Team LiB   Previous Section   Next Section

General Security Information

Abrams, Marshall D.; Podell, Harold J.; and Jajodia, Sushil. Information Security: An Integrated Collection of Essays. Los Alamitos, CA: IEEE Computer Society Press, 1995.

Allen, Julia et al. "Improving the Security of Networked Systems." Crosstalk: The Journal of Defense Software Engineering 13, 10 (October 2000). Available online: <http://www.stsc.hill.af.mil/crosstalk/>.

Ahuja, Vijay. Network and Internet Security. Boston, MA: AP Professional, 1996.

Atkinson, Randall J. "Toward a More Secure Internet." IEEE Computer 30, 1 (January 1997): 57–61.

Barrett, Daniel J. Bandits on the Information Superhighway. Sebastopol, CA: O'Reilly and Associates, 1996.

Bosselaers, Antoon and Preneel, Bart. "Integrity Primitives for Secure Information Systems: Final Report of RACE Integrity Primitives Evaluation RIPE-RACE 1040." Lecture Notes in Computer Science: 1007. Berlin: Springer, 1995.

Caelli, William; Longley, Dennis; and Shain, Michael. Information Security Handbook. New York: Stockton Press, 1991.

Cohen, Frederick B. Protection and Security on the Information Superhighway. New York: Wiley, 1995.

Comer, Douglas E. Internetworking with TCP/IP, Volume 1: Principles, Protocols, and Architecture. Third edition. New York: Prentice-Hall, 1995.

Computer Security Institute. "2000 CSI/FBI Computer Crime and Security Survey." Computer Security Issues and Trends, vol. VI, no. 1 (spring 2000).

Davis, Peter T., ed. Securing Client/Server Computer Networks. New York: McGraw-Hill, 1996.

Dempsey, Rob and Bruce, Glen. Security in Distributed Computing. Upper Saddle River, NJ: Prentice-Hall, Inc., 1997.

Denning, P. J. and Denning, D. E. Internet Besieged: Countering Cyberspace Scofflaws. New York: Addison-Wesley, 1998.

Denning, D. E. Information Warfare and Security. New York: Addison-Wesley, 1999.

Ellis, James et al. Report to the President's Commission on Critical Infrastructure Protection. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 1997. Available online: <http://www.cert.org/pres_comm/cert.rpcci.abstract.html>. Also published as an SEI Special Report (CMU/SEI-97-SR-003, ADA 324232) Available online: <http://www.sei.cmu.edu/publications/documents/97.reports/97sr003/97sr003abstract.html>.

Ermann, D. M.; Williams, M. B.; and Shauf, M. S. Computers, Ethics, and Society. Second edition. New York: Oxford University Press, 1997.

Fites, P. E.; Kratz, M. P.; and Brebner, A. F. Control and Security of Computer Information Systems. Rockville, MD, Computer Science Press, Inc., 1989.

Ford, Warwick and Baum, Michael. Secure Electronic Commerce. New York: Prentice-Hall, 1997.

Gollmann, Dieter. Computer Security. Chichester, England: John Wiley & Sons, 1999.

Howard, John and Longstaff, Tom. A Common Language for Computer Security Incidents. (SAND98-8997). Albuquerque, NM: Sandia National Laboratories, 1998.

Hutt, Arthur E.; Bosworth, Seymour; and Hoyt, Douglas B. Computer Security Handbook. Third edition. New York: John Wiley & Sons, Inc. 1995.

Kaufman, C.; Perlman, R.; and Speciner, M. Network Security: Private Communication in a Public World. Englewood Cliffs, NJ: PTR Prentice-Hall, 1995.

Kessler, Gary C. "Web of Worries." Information Security (April 2000). Available online: <http://www.infosecuritymag.com/articles/april00/cover.shtml>.

King, Nathan. "Sweeping Changes for Modem Security." Information Security (June 2000). Available online: <http://www.infosecuritymag.com/articles/june00/features1.shtml> (2000).

Kyas, O. Internet Security, Risk Analysis, Strategies and Firewalls. Boston: Int'l Thompson, 1997.

Laswell, Barbara; Simmel, Derek; and Behrens, Sandra. Information Assurance Curriculum and Certification: State of the Practice (CMU/SEI-99-TR-021, ADA 367575). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 1999. Available online: <http://www.sei.cmu.edu/publications/documents/99.reports/99tr021/99tr021abstract.html>.

Longstaff, Thomas et al. "Security of the Internet," 231–255. The Froelich/Kent Encyclopedia of Telecommunications, vol. 15. New York: Marcel Dekker, Inc., 1997. Also available online: <http://www.cert.org/encyc_article/tocencyc.html>.

McGraw, Gary and Felten, Edward W. Java Security. New York: John Wiley and Sons, Inc., 1996.

Merkow, M. S. and Breithaupt, J. The Complete Guide to Internet Security, New York: AMACOM, American Management Association, 2000: pp. 95–109.

NIST. NIST Federal Information Processing Standards (FIPS) on Computer Security. Available online: <http://csrc.nist.gov/publications/fips/index.html> (2001).

NCSC. NCSC Glossary of Computer Security Terms. Ft. George G. Meade, MD: National Computer Security Center: Washington, DC: For sale by the Supt. of Docs., U.S. Government Printing Office, 1989.

National Research Council. Computers at Risk: Safe Computing in the Information Age. Washington DC: National Academy Press, 1991.

National Security Telecommunications and Information Systems Security Committee. Index of National Security Telecommunications Information Systems Security Issuances (NSTISSI No. 4014). Ft. Mead, MD: NSTISSC Secretariat, January 1998.

Parker, Donn B. Fighting Computer Crime. New York: John Wiley & Sons, 1998.

Pethia, Richard. Internet Security Issues: Testimony Before the U.S. Senate Judiciary Committee. Carnegie Mellon University, Software Engineering Institute, May 25, 2000. Available online: <http://www.cert.org/congressional_testimony/Pethia_testimony25May00.html>.

Pfleeger, Charles P. Security in Computing. Second edition. Upper Saddle River, NJ: Prentice-Hall, 1997.

Power, Richard. "1999 CSI/FBI Computer Crime and Security Survey." Computer Security Journal, volume XV, 2. San Francisco, CA: Computer Security Institute, 1999.

Rogers, Lawrence R. rlogin(1): The Untold Story (CMU/SEI-98-TR-017, ADA 358797). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 1998. Available online: <http://www.sei.cmu.edu/publications/documents/98.reports/98tr017/98tr017abstract.html>.

Ruiu, Dragos. Cautionary Tales: Stealth Coordinated Attack HOWTO. Available online: <http://www.nswc.navy.mil/ISSEC/CID/Stealth_Coordinated_Attack.html> (1999).

Russell, Deborah and Gemi, Sr.,G. T. Computer Security Basics. Sebastopol, CA: O'Reilly & Associates, Inc., 1991.

Sams.net Publishing. Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network. Indianapolis, IN: Sams.net Publishing, 1997.

SANS Institute. How to Eliminate the Ten Most Critical Internet Security Threats: The Experts' Consensus, Version 1.32. Available online: <http://www.sans.org/topten.htm> (2001).

Schneider, Fred B., ed. Trust in Cyberspace. Washington, DC: National Academy Press, 1999.

Schwartau, Winn. Time-Based Security. Seminole, FL: Interpact Press, 1999.

Sellens, John. "System and Network Monitoring." login: 25, 3 (June 2000).

Simmel, Derek et al. Securing Desktop Workstations (CMU/SEI-SIM-004, ADA 361388). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 1999. Available online: <http://www.cert.org/security-improvement/modules/m04.html>.

Stevens, W. Richard. TCP/IP Illustrated, Volume 1: The Protocols. Reading, MA: Addison-Wesley, 1994.

Stoll, Cliff. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. New York: Doubleday, 1989.

Summers, Rita C. Secure Computing. New York: McGraw-Hill, 1997.

Wadlow, Thomas A. The Process of Network Security. Reading, MA: Addison-Wesley, 2000.

    Team LiB   Previous Section   Next Section