Information Security References
From Computing and Software Wiki
Line 1: | Line 1: | ||
The following are a list of references from the Information/Computer/Network Security world. | The following are a list of references from the Information/Computer/Network Security world. | ||
- | BOOKS | + | ''' |
+ | == BOOKS == | ||
+ | ''' | ||
1. Network Security Essentials: Applications and Standards, William Stallings | 1. Network Security Essentials: Applications and Standards, William Stallings | ||
Line 15: | Line 17: | ||
5. Computer Security: Art and Science, Matt Bishop | 5. Computer Security: Art and Science, Matt Bishop | ||
- | PAPERS | + | '''PAPERS''' |
1. http://www.crypt.gen.nz/papers/ : Various Computer and Information Security topics | 1. http://www.crypt.gen.nz/papers/ : Various Computer and Information Security topics | ||
Line 21: | Line 23: | ||
2. http://ise.gmu.edu/~csis/history/ : Early Computer Security Papers | 2. http://ise.gmu.edu/~csis/history/ : Early Computer Security Papers | ||
- | WEB DOCUMENTS AND SITES | + | '''WEB DOCUMENTS AND SITES''' |
1. http://www.csee.umbc.edu/~eziegl1/compusec.html | 1. http://www.csee.umbc.edu/~eziegl1/compusec.html |
Revision as of 16:48, 10 October 2007
The following are a list of references from the Information/Computer/Network Security world.
BOOKS
1. Network Security Essentials: Applications and Standards, William Stallings Preview available at: http://books.google.ca/
2. An Information Security Handbook, John M. D. Hunter Preview available at: http://books.google.ca/
3. Cryptography and Network Security, William Stallings
4. Computer Security, 2nd Edition, Dieter Gollmann
5. Computer Security: Art and Science, Matt Bishop
PAPERS
1. http://www.crypt.gen.nz/papers/ : Various Computer and Information Security topics
2. http://ise.gmu.edu/~csis/history/ : Early Computer Security Papers
WEB DOCUMENTS AND SITES
1. http://www.csee.umbc.edu/~eziegl1/compusec.html A list of sites that pertain various aspects of computer and network security. Sites listed include security protocols, cryptography, information warfare, exploitation, security standards, firewalls, computer viruses, and more.
2. http://www.securitydocs.com/: Network Security White Papers