CERIAS Hotlist
Page Content
- <u>Underground</u>: Tales of hacking, madness and obsession on the electronic frontier
Tales of hacking, madness and obsession on the electronic frontier
http://www.underground-book.com/ - Added Dec 10, 1999
- CERIAS: Center for Education and Research in Information Assurance and Security
The worlds foremost university center for multidisciplinary
research and education in areas of information security and information assurance.
http://www.cerias.purdue.edu/ - Added Dec 10, 1999
- ACSA Information Security Bookshelf
A collection of links to various sorts of info. sec. resources.
http://www.acsac.org/secshelf/secshelf.html - Added Nov 17, 2004
- Books by William Stallings
A listing of books by William Stallings dealing with security.
http://WilliamStallings.com/ - Added Dec 10, 1999
- Building Firewalls with OpenBSD and PF, second edition
Companion site for "Building Firewalls with OpenBSD and PF, second edition".
http://www.devguide.net/books/openbsdfw-02-ed/index.html - Added Mar 08, 2004
- Building Internet Firewalls
This book is a practical guide to building firewalls on
the Internet. It describes a variety of firewall approaches and architectures and discusses how you can
build packet filtering and proxy
http://www.oreilly.com/catalog/fire/index.html - Added Dec 10, 1999
- Cold War Spies and Espionage
U.S. Army's Signal Intelligence Service, a forerunner of NSA, began a secret program, later codenamed VENONA, to exploit, encrypted Soviet diplomatic communications
collected since 1939
http://history.acusd.edu/gen/20th/coldwarspies.html - Added Jun 25, 2001
- Computer Crime: A Crimefighter's Handbook
This book is for anyone who needs to know what today's computer crimes look like, how to
prevent them, and how to detect, investigate, and prosecute them if they do occur.
http://www.oreilly.com/catalog/crime/index.html - Added Dec 10, 1999
- Computer Crime: A Crimefighter's Handbook
http://www.oreilly.com/catalog/crime/ - Added Dec 10, 1999
- Computer Security Basics
A book on the basics of computer security.
http://www.oreilly.com/catalog/csb/colophon.html - Added Dec 10, 1999
- Computing and Communications in the Extreme Research for Crisis Management and Other Applications
The research questions discussed in this workshop report can and should motivate the scientific and engineering research
communities in the future.
http://www.nap.edu/readingroom/books/extreme/ - Added Dec 10, 1999
- Cryptography's Role in Securing the Information Society
Addresses the urgent need for a strong national policy on
cryptography that promotes and encourages the widespread use of this powerful
tool for protecting of the information interests of individuals, bus
http://books.nap.edu/catalog/5131.html - Added Dec 10, 1999
- Cryptonomicon
From CRYPTONOMICON by Neal Stephenson. Copyright (c) 1999 by Neal
Stephenson. Reprinted by arrangement with Avon Books, an imprint of
HarperCollins Publishers, Inc. All rights reserved.
http://www.cryptonomicon.com/ - Added Apr 17, 2000
- IT Security Cookbook
This book is intended as a 'self help' guide to computer &
network security, primarily for security managers, programmers
and system administrators.
http://www.boran.com/security/ - Added Dec 10, 1999
- Litigation Support Department
This book provides everyone with an educational overview of the litigation process and how electronic data (\"discovery\") travels from corporate server to trial exhibit.
The process of (1) identifying relevant data in corporate online and offline caches and then (2) coverting it into a database for attorneys to review is quickly approaching a billion dollar industry.
What happens when it is time for IT to identify and produce all corporate data which relates to the big lawsuit? What happens afterward?
http://www.AdLitem.com - Added Dec 17, 2006
- NIST Computer Security Publications
These publications present the results of NIST studies, investigations, and research on information technology security issues.
http://csrc.ncsl.nist.gov/publications/ - Added Mar 28, 2001
- PGP: Pretty Good Privacy
This book is both a readable technical user's guide and a fascinating
behind-the-scenes look at cryptography and privacy.
http://www.oreilly.com/catalog/pgp/index.html - Added Dec 10, 1999
- Practical Unix & Internet Security, 2nd Edition
Contents include UNIX and security basics, system administrator tasks,
network security, and appendixes containing checklists and helpful summaries.
http://www.oreilly.com/catalog/puis/ - Added Dec 10, 1999
- RUsecure Information Security Policies
How to obtain and deploy the RUsecure information security policies. Downloadable trial version available.
http://www.information-security-policies.com - Added Aug 05, 2001
- Secrets and Lies: Digital Security in a Networked World
Information security expert Bruce Schneier explains what everyone in business needs to know about security in order to survive and be competitive.
http://www.counterpane.com/sandl.html - Added Sep 25, 2000
- SpySite Bookstore
Spy Site offers books and videos on subjects such as espionage, investigations, changing your identity, exotic weapons, combat shooting, silencers, explosives, knife fighting,
revenge, locksmithing, key casting, martial arts, self defens
http://www.spysite.com/bookind.html - Added Jun 25, 2001
- TAKEDOWN
A book about Kevin Mitnick
http://www.takedown.com/ - Added Dec 10, 1999
- Targeted Cyber Attacks - The Dangers Faced by your Corporate Network
This security e-book explains the real dangers posed by targeted cyber attacks and the measures organizations can adopt to secure against such threats.
http://www.gfi.com/whitepapers/cyber-attacks.pdf - Added Jan 23, 2007
- The Hacker Crackdown
This is a book about cops, and wild teenage whiz- kids, and lawyers, and hairy-eyed anarchists, and industrial technicians, and
hippies, and high-tech millionaires, and game hobbyists, and computer security experts, and Secret Service agents, and gr
http://www.farcaster.com/sterling/contents.htm - Added Dec 10, 1999