-
W. Stallings. Cryptography and Network Security, 5th Edition. Prentice Hall, 2009.
-
R. Anderson. Security Engineering. 2nd Edition, Wiley, 2008.
-
A Calder. Implementing Information Security Based on ISO 27001/ISO 17799: Best Practice. Paperback, 2006.
-
J. Sherwood, A. Clark, D. Lynas. Enterprise Security Architecture: A Business-Driven Approach. CMP, 2005.
-
Andy Jones, D. Ashenden. Risk Management for Computer Security: Protecting Your Network & Information Assets, Elsevier, 2005.
-
A. Calder, S. Watkins. IT Governance: A Manager’s Guide to Data Security and BS 7799/ IS0 17799. Kogan Page, 2005.
-
W. Cheswick, S. Bellovin, A. Rubin. Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley, 2003.
-
J. Edney, W. Arbaugh. Real 802.11 Security: WI-Fi Protected Access and 802.11i. Addison Wesley, 2003.
-
C. Kaufman, R Perlman, M. Speciner. Network Security: Private Communication in a Public World, Prentice Hall, 2002.
-
S. Barman. Writing Information Security Policies. Paperback, 2001.
|