TECHTEAM SHUT THE WINDOWS OF THE PAST

Saturday, September 20, 2008

Computer and Information Security

Cryptography Books

1. Security+ Essentials ©2008 (Neil Smyth)

2. Security Engineering: A Guide to Building Dependable Distributed Systems ©2008 (Ross J. Anderson)

3. The eveloper Highway Code ©2006 (Paul Maher/Alex Mackman) 142 pages

4. Forensic Discovery ©2005 (Dan Farmer/Wietse Venema) 240 pages [Homepage] [Wietse Venem]

5. Introduction to Computer Security: The NIST Handbook ©1995-2006 (NIST) [PDF]

6. Firewalls & VPN's: Firewalls Complete ©2002 (Marcus Goncalves) [1997 Edition]

7. Safeguarding Your Technology - Practical Guidelines for Electronic Education Information Security (Tom Szuba)

8. Security Engineering - A Guide to Building Dependable Distributed Systems ©2001 (Ross Anderson)

9. Open Source Security Tools: Pratical Applications for Security, 600 pages, ©2005 (Tony Howlett)

10. Handbook of Information Security Management (Micki Krause/Harold F. Tipton) [Mirror] [Mirror] [Mirror]

11. The Protection of Information in Computer Systems (J.H. Saltzer and M.D. Schroeder)

12. The Open Source PKI Book, by Symeon (Simos) Xenitellis [Mirror] [Mirror] [Mirror]

13. Maximum Security: A Hackers' Guide to Protecting Your Internet Site and Network [Mirror] [Mirror]

14. Intrusion Detection Systems with Snort: Advanced IDS with Snort, Apache, MySQL, PHP, and ACID [Mirror]

15. Building Secure ASP.NET Applications: Authentication, Authorization, and Secure Communication

16. The .NET Developer's Guide to Windows Security ©2004 (Keith Brown) 408 pages

17. O'Reilly® Building Internet Firewalls (D.B, Chapman/E.D. Zwicky) [Mirror] [Mirror] [Mirror] [Mirror] [Mirror] [Mirror]

18. Making Strategy: National Security Processes and Problems ©2002 (Dennis Drew/Donald Snow)

19. Spam Fighting and Email Security for the 21st Century

20. IT Security Cookbook ©1996-2003 (Sean Boran)

21. Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information

22. Adjusting to a New Security Environment: The Defense Technology and Industrial Base Challenge

23. Building Future Security: Strategies for Restructuring the Defense Technology and Industrial Base

1 comment:

help said...

memphis escorts To the world you may be one person, but to one person you may be the world.