Information Assurance Books

In

Center for Academic Excellence for Information Assurance Education Library

Columbus State University

 

Alberts, Christopher and Audrey Dorofee. Managing Information Security Risks. The OCTAVE Approach, Addison-Wesley, 2003.

Anonymous. Maximum Security. SAMS, 2003.

Birman, Kenneth. Building Secure and Reliable Network Applications, Prentice-Hall, 1996.

Bishop, David. Introduction to Cryptography with Java Applets, Jones and Bartlett, 2003.

Bishop, Matt. Computer Security, Addison-Wesley, 2003.

Bishop, Matt. Introduction to Computer Security, Addison-Wesley, 2005.

Blacharski, Dan. Network Security in a Mixed Environment, IDG Books, 1998.

Bosworth, Seymour and M.E. Kabay. Computer Security Handbook, 4th ed., Wiley, 2002.

Brenton, Chris and Cameron Hunt. Mastering Network Security, 2nd Edition, Sybex, 2003.

Brenton, Chris and Cameron Hunt.Active Defense, a Comprehensive Guide to Network Security, Sybex, 2003.

Chapman, D. Brent and Elizabeth Zwicky, Building Internet Firewalls, O’Reilly, 1995.

Cobb, Stephen. Complete Book of PC and LAN Security, McGraw-Hill, 1992.

Cole, Eric. Hackers Beware. New Riders, 2002.

Cretard, Paul. Lab Manual for Security+ Guide to Network Security Fundamentals, Course Technology, 2005.

Erbschloe, Michael. Guide to Disaster Recovery, Course Technology, 2003.

Ferguson, Niels and Bruce Schneier. Practical Cryptography, Wiley, 2003.

Furnell, Steven.  CyberCrime, Addison-Wesley, 2002.

Garfinkel, Simson with Gene Spafford. Web Security & Commerce, O’Reilly, 1997.

Garfinkel, Simson with Gene Spafford. Web Security Privacy & Commerce 2nd Edition, O’Reilly, 2002.

Garfinkel, Simson with Gene Spafford. Practical UNIX & Internet Security 2nd Edition, O’Reilly, 1996.

Garrett, Paul. Making, Breaking CODES, prentice-Hall, 2001.

Gupta, Ajay and Scott Laliberte. Security by Example DEFEND I.T., Addison-Wesley, 2004.

Holden, Greg. Guide to Network Defense and Countermeasures, Course Technology, 2003.

Holden, Greg. Guide to Firewalls and Network Security, Course Technology, 2004.

Howard, Michael and David LeBlanc. Writing Secure Code, Microsoft Press, 2003.

Kaeo, Merike. Designing Network Security, Cisco Press, 2004.

Kaufman, Charlie, Radia Perlman, and Mike Speciner. Network Security Private Communication in a PUBLIC World, Prentice Hall, 2002.

Kezema, Conan. Designing Microsoft Windows 2000 Security Lab Manual, Course Technology, 2002.

Kirch, Olaf. LINUX Network Admiistrator’s Guide. O’Reilly, 1995.

Klevinsky, T.J., Scott Laliberte & Ajay Gupta. Hack I.T. Security Through Penetration Testing, Addison-Wesley, 2002.

Kruse, Warren & Jay Heiser, Computer Forensics Incident Response Essentials, Addison-Wesley, 2002.

Krutz, Ronald and Russell Dean Vines. The CISSP Prep Guide, Wiley, 2001.

Limoncelli, Thomas & Christine Hogan. The Practice of System and Network Administration. Addison-Wesley, 2002.

Liska, Allan. The Practice of Network Security, Prentice-Hall, 2003.

Mackey, David. Web Security for Network and Systems Administrators, Course Technology, 2003.

Maiwald, Eric. Fundamental of Network Security, McGraw-Hill, 2004.

Maiwald, Eric. Network Security, A Beginner’s Guide. McGraw-Hill, 2003.

McClure, Stuart , Joel Scambray, and George Kurtz. Hacking Exposed, McGraw-Hill, 2001.

McClure, Stuart, Saumil Shah & Shreeraj Shah. Web Hacking Attacks and Defense, Addison-Wesley, 2003.

McMahon, Richard. Security Design Windows 2000. EMCParadigm, 2003.

Nelson, Bill, Amelia Phillips, Frank Enfinger, and Chris Steuart. Guide to Computer Forensics and Investigations, Course Technology, 2004.

Panko, Raymond. Corporate Computer and Network Security, Prentice-Hall, 2004.

Pfleeger, Charles, Security in Computing, 2nd Edition, Prentice-Hall, 1997.

Pfleeger, Charles and Shari Pfleeger. Security in Computing, 3rd Edition, Prentice-Hall, 2003.

Piekari, Cyrus and Seth Fogie. Wireless Maximum Security, SAMS, 2003.

Pipkin, Donald. Halting the hacker, Prentice-Hall, 2003.

Reid, Paul. Biometrics for Network Security. Prentice-Hall, 2004.

Rubin, Aviel. White-Hat Security Arsenal, Addison-Wesley, 2001.

Rutstein, Charles. Windows NT Security, McGraw-Hill, 1997.

Schiffman, Mike, Adam O’Dommell, David Pollino, and Bill Pennington. Hacker’s Challenge 2, McGraw-Hill, 2003.

Schneier, Bruce. Beyond Fear. Copernicus Books, 2003.

Shimomura, Tsutomu. Takedown. Hyperion, 1996.

Singh, Simon. The Code Book. Doubleday, 1999.

Speed, Tim and Juanita Ellis. Internet Security A Jumpstart for Systems Administrators and IT Managers, Digital Press, 2003.

Stallings, William. Cryptography and Network Security 2nd Edition, Prentice-Hall,

1999.

Stallings, William. Network Security Essentials, Prentice-Hall, 2000.

Stallings, William. Network Security Essentials, Prentice-Hall, 2003.

Stoll, Cliff. The Cuckoo’s Egg, Pocket books, 1990.

Strebe, Matthew, Charles Perkins, & Michael Moncur. NT Network Security, Sybex, 1998.

Subramanian, Mani. Network Management, Addison Wesley, 2000.

The Honeynet Project. Know your Enemy Learning About Security Threats, Addison-Wesley, 2004.

Tjaden, Brett. Fundamentals of Secure Computer Systems, Franklin, Beedle and Associates, 2004.

Verton, Dan. Black Ice, McGraw-Hill, 2003.

Viega, John & Gary McGraw. Building Secure Software, Addison Wesley, 2002.

Volonino, Linda and Stephen Robinson. Principles and Practice of Information Security, Prentice-Hall, 2004.

Whitman, Michael and Herbert Mattord. Principles of Information Security, Course Technology,2003.