Information Security References
From Computing and Software Wiki
| Line 1: | Line 1: | ||
The following are a list of references from the Information/Computer/Network Security world. | The following are a list of references from the Information/Computer/Network Security world. | ||
| - | BOOKS | + | ''' |
| + | == BOOKS == | ||
| + | ''' | ||
1. Network Security Essentials: Applications and Standards, William Stallings | 1. Network Security Essentials: Applications and Standards, William Stallings | ||
| Line 15: | Line 17: | ||
5. Computer Security: Art and Science, Matt Bishop | 5. Computer Security: Art and Science, Matt Bishop | ||
| - | PAPERS | + | '''PAPERS''' |
1. http://www.crypt.gen.nz/papers/ : Various Computer and Information Security topics | 1. http://www.crypt.gen.nz/papers/ : Various Computer and Information Security topics | ||
| Line 21: | Line 23: | ||
2. http://ise.gmu.edu/~csis/history/ : Early Computer Security Papers | 2. http://ise.gmu.edu/~csis/history/ : Early Computer Security Papers | ||
| - | WEB DOCUMENTS AND SITES | + | '''WEB DOCUMENTS AND SITES''' |
1. http://www.csee.umbc.edu/~eziegl1/compusec.html | 1. http://www.csee.umbc.edu/~eziegl1/compusec.html | ||
Revision as of 16:48, 10 October 2007
The following are a list of references from the Information/Computer/Network Security world.
BOOKS
1. Network Security Essentials: Applications and Standards, William Stallings Preview available at: http://books.google.ca/
2. An Information Security Handbook, John M. D. Hunter Preview available at: http://books.google.ca/
3. Cryptography and Network Security, William Stallings
4. Computer Security, 2nd Edition, Dieter Gollmann
5. Computer Security: Art and Science, Matt Bishop
PAPERS
1. http://www.crypt.gen.nz/papers/ : Various Computer and Information Security topics
2. http://ise.gmu.edu/~csis/history/ : Early Computer Security Papers
WEB DOCUMENTS AND SITES
1. http://www.csee.umbc.edu/~eziegl1/compusec.html A list of sites that pertain various aspects of computer and network security. Sites listed include security protocols, cryptography, information warfare, exploitation, security standards, firewalls, computer viruses, and more.
2. http://www.securitydocs.com/: Network Security White Papers
