesley.
  9. Diffie, Whitfield; Landau, Susan (1998): Privacy on the Line. The Politics of Wiretapping and Encryption. Cambridge (MA): MIT Press.
  10. Garfinkel, Simson (1995): PGP: Pretty Good Privacy. London: O'Reilly.
  11. Garfinkel, Simson;  Spafford, Gene (1996): Practical UNIX and Internet Security. O'Reilly.
  12. Garfinkel, Simson;  Spafford, Gene (1997): Web Security and eCommerce. O'Reilly.
  13. Garfinkel, Simson (2000): Database Nation. The death of privacy in the 21st century. O'Reilly, 2000, ISBN 1-56592-653-6, 312 S.
  14. Ghosh, Sumit (2002): Principles of Secure Network System Design. Berlin: Springer
  15. Held, Gilbert (2001): Data Over Wireless Networks: Bluetooth, WAP, and Wireless LANs .London:  McGraw-Hill / Osborne.
  16. Hodges, Andrew (1994): Alan Turing, Enigma. Wien, New York: Springer.
  17. Holzmann, Jörg; Plate, Jürgen (2002): Linux-Server für Intranet und Internet Den Server einrichten und administrieren. München: Hanser.
  18. Kaufman, Charlie; Perlman, Radia; Speciner, Mike (2002): Network Security. PRIVATE Communication in a PUBLIC World. Englewood Cliffs: Prentice Hall.

  19. Lindskog, Helena; Lindskog, Stefan (2003): Web Site Privacy with P3P. New York: Wiley.

  20. Menezes, Alfred J.; van Oorschot, Paul C.; Vanstone, Scott A. (1996): Handbook of Applied Cryptography. CRC Press Online: http://cacr.math.uwaterloo.ca/hac/
  21. Neumann, P.G. (1995): Computer Related Risks. Reading (MA): Addison-Wesley.
  22. Oppliger, Rolf (1996): Authentication Systems for Secure Networks. Norwood (MA): Artech House Publishers.
  23. Oppliger, Rolf (1999): Internet and Intranet Security. Norwood (MA): Artech.
  24. Oppliger, Rolf (2002): Internet and Intranet Security. 2nd Ed. Norwood (MA): Artech.
  25. Oppliger, Rolf (2000): Secure Messages with PGP and S/MIME. Norwood (MA): Artech.
  26.  
  27. Pfleeger, C.P. (1997): Security in Computing. Second Edition).  Englewood Cliffs (NJ): Prentice-Hall.
  28. Raymond, Eric S (1997): The New Hacker's Dictionary. Cambridge (MA): MIT Press.
  29. Rescorla, Eric (2000): SSL and TLS. Wokingham (UK): Addison-Wesley.
  30. Schneier, B. (1996): Applied Cryptography. Second Edition. New York: Wiley.
  31. Stallings, William (1999):  Network and Internetwork Security: Principles and Practice. Englewood Cliffs (NJ): Prentice Hall. 
  32. Schneier, Bruce (2000): Secrets & Lies: Digital Security in a Networked World. New York: Wiley.
  33. Schneier, Bruce (2003): Beyond Fear: Thinking Sensibly About Security in an Uncertain World. New York: Copernicus Books.
  34. Thomas, Stephen A. (2000): SSL and TLS Essentials. New York: Wiley.
  35. Viega, John; Messier, Matt; Chandra, Pravier (2002): Network Security with OpenSSL. London: O'Reilly.
Articles

  1. Borisov, N.; Goldberg, I.; Wagner, D.: Intercepting Mobile Communications: The Insecurity of 802.11. Seventh Annual International Conference on Mobile Computing And Networking, 16./21. Juli 2001, verfügbar unter www.isaac.cs.berkeley. edu/isaac/mobicom.pdf
  2. Chaum, David (1985): Security without identification: Transaction systems to make Big Brother obsolete. Communications of the ACM, 28, 1030-1044. http://www.digicash.com/news/archive/bigbro.html
  3. Cockburn, C.; Wilson, T. D. (1996): Business Use of the World-Wide Web. International Journal of Information Management, 16, 2, 83-102.
  4. Flohrs, Udo (1996): Electronic Money. Byte 6/96, 74-84.
  5. Lai, X.;  Massey J.L. (1991): A Proposal for a New Block Encryption Standard. Proceedings of Eurocrypt '90, Nr. 473 LNCS, 389-404.
  6. Oppliger, R. (1997): Internet Security: Firewalls and Beyond. Communications of the ACM, Vol. 30, No. 5, May 97, 92-102.
  7. R. Oppliger, R. (1998): Security at the Internet Layer. IEEE Computer Magazine, Vol. 31, No. 9, September 98,  43-47.
  8. Rivest, R. L., Shamir, A. und Adleman, L. M. (1978):  RSA: A Method for obtaining Digital Signatures and Public Key Cryptosystems, Communications of the ACM,  21(2), 120-126
  9. Spam!
    Lorrie Faith Cranor, Brian A. LaMacchia
    August 1998 Communications of the ACM, Volume 41 Issue 8, 74-83.
Journals

 
Links

  1. W3C > The World Wide Web Security FAQ

 

 
© Dr.Andreas Holzinger | andreas.holzinger@uni-graz.at

 

Last changed: 24.12.01

Thank you for your kind interest and patience.