|
IEEE Cipher |
Jean-Philippe (JP) Aumasson, Serious Cryptography, Review by Sven Dietrich
Jakub Szefer and Russell Tessier, Security of FPGA-Accelerated Cloud Computing Environments, Review by Sven Dietrich
Travis Goodspeed, Microcontroller Exploits, Review by Richard Austin
Issue E179. 06/04/24Chris Dixon, Read Write Own: Building the Next Era of the Internet, Review by Sven Dietrich
Carlos Molina-Jimenez, Dann Toliver, Hazem Danny Nakib, and Jon Crowcroft, Fair Exchange: Theory and Practice of Digital Belongings, Review by Sven Dietrich
Jos Weyers, Matt Burrough, Walter Belgers, BandEAtoZ, and Nigel K. Tolley, Locksport: A Hacker's Guide to Lockpicking, Impressioning, and Safe Cracking, Review by Sven Dietrich
Daniel Dougherty, Jose Meseguer, Sebastian Alexander Moedersheim, and Paul Rowe (Eds.), Protocols, Strands, and Logic, Review by Sven Dietrich
Adam Shostack, Threats: What Every Engineer Should Learn From Star Wars, Review by Sven Dietrich
Eugene H. Spafford, Leigh Metcalf, and Josiah Dykstra,
Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us , Review by Sven Dietrich
Reza Montasari,
Artificial Intelligence and National Security, Review by Sven Dietrich
Laurent Chuat, David Basin, Samuel Hitz, Adrian Perrig, Markus Legner, David Hausheer, Peter Müller,
The Complete Guide to SCION: From Design Principles to Formal Verification, Review by Sven Dietrich
Andrew J. Stewart,
A Vulnerable System: The History of Information Security in the Computer Age, Review by Sven Dietrich
Jean-Philippe Aumasson, Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer, Review by Sven Dietrich
Paul C. van Oorschot, Computer Security and the Internet: Tool and Jewels from Malware to Bitcoin, (second edition) Review by Sven Dietrich
Carlisle Adams, Introduction to Privacy Enhancing Technologies: A Classification-Based Approach to Understanding PETs, Review by Sven Dietrich
Arno Mittelbach and Marc Fischlin, The Theory of Hash Functions and Random Oracles: An Approach to Modern Cryptography, Review by Sven Dietrich
Ross Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, Review by Sven Dietrich
Joan Daemen and Vincent Rijmen, The Design of Rijndael: The Advanced Encryption Standard (AES), Review by Sven Dietrich
Chris Eagle and Kara Nance, The Ghidra Book - The Definitive Guide, Review by Sven Dietrich
Paul C. van Oorschot, Computer Security and the Internet: Tool and Jewels, Review by Sven Dietrich
Matt Bishop, Computer Security: Art and Science, 2nd edition, Review by Sven Dietrich
Colin Boyd, Anish Mathuria, and Douglas Stebila, Protocols for Authentication and Key Establishment, Review by Sven Dietrich
Alex Matrosov, Eugene Rodionov, and Sergey Bratus, Rootkits and Bootkits - Reversing Modern Malware and Next Generation Threats, Review by Sven Dietrich
Dennis Andriesse, Practical Binary analysis : build your own Linux tools for binary instrumentation, analysis, and disassembly, Review by Sven Dietrich
William J. Buchanan OBE, Cryptography, Review by Sven Dietrich
Adrian Perrig, Pawel Szalachowski, Raphael M. Reischuk, and Laurent Chuat, SCION: A Secure Internet Architecture, Review by Sven Dietrich
James Forshaw, Attacking Network Protocols, Review by Sven Dietrich
Sean Smith, The Internet of Risky Things - Trusting the devices That Surround Us, Review by Sven Dietrich
Andrew "bunnie" Huang, The Hardware Hacker - Adventures in making & breaking hardware, Review by Sven Dietrich
Douglas W. Hubbard and Richard Seiersen, How to Measure Anything in Cybersecurity Risk, Review by Richard Austin
Christopher Hadnagy and Michele Fincher, Phishing Dark Waters: The Offensive and Defensive Use of Malicious E-mails, Review by Richard Austin
Brandon Valeriano and Ryan C. Harris, Cyber War versus Cyber Realities: Cyber Conflict in the International System, Review by Richard Austin
Craig Smith, The Car Hacker's Handbook: A Guide for the Penetration Tester, Review by Richard Austin
Steven Bellovin, Thinking Security: Stopping Next Year's Hackers, Review by Richard Austin
George Loukas, Cyber-Physical Attacks: A Growing Invisible Threat , Review by Richard Austin
Nitesh Dhanjani, Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts, Review by Richard Austin
Marc Rotenberg, Julia Horwitz and Jeramie Scott, Privacy in the Modern Age: The Search for Solutions, Review by Richard Austin
Benjamin Wittes and Gabriella Blum, The Future of Violence: Robots and Germs, Hackers and Drones. Confronting a new age of threat, Review by Richard Austin
Bruce Schneier, Data and Goliath: The hidden battles to capture your data and control your world, Review by Richard Austin
Justin Seitz, Black Hat Python: Python Programming for Hackers and Pentesters, Review by Richard Austin
Michael Ligh, Andrew Case, Jamie Levy and Aaron Walters, The Art of Memory Forensics: Detecting malware and threats in Windows, Linux, and Mac Memory, Review by Richard Austin
Georgia Weidman, Penetration Testing: A Hands-On Introduction to Hacking, Review by Richard Austin
Adam Shostack, Threat Modeling: Designing for Security, Review by Richard Austin
Jay Jacobs and Bob Rudis, Data-Driven Security: Analysis, Visualization and Dashboards, Review by Richard Austin
Michael Collins, Network Security Through Data Analysis: Building Situational Awareness, Review by Richard Austin
Bill Blunden, The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System (2ed), Review by Richard Austin
Thomas Rid, Cyber War Will Not Take Place , Review by Richard Austin
Richard Bejtlich, The Practice of Network Security Monitoring: Understanding Incident Detection and Response, Review by Richard Austin
Cameron Malin, Eoghan Casey and James Aquilina, Linux Malware incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data, Review by Richard Austin
Dawn Cappelli, Andrew Moore and Randall Trzeciak, The CERT Guide to Insider Threats, Review by Richard Austin
S. Bodmer, M. Kilger, G. Carpenter and J. Jones, Reverse Deception: Organized Cyber Threat Counter-Exploitation, Review by Richard Austin
K. H. Pherson and R. H. Pherson, Critical Thinking for Strategic Intelligence, Review by Richard Austin
Shon Harris, All In One CISSP Exam Guide, Review by Richard Austin
Lee Allen, Advanced Penetration Testing for Highly Secured Environments: The Ultimate Security Guide , Review by Richard Austin
Davi Ottenheimer and Matthew Wallace, Securing the Virtual Environment: How to defend the enterprise against attack, Review by Richard Austin
Tyler Wrightson, Wireless Network Security: A Beginner's Guide, Review by Richard Austin
Michael Sikorski and Andrew Honig, Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software, Review by Richard Austin
Michael Zalewski, Tangled Web: A Guide to Securing Modern Web Applications, Review by Richard Austin
Bruce Schneier, Liars & Outliers: Enabling The Trust That Society Needs To Thrive, Review by Richard Austin
Eric D. Knapp, Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control System, Review by Richard Austin
David Kennedy, Jim O'Gorman, Devon Kearns and Mati Aharoni, Metasploit The Penetration Tester's Guide, Review by Richard Austin
Cory Altheide and Harlan Carvey, Digital Forensics with Open Source Tools, Review by Richard Austin
Christopher Hadnagy, Social Engineering: The Art of Human Hacking, Review by Richard Austin
Harlan Carvey, Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Review by Richard Austin
Susan Landau, Surveillance or Security? The Risks Posed by New Wiretapping Technologies, Review by Hilarie Orman
Justin Clarke, SQL Injection Attacks and Defense, Review by Richard Austin
Susan Landau, Surveillance or Security?: The Risks Posed by New Wiretapping Technologies, briefly noted
Michael Hale Ligh, Steven Adair, Blake Hartstein and Matthew Richard, Malware Analysts' Cookbook and DVD: Tools and Techniques for Fighting Malicious Code, Review by Richard Austin
David Ropeik, How Risky Is It, Really?: Why Our Fears Don't Always Match the Facts, Review by Richard Austin
Douglas Hubbard, The Failure of Risk Management: Why Its Broken and How to Fix It, Review by Richard Austin
Reverend Bill Blunden, The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System, Review by Richard Austin
David Lacey, Managing the Human Factor in Information Security: How to win over staff and influence business managers, Review by Richard Austin
Michael Howard, David Leblanc and John Viega, 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them, Review by Richard Austin
Tim Mather, Subra Kumaraswamy and Shahed Latif, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, Review by Richard Austin
Andy Oram and Jon Viega, Eds., Beautiful Security: Leading Security Experts Explain How They Think, Review by Richard Austin
H. Carvey, Windows Forensic Analysis DVD Toolkit (2ed), Review by Richard Austin
A. Whitaker, K. Evans and J. Voth, Chained Exploits: Advanced Hacking Attacks from Start to Finish, Review by Richard Austin
Greg Conti, How Much Does Google Know About You?, Review by Richard Austin
Raffael Marty, Applied Security Visualization, Review by Richard Austin
Ari Takanen, Jared D. Demott and Charles Miller, Fuzzing for Security Testing and Quality Assurance, Review by Richard Austin
Ross Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems (2ed), Review by Richard Austin
M. Jakobsson and Z. Ramzan, Crimeware: Understanding New Attacks and Defenses, Review by Richard Austin
Donald E. Knuth, The Art of Computer Programming, Volume 4, Fascicle 0, Review by Hilarie Orman and Richard Schroeppel
A. Shostack, and A. Stewart, The New School of Information Security, Review by Richard Austin
N. N. Taleb, The Black Swan: The Impact of the Highly Improbable, Review by Richard Austin
Dobromir Todorov, Mechanics of User Identification and Authentication: Fundamentals of Identity Management, Review by Richard Austin
Philip Hallam-Baker, The dotCrime Manifesto: How to Stop Internet Crime, Review by Richard Austin
Niels Provos and Thorsten Holz, Virtual Honeypots: From Botnet Tracking to Intrusion Detection, Review by Richard Austin
Michael Sutton, Adam Greene, and Pedram Amini, Fuzzing: Brute Force Vulnerability Discovery, Review by Richard Austin
Mark S. Kadrich, Endpoint Security, Review by Richard Austin
Andrew Jacquith, Security Metrics: Replacing Fear, Uncertainty and Doubt, Review by Richard Austin
D. Herrmann, Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI, Review by Richard Austin
Mark Dowd, John McDonald and Justin Schuh, The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities, Review by Richard Austin
Phillip Q. Maier, Audit and Trace Log Management: Consolidation and Analysis, Review by Richard Austin
Richard Bejtlich, Extrusion Detection: Security Monitoring for Internal Intrusions, Review by Richard Austin
DerEngel, Hacking the Cable Modem, Review by Bob Bruen
Himanshu Dwivedi, Securing Storage: A Practical Guide to SAN and NAS Security, Review by Richard Austin
Bennett, Colin and Charles Raab, The Governance of Privacy. Policy Instruments in a Global Perspective, Review by Robert Bruen
Andrews, Mike and James A. Whitaker, How to Break Web Software, Review by Bob Bruen
Ryan Barnett, Preventing Web Attacks With Apache, Review by Bob Bruen
Simpson, Michael, Hands-On Ethical Hacking and Network Defense, Review by Robert Bruen
Long, Johnny et al., Penetration Tester's Open Source Toolkit, Review by Robert Bruen
Brian Carrier, File System Forensic Analysis, Review by Robert Bruen
Gary McGraw, Software Security. Building Security In, Review by Robert Bruen
Jones, Keith, Richard Bejtlich and Curtis Rose, Real Digital Forensics. Computer Security and Incident Response, Review by Bob Bruen
Cranor, Laurie Faith and Simson Garfinkel, Security and Usability. Designing Secure Systems That People Can Use., Review by Bob Bruen
Robert C. Seacord, Secure Coding in C and C++, Review by Sven Dietrich
Greg Hoglund and James Butler, Rootkits: Subverting the Windows Kernel, Review by Bob Bruen
Wotring, Brian and Potter, Bruce, Host Integrity Monitoring Using Osiris and Samhain, Review by Bob Bruen
Nitesh Dhanjani and Justin Clarke, Network Security Tools. Writing, Hacking and Modifying Security Tools, Review by Bob Bruen
Foster, James with Mike Price, Sockets, Shellcode, Porting and Coding, Review by Robert Bruen
Roberta Bragg, Windows Server 2003 Security A Technical Reference, Review by Robert Bruen
Ivan Ristic, Apache Security, Review by Robert Bruen
Michal Zalewski, Silence on the Wire. A Field Guide to Passive Reconnaissance and Indirect Attacks, Review by Robert Bruen
J. D. Lasica, Darknet: Hollywood's War Against the Digital Generation , Review by Robert Bruen
Eldad Eilam, Secrets of Reverse Engineering, Review by Robert Bruen
Mirkovic, Jelena, and Sven Dietrich, and David Dittrich, and Peter Reiher, Internet Denial of Service. Attack and Defense Mechanisms, Review by Robert Bruen
Peter Szor, The Art Of Computer Virus Research and Defense, Review by Robert Bruen
Foster, James, and Vitaly Osipov, and Nish Bhalla, and Niels Heinen, Buffer Overflow Attacks. Detect, Exploit, Prevent., Review by Robert Bruen
Daniel Solove, The Digital Person Technology and Privacy in the Information Age, Review by Robert Bruen
Amanda Andress and Mandy Andress, Surviving Security, Review by Ross Patel
J. C. Cannon, Privacy: What Developers and IT Professionals Should Know, Review by Robert Bruen
Wang, Wallace, Steal This File Sharing Book. What They Won't Tell You About File Sharing, Review by Robert Bruen
Howlett, Tony, Open Source Security Tools. A Practical Guide to Security Applications, Review by Robert Bruen
Andres, Steven and Brian Kenyon, Security Sage's Guide to Hardening the Network Infrastructure, Review by Robert Bruen
Kaspersky, Kris, Cracking Uncovered: Protection against Unsanctioned CD Copying, Review by Robert Bruen
Richard Bejtlich, The Tao of Network Security Monitoring. Beyond Intrusion Detection, Review by Robert Bruen
Andrew Vladimirov, Konstantin Gavrilenko, Andrei Mikhailovsky, WI-FOO. The Secrets of Wireless Hacking, Review by Bob Bruen
Roberta Bragg, HARDENING Windows Systems, Review by Bob Bruen
The Honeynet Project, Know Your Enemy. 2nd ed. Learning About Security Threats, Review by Bob Bruen
Koziol, Jack, David Litchfield, Dave Aitel, Chris Anley, Sinan Eren, Neel Mehta and Riley Hassell, The Shellcoder's Handbook. Discovering and Exploiting Security Holes, Review by Robert Bruen
McNab, Chris, Network Security Assessment, Review by Robert Bruen
Gupta, Ajay and Scott Laliberte, Defend IT. Security by Example, Review by Robert Bruen
Peikari, Cyrus and Anton Chuvakin, Security Warrior, Review by Robert Bruen
Jon Erikson, Hacking. The Art of Exploitation, Review by Robert Bruen
Miles, Greg, Russ Rogers, Ed Fuller, Matthew Hoagberg and Ted Dykstra, Security Assessment Case Studies for Implementing the NSA IAM, Review by Robert Bruen
Greg Hoglund and Gary McGraw, Exploiting Software. How to Break Code, Review by Robert Bruen
Mike D. Schiffman, Building Open Source Network Security Tools. Components and Techniques, Review by Robert Bruen
Daniel Barrett, Richard Silverman and Robert Byrnes, Linux Security Cookbook. Security Tools & Techniques, Review by Robert Bruen
John Viega and Matt Messier, Secure Programming Cookbook for C and C++, Review by Robert Bruen
Mark Graff and Kenneth van Wyck, Secure Coding. Principles and Practices, Review by Robert Bruen
Ed Skoudis with Lenny Zeltser, Fighting Malicious Code, Review by Robert Bruen
Michael Howard and David C. LeBlanc, Writing Secure Code, Review by Fred Cohen
Wenbo Mao, Modern Cryptography, Theory and Practice, Review by Robert Bruen
Jon Edney and William Arbaugh, Real 802.11 Security. Wi-Fi Protected Access and 802.11i, Review by Robert Bruen
Donald Pipkin, Halting the Hacker, A Practical Guide to Computer Security, Review by Robert Bruen
Peter Ryan, Steven Schneider, M. H. Goldsmith, G. Lowe and A. W. Roscoe ,Modelling and Analysis of Security Protocols, Review by Robert Bruen
David Salomon, Data Privacy and Security, Review by Robert Bruen
Joel McNamara, Secrets of Computer Espionage: Tactics and Countermeasures, Review by Robert Bruen
D.F.Ferraiolo, D.R.Kuhn, R.Chandramouli, Role-Based Access Control, Review by Tolga Acar
Eric Cole, Hiding in Plain Sight. Steganography and the Art of Covert Communication Review by Robert Bruen
Albert Marcella and Carol Stucki, Privacy Handbook. Guidelines, Exposures, Policy Implementation, and International Issues, Review by Robert Bruen
Niels Ferguson and Bruce Schneier, Practical Cryptography, Review by Robert Bruen
William Cheswick, Steven Bellovin, and Aviel Rubin, Firewalls and Internet Security (2nd edition), Review by Robert Bruen
Matt Bishop, Computer Security Art and Science, Review by Robert Bruen
Charles Pfleeger and Shari Pfleeger, Security in Computing, 3rd ed., Review by Robert Bruen
Douglas Schweitzer, Securing the Network from Malicious Code, Review by Robert Bruen
Eric Cole, Hackers Beware, Review by Robert Bruen
Fred Smith and Rebecca Bace, A Guide to Forensic Testimony. The Art and Practice of Presenting Testimony as an Expert Technical Witness Review by Robert Bruen
Lance Spitzner, Honeypots Tracking Hackers Review by Robert Bruen
Samir Nanavati, Michael Thieme, and Raj Nanavati, Verification in a Networked World, Review by Robert Bruen
Teri Bidwell, Michael Cross and Ryan Russell, Hack Proofing Your Identity in the Information Age, Review by Robert Bruen
Brian Shea, Have You Locked the Castle Gate? Home and Small Business Security, Review by Robert Bruen
Ed Skoudis, Counter Hack. A Step-by-Step Guide to Computer Attacks and Effective Defenses, Review by Robert Bruen
Jay Ramachandran, Designing Security Architecture Solutions, Review by Robert Bruen
T.J. Klevinsky, Scott Laliberte and Ajay Gupta, Hack I. T. - Security Through Penetration Testing, Review by Robert Bruen
Eoghan Casey, Editor, Handbook of Computer Crime Investigation. Forensic Tools and Technology, Review by Robert Bruen
Michael Caloyannides, Computer Forensics and Privacy, Review by Robert Bruen
Warren G. Kruse II and Jay G. Heiser, Computer Forensics. Incident Response Essentials , Review by Robert Bruen
John Viega and Gary McGraw, Building Secure Software. How to Avoid Security Problems the Right Way , Review by Robert Bruen
Gregory Rattray, Strategic Warfare in Cyberspace, Review by Robert Bruen
Julia Allen, The CERT Guide to Systems and Network Security Practices , Review by Robert Bruen
John Chirillo, Hack Attacks revealed, and Hack Attacks Denied, Reviews by Robert Bruen
Aviel Rubin, White Hat Security Arsenal, Tackling the Threats , Review by Robert Bruen
Ross Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems , Review by Anish Mathuria
James Bamford, Body of Secrets. Anatomy of the Ultra-Secret National Security Agency , Review by Robert Bruen
Steven Levy, Crypto. How the Code Rebels Beat the Government-Saving Privacy in the Digital Age, Review by Robert Bruen
Jessica Litman, Digital Copyright, Review by Robert Bruen
Thomas Pelter, Information Security Risk Analysis, Review by Judith M. Myerson
Stephen Northcutt and Judy Novak, Network Intrusion Detection Review by Robert Bruen
Paul E. Proctor, The Practical Intrusion Detection Handbook Review by Robert Bruen
Rebecca Bace, Intrusion Detection Review by Robert Bruen
Brian Bagnall, Chris Broomes, and Ryan Russell, E-Mail Virus Protection Handbook Review by Robert Bruen
Eric Rescorla, SSL and TLS. Designing and Building Secure Systems Review by Robert Bruen
Ryan Russell and Stace Cunningham, Hack Proofing Your Network: Internet Tradecraft Review by Robert Bruen
Richard Power, Tangled Web Review by Robert Bruen
Charles Jennings and Lori Fena, The Hundredth Window Review by Robert Bruen
Charles Sykes, The End of Privacy Review by Robert Bruen
L. Jean Camp, Trust and Risk in Internet Commerce. Review by Robert Bruen
Simson Garfinkel, Database Nation. Review by Gene SpaffordPeter Gregory, Solaris Security. Review by Robert Bruen
Robert L. Ziegler, Linux Firewalls. Review by Robert Bruen
Anonymous, Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation. Review by Bob Bruen
Li Gong, Inside Java 2 Platform Security. Architecture, API Design, and Implementation. Review by Bob Bruen
Kevin S. McCurley (Editor), Claus Dieter Ziegler (Editor), Advances in Cryptology, 1981-1997 : Electronic Proceedings of the Crypto and Eurocrypt Conferences, 1981-1997 Springer-Verlag 1999. (Lecture Notes in Computer Science 1440) ISBN 3540650695. Paperback Back & CD-ROM edition $99.00
Issue E34. 11/3/99
Simon Singh, The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography. Review by Bob Bruen
William Stallings, Cryptography and Network Security: Principles and Practice, 2nd Edition. Review by Bob Bruen
Rudolf Kippenhahn, Code Breaking: A History and Exploration. Review by Bob Bruen
Stefan Brands. Rethinking public key infrastructures and digital certificates - building in privacy ISBN 90-901-3059-4 287 pages. (Contact brands@cs4all.nl)
Jan Vitek and Christian D. Jensen (Editors). Secure Internet Programming : Security Issues for Mobile and Distributed Objects Springer-Verlag (Lecture Notes in Computer Science, 1603) 1999. ISBN 3540661301. $56.00.
Issue E33. 8/12/99
Brian Tung, Kerberos: A Network Authentication System. Review by Bob Bruen
Issue E32 6/7/99
Ross Anderson, The Global Internet Trust Register, 1999 Edition. Review by Bob Bruen
Geoff Mulligan, Removing the Spam: Email Processing and Filtering. Review by Bob Bruen
Issue E31 3/15/99
Dorothy Denning, Information Warfare. Review by Bob Bruen
Dorothy Denning and Peter Denning, Editors, Internet Besieged Countering Cyberspace Scofflaws. Review by Bob Bruen
Issue E30 12/18/98
Terry Escamilla, Intrusion Detection: Network Security Beyond the Firewall. Review by Bob Bruen
Carolyn Meinel, The Happy Hacker. Review by Bob Bruen
Alan Schwartz and Simson Garfinkel, Stopping Spam. Review by Bob Bruen
Issue E29 10/7/98
Electronic Frontier Foundation, Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design. Review by Bob Bruen
Issue E28 7/13/98
Gary McGraw and Edward Felten, Java Security. Review by Bob Bruen
Jonathan Knudsen, Java Cryptography. Review by Bob Bruen
Martin Freiss, Protecting Networks With Satan. Review by Bob Bruen
Scott Oaks, Java Security. Review by Bob Bruen
Charles Scott, Paul Wolfe & Mike Erwin, Virtual Private Network. Review by Bob Bruen
Issue E27 4/27/98
Lincoln Stein, Web Security: A Step-By-Step Reference Guide. Review by Bob Bruen
Issue E26 2/9/98
Whitfield Diffie and Susan Landau, Privacy on the Line: The Politics of Wiretapping and Encryption. Review by Bob Bruen
Anonymous, Maximum Security: A Hacker's Guide to Protecting Your Internet Site. Review by Bob Bruen
Issue E25 11/25/97
Philip E. Agre and Marc Rotenberg (eds), Technology and Privacy: The New Landscape. Review by Bob Bruen
Rita Summers, Secure Computing, Threats, and Safeguards. Review by Bob Bruen
Deavours, Cipher A., David Kahn, Louis Kruh, Greg Mellen, Brian J. Winkel, eds. Selection from Crypologia: History, People, Technology. Artech House, Boston, 1998, ISBN 0-89006-862-3, 544pp., $79.Hendry, Mike. Smart Card Security and Applications. Artech House, Boston, 1997, ISBN 0-89006-953-0, 282pp., $65.
Opplinger, Rolf. Internet and Intranet Security. Artech House, Boston, Jan. 1998, ISBN 0-89006-829-1, 376pp., $69.
Issue E24 10/5/97
Schneier, Bruce and David Banisar.The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance. John Wiley, 1997, ISBN 0-471-12297-1, 747 pp. $60.Smith, Richard E. Internet Cryptography. ISBN 0-201-92480-3. Addison-Wesley, 1997. 384pp. $27.92.
Issue E23 8/15/97
Rubin, Aviel D., Daniel Geer, and Marcus J. Ranum, Web Security Sourcebook: A Complete Guide to Web Security Threats and Solutions John Wiley & Sons, ISBN: 0-471-18148-X, paperback. Book info and review available from www.clark.net/pub/mjr/websec/Garfinkel, S. and G. Spafford. Web Security & Commerce. O'Reilly, June, 1997, ISBN 1-56592-269-7, 506 pages, $32.95. Review available at www.web-vantage.com/wv/970808v4.cfm. (but you may have to register at www.web-vantage.com/ first in order to read it. Publisher info at www.ora.com/catalog/websec/index.html.
Issue E22 7/12/97
Kenneth Birman, Building Secure and Reliable Network Applications. Review by Bob Bruen
For the Record: Protecting Electronic Health Information by Committee on Maintaining Privacy and Security in Health Care Applications of the National Information Infrastructure, P. Clayton, Chair, National Academy Press, ISBN 0-309-05697-7. Available at www.nap.edu/readingroom/records/0309056977.html (final version of NRC report on health information privacy reported in Cipher EI #21).
Issue E21 3/25/97
Dam, Kenneth W., and Herbert S. Lin, eds. Cryptography's Role in Security the Information Society. National Academy Press, 688 pp., $44.95. (This is the final version of the NRC report on cryptography reported in Cipher EI#15, June 1, 1996.)Pfitzmann, Birgit. Digital Signature Schemes: General Framework and Fail-Stop Signatures. Springer-Verlag, 396 pp., $59.50.
Issue E20 2/10/97
Hans Reisel, Prime Numbers and Computer Methods for Factorization. 2nd Edition. Review by Bob Bruen
Paulo Ribenboim, The New Book of Prime Number Records, 3rd Edition. Review by Bob Bruen
Steve Sutton. Windows NT Security Guide. ISBN 0-201-41969-6. Addison Wesley, 1997, 384 pp., $29.95. Reviewed in Infosecurity News, January, 1997.Andre Bacard. The Computer Privacy Handbook. Peachpit Press, 1996, 274 pp., ISBN 1-56609-171-3, $24.95. Reviewed in Infosecurity News, January, 1997.
Peter T. Davis and Barry D. Lewis. Computer Security for Dummies. IDG Books, 1996, 342 pp., ISBN 1-56884-635-5, $19.99. Reviewed in Infosecurity News, January, 1997.
Fred Simonds. Network Security: Data and Voice Communications. McGraw Hill, Inc. Hightstown, NJ, 1996, 395 pp., ISBN 0-07-057639-4, $60. Reviewed in ACM Computing Reviews, Jan. 1997.
Frederick B. Cohen. Protection and Security on the Information Superhighway. John Wiley & Sons, Inc., New York, NY, 1995, 301 pp., ISBN 0-471-11389-1, $24.95. Reviewed in ACM Computer Reviews, Jan. 1997.
Issue E19 12/23/96
Peter Wayner, Disappearing Cryptography. Review by Bob Bruen
Douglas Stinson, Cryptography: Theory and Practice. Review by Bob Bruen
David Kahn. The Codebreakers. The Story of Secret Writing. Review by Bob Bruen
Norman Polmar and Thomas Allen, Spy Book: The Encyclopedia of Espionage. Review by Bob Bruen
Issue E18 11/11/96
Charlie Kaufman, Radia Perlman and Mike Speciner, Network Security: Private Communication in a Public World. Review by Bob Bruen
William Stallings, Network and Internetwork Security: Principles and Practice. Review by Bob Bruen
Dorothy Denning. Manager's Guide to Cyberspace Attacks and Countermeasures. Published by the Computer Security Institute; claims to offer advice on "thwarting every known form of electronic threat, including the recent denial-of-service attacks, viruses, system break-ins, equipment theft and interception of network traffic." $10 (free to CSI members).
From Martin David, Dept. of Information Industries, Adelaide: A new joint Australian/New Zealand standards publication is due to be issued on 5 November 1996. AS/NZS 4444:1996 - "Information Security Management" (Please see Cipher Issue E18 for more information)
Issue E15 6/1/96
Simson Garfinkel and Eugene Spafford, Practical UNIX and Internet Security, Second Edition O'Reilly & Associates, Inc., 1996 1004 pages. ISBN: 1-56592-148-8. $39.95. Review by Peter Neumann (from RISKS 17 May)Peter T. Davis (Ed.). Securing Client/Server Computer Networks. McGraw-Hill, New York, 1996, 589 pp., ISBN: 0-07-015841-X. $50.
Issue E9 9/18/95
Icove, D., K. A. Seger, W. R. VonStorch, and E. H. Spafford. Computer Crime: A Crimefighter's Handbook. O'Reilly & Associates, $24.95(US).
Issue E4 3/10/95
Biskup, J., M. Morgenstern, and C. E. Landwehr, eds. Database Security, VIII: Status and Prospects. IFIP Transactions A-60, Elsevier Science B.V., Amsterdam, ISBN: 0 444 81972 2, 412 pp., $129.50 (discounts available to IEEE CS and ACM members).
Issue E3 1/13/95
Denning, D. and H. Lin, eds. Rights and Responsibilities of Particpants in Networked Communities. Computer Science and Telecommunications Board, National Research Council, National Academy Press, Washington, DC, Dec., 1994, ISBN 0-309-0590-1, 160pp.Schwartau, Winn.Information Warfare: Chaos on the Electronic Superhighway. Thunder's Mouth Press, NY, ISBN 1-56025-080-1, 432pp., $22.95.
Issue E2 12/5/94
Schneier, Bruce, Applied cryptography: protocols, algorithms, and source code in C, John Wiley & Sons, Inc. 1994, ISBN 0-471-59756-2(paper), 618 pages, $44.95.
Ford, Warwick.Computer communications security: principles, standard protocols and techniques.Prentice Hall P T R, Englewood Cliffs, NJ, ISBN 0-13-799453-2, 494 pages, $58.Thuraisingham, Bhavani, Ravi Sandhu, and T.C. Ting, editors. Security for object-oriented systems: Proceedings of the OOPSLA '93 conference workshop on security for object-oriented systems.. Springer-Verlag, New York, 1994, ISBN 0-387-19877-6.
Castano, Silvana, Mariagrazia Fugini, Giancarlo Martella, and Pierangela Samarati. Database security. ACM Press/Addison-Wesley, 1995, ISBN 0-201-59375-0. 456 pp., $49.50.
Abrams, Marshall D., Sushil Jajodia, and Harold J. Podell(eds.). Information security: an integrated collection of essays. IEEE Computer Society Press, ISBN 0-8186-3662-9. 700 pages, $58 (discounts available to IEEE CS members).
Amoroso, Edward, Fundamentals of computer security technology, P T R Prentice-Hall, ISBN 0-13-108929, 1994, 404 pages, $48.
Cheswick, William R., and Steven M. Bellovin, Firewalls and Internet security: repelling the wily hacker, Addison-Wesley, 1994, ISBN 0-201-63357-4(paper), 305 pages, $24.95.
Neumann, Peter G., Computer-related risks, Addison-Wesley, 1994, ISBN:O-201-55805-X (paper), 320 pages, $24.75.