The eSECURITY BOOKSTORE provides an overview and a possibility to
directly order books that are recommended by Rolf Oppliger on various
topics related to computer security. The bookstore is operated by
Amazon.com, Inc.
In each section, the books are sorted alphabetically
(according to the first author's name).
- Buchmann, J.,
Introduction to Cryptography, Second Edition,
ISBN 0387207562, Springer, 2004
(order book)
- Delfs, H., and H. Knebl,
Introduction to Cryptography: Principles and Applications, Second Edition,
ISBN 3540492437, Springer, 2007
(order book)
- Dent, A.W., and C.J. Mitchell,
User's Guide to Cryptography and Standards,
ISBN 1580535305, Artech House, Norwood, MA, 2004
(order book)
- Ferguson, N., Schneier, B., and T. Kohno,
Cryptography Engineering, ISBN 0470474246, John Wiley & Sons, New York, NY, 2010
(order book)
- Garrett, P.B.,
Making, Breaking Codes: Introduction to Cryptology, ISBN 0130303690,
Prentice Hall PTR, Upper Saddle River, NJ, 2000
(order book)
- Goldreich, O.,
Foundations of Cryptography: Volume 1, Basic Tools,
ISBN 0521791723, Cambridge University Press, 2001
(order book)
- Goldreich, O.,
Foundations of Cryptography: Volume 2, Basic Applications,
ISBN 0521830842, Cambridge University Press, 2004
(order book)
- Goldreich, O.,
Foundations of Cryptography: A Primer,
ISBN 1933019026, Now Publishers, 2005
(order book)
- Hankerson, D., Menezes, A.J., and S.A. Vanstone,
Guide to Elliptic Curve Cryptography,
ISBN 038795273X, Springer, 2004
(order book)
- Hoffman, J., Pipher, J., and J.H. Silverman,
An Introduction to Mathematical Cryptography,
ISBN 0387779930, Springer, 2008
(order book)
- Katz, J., and Y. Lindell,
Introduction to Modern Cryptography,
ISBN 1584885513, Chapman & Hall/CRC Press, Boca Raton, FL, 2007
(order book)
- Koblitz, N.I.,
A Course in Number Theory and Cryptography, Second Edition,
ISBN 0387942939, Springer, 1994
(order book)
- Luby, M.,
Pseudorandomness and Cryptographic Applications,
ISBN 0691025460, Princeton Computer Science Notes, Princeton, NJ, 1996
(order book)
- Luther, M.,
Introduction to Identity-Based Encryption,
ISBN 1596932384, Artech House, Norwood, MA, 2008
(order book)
- Mao, W.,
Modern Cryptography: Theory and Practice, ISBN 0130669431,
Prentice Hall PTR, Upper Saddle River, NJ, 2003
(order book)
- Menezes, A.J., van Oorschot, P.C., and S.A. Vanstone,
Handbook of Applied Cryptography,
ISBN 0849385237, CRC Press, Boca Raton, FL, 1996
(order book)
- Mollin, R.A.,
RSA and Public-Key Cryptography,
ISBN 1584883383, Chapman & Hall/CRC Press, Boca Raton, FL, 2002
(order book)
- Mollin, R.A.,
An Introduction to Cryptography, Second Edition,
ISBN 1584886188, Chapman & Hall/CRC Press, Boca Raton, FL, 2006
(order book)
- Oppliger, R.,
Contemporary Cryptography,
Second Edition,
ISBN 1608071456, Artech House, Norwood, MA, 2011
(order book)
- Paar, C., and J. Pelzl,
Understanding Cryptography:
A Textbook for Students and Practitioners,
ISBN 3642041000, Springer, 2009
(order book)
- Schneier, B.,
Applied Cryptography: Protocols, Algorithms, and Source Code
in C, Second Edition, ISBN 0471117099, John Wiley & Sons,
New York, NY, 1996
(order book)
- Smart, N., Cryptography, An Introduction, ISBN 0077099877,
McGraw-Hill, 2002
(order book)
- Stinson, D., Cryptography: Theory and Practice, Third Edition,
ISBN 1584885084, Chapman & Hall/CRC, 2005
(order book)
- van Tilborg, H.C.A. (Ed.),
Encyclopedia of Cryptography and Security,
ISBN 038723473X, Springer, 2005
(order book)
- Vaudenay, S.,
A Classical Introduction to Cryptography: Applications for Communications
Security,
ISBN 0387254641, Springer, 2005
(order book)
- Boyd, C., and A. Mathuria,
Protocols for Key Establishment and Authentication,
ISBN 3540431071, Springer, 2003
(order book)
- Anderson, R., Security Engineering: A Guide to Building Dependable Distributed
Systems, Second Edition, ISBN 0470068523, John Wiley & Sons, New York, NY, 2008,
(order book)
- Bishop, M., Computer Security: Art and Science, ISBN 0201440997,
Addison-Wesley Professional, 2002
(order book)
- Bishop, M., Introduction to Computer Security, ISBN 0321247442,
Addison-Wesley Professional, 2004
(order book)
- Biskup, J., Security in Computing Systems: Challenges, Approaches and Solutions,
ISBN 3540784411, Springer, 2009
(order book)
- Coyne, E.J., and J.M. Davis, Role Engineering for Enterprise Security Management,
ISBN 159693218X, Artech House Publishers, Norwood, MA, 2007
(order book)
- Ferraiolo, D.F., D.R. Kuhn, and R. Chandramouli, Role-based Access Control,
Second Edition, ISBN 1596931132, Artech House Publishers, Norwood, MA, 2007
(order book)
- Garfinkel, S., E.H. Spafford, and A. Schwartz, Practical Unix and
Internet Security, Third Edition, ISBN 0596003234,
O'Reilly & Associates, Sebastopol, CA, 2003
(order book)
- Lopez, J., S. Furnell, S. Katsikas, and A. Patel (Eds.), Securing Information
and Communication Systems: Principles, Technologies and Applications,
ISBN 1596932287, Artech House Publishers, Norwood, MA, 2008
(order book)
- Gollmann, D., Computer Security, Second Edition,
ISBN 0470862939, John Wiley & Sons, New York, NY, 2006,
(order book)
- Nazario, J., Defense and Detection Strategies Against Internet Worms,
ISBN 1-58053-537-2, Artech House Publishers, Norwood, MA, 2003
(order book)
- Pfleeger, C.P., and S.L. Pfleeger,
Security in Computing, Fourth Edition,
ISBN 0132390779, Prentice Hall, 2007,
(order book)
- Pieprzyk, J., Hardjono, T., and J. Seberry,
Fundamentals of Computer Security,
ISBN 3540431012, Springer, 2003,
(order book)
- Szor, P.,
The Art of Computer Virus Research and Defense,
ISBN 0321304543, Addison-Weseley Professional, 2005,
(order book)
Network and Internet Security |
- Cheswick, W.R., Bellovin, S.M., and A.D. Rubin,
Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition,
ISBN 020163466X, Addison-Wesley, 2003
(order book)
- Doraswamy, N., and D. Harkins,
IPSec: The New Security Standard for the Internet, Intranets,
and Virtual Private Networks, ISBN 0130118982,
Prentice Hall, 1999
(order book)
- Frankel, S.,
Demystifying the IPsec Puzzle, ISBN 1580530796, Artech House
Publishers, Norwood, MA, 2001
(order book)
- Gehrmann, C., Persson, J., and B. Smeets,
Bluetooth Security,
ISBN 1580535046, Artech House Publishers, Norwood, MA, 2004
(order book)
- Hardjono, T., and L.R. Dondeti,
Multicast and Group Security,
ISBN 1580533426, Artech House Publishers, Norwood, MA, 2003
(order book)
- Hardjono, T., and L.R. Dondeti,
Security in Wireless LANs and WANs,
ISBN 1580537553, Artech House Publishers, Norwood, MA, 2005
(order book)
- Kaufman, C., et al.,
Network Security: Private Communication in a Public World, Second Edition,
ISBN 0130460192, Prentice Hall, 2002
(order book)
- Oppliger, R.,
Authentication
Systems for Secure Networks, ISBN 0890065101, Artech House
Publishers, Norwood, MA, 1996
(order book)
- Oppliger, R.,
Internet
and Intranet Security, Second Edition, ISBN 1580531660,
Artech House Publishers, Norwood, MA, 2002
(order book)
- Stallings, W.,
Cryptography and Network Security: Principles and Practice,
Fourth Edition,
ISBN 0131873164, Prentice Hall, 2005
(order book)
- Tarman, T.D., and E.L. Witzke,
Implementing Security for ATM Networks,
ISBN 1580532934, Artech House Publishers, Norwood, MA, 2002
(order book)
- Velissarios, J.,
Identity, Security and Anonymity on the Internet,
ISBN 1580538223, Artech House Publishers, Norwood, MA, 2007
(order book)
- Zwicky, E.D., Brent, D., Cooper, S., and D.B. Chapman,
Building Internet Firewalls, Second Edition,
ISBN 1565928717, O'Reilly & Associates, Sebastopol, CA, 2000
(order book)
Public Key Infrastructures |
- Adams, C., and S. Lloyd,
Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition,
ISBN 0672323915, Addison Wesley Professional, 2002
(order book)
- Brands, S.A.,
Rethinking Public Key Infrastructures and Digital
Certificates: Building in Privacy,
ISBN 0262024918, MIT Press, 2000
(order book)
- Choudhury, S., et al.,
Public Key Infrastructure and Implementation and Design,
ISBN 0764548794, John Wiley & Sons, New York, NY, 2002
(order book)
- Feghhi, J., Williams, P., and J. Feghhi,
Digital Certificates: Applied Internet Security,
ISBN 0201309807, Addison-Wesley, Reading, MA, 1998
(order book)
- Komar, B., Microsoft Windows Server2003 PKI and Certificate Security,
ISBN 0735620210, Microsoft Press, 2004
(order book)
- Oppliger, R.,
Secure
Messaging with PGP and S/MIME, ISBN 158053161X,
Artech House Publishers, Norwood, MA, 2001
(order book)
- Zimmermann, P.R.,
The Official PGP User's Guide, ISBN 0262740176,
MIT Press, 1995
(order book)
- Garfinkel, S., with E.H. Spafford,
Web
Security, Privacy & Commerce, Second Edition,
ISBN 0596000456, O'Reilly & Associates, Sebastopol, CA, 2001
(order book)
- Huseby, S.H., Innocent Code:
A Security Wake-Up Call for Web Programmers,
ISBN 0470857447, John Wiley & Sons, New York, NY, 2004
(order book)
- Oppliger, R.,
Security
Technologies for the World Wide Web, Second Edition, ISBN 1580533485,
Artech House Publishers, Norwood, MA, 2002
(order book)
- Oppliger, R.,
SSL and TLS: Theory
and Practice , ISBN 1596934476,
Artech House Publishers, Norwood, MA, 2009
(order book)
- Rescorla, E.,
SSL and TLS: Designing and Building Secure Systems,
ISBN 0201615983, Addison-Wesley, Reading, MA, 2000
(order book)
- Rubin, A., Geer, D., and M.J. Ranum, Web Security Sourcebook:
A Complete Guide to Web Security Threats and Solutions,
ISBN 047118148X, John Wiley & Sons, New York, NY, 1997
(order book)
- Stein, L.D., Web Security: A Step-by-Step Reference Guide,
ISBN 0201634899, Addison-Wesley, Reading, MA, 1998
(order book)
- Thomas, S.A.,
SSL & TLS Essentials: Securing the Web, ISBN 0471383546,
John Wiley & Sons, New York, NY, 2000
(order book)
- Hassler, V., Security Fundamentals for E-Commerce, ISBN 1580531083,
Artech House, Norwood, MA, 2000,
(order book)
- Hassler, V., Manninger, M., Gordeev, M., and C. Muller, Java Card for E-Payment Applications,
ISBN 1580532918, Artech House, Norwood, MA, 2002,
(order book)
- O'Mahony, D., Peirce, M., and H. Tewari,
Electronic Payment Systems for E-Commerce, Second Edition,
ISBN 1580532683, Artech House, Norwood, MA, 2001,
(order book)
- Radu, C., Implementing Electronic Card Payment Systems,
ISBN 1580533051, Artech House, Norwood, MA, 2003,
(order book)
- Zhou, J.,Non-repudiation in Electronic Commerce,
ISBN 1580532470, Artech House, Norwood, MA, 2001,
(order book)
- Daswani, N., Kern, C., and A. Kesayan, Foundations of Computer Security: What Every Programmer Needs
to Know, ISBN 1590597842, Apress, 2007
(order book)
- Lang, U., and R. Schreiner,
Developing Secure Distributed Systems with CORBA,
ISBN 1580532950, Artech House, Norwood, MA, 2002,
(order book)
- Takanen, A., J.D. DeMott, and C. Miller,
Fuzzing for Software Security Testing and Quality Assurance,
ISBN 1596932147, Artech House, Norwood, MA, 2008,
(order book)
Intellectual Property Protection |
- Arnold, M., Schmucker, M., and S.D. Wolthusen,
Digital Watermarking and Content Protection: Techniques and Applications, ISBN 1580531113,
Artech House, Norwood, MA, 2003,
(order book)
- Bloom, J., Miller, M., and I. Cox,
Digital Watermarking, ISBN 1558607145,
Morgan Kaufmann Publishers, 2001,
(order book)
- Katzenbeisser, S., and F. Petitcolas (Eds.),
Information Hiding Techniques for Steganography and Digital
Watermarking, ISBN 1580530354, Artech House, Norwood, MA, 2000,
(order book)
- Caloyannides, M.A., Privacy Protection and Computer Forensics, Second Edition,
ISBN 1580538304, Artech House, Norwood, MA, 2004,
(order book)
- Casey, E., Digital Evidence and Computer Crime: Forensic
Science, Computers, and the Internet,
ISBN 012162885X, Academic Press, 2000,
(order book)
- Mohay, G., Anderson, A., Collie, B., de Vel, O., and R.D. McKemmish,
Computer and Intrusion Forensics,
ISBN 1580533698, Artech House, Norwood, MA, 2003,
(order book)
- Ashbourne, J.,
Practical Biometrics: From Aspiration to Implementation, ISBN 1852337745,
Springer-Verlag, 2003,
(order book)
- Bolle, R., Connell, J., Pankanti, S., Ratha, N., and A. Senior,
Guide to Biometrics, ISBN 0387400893,
Springer-Verlag, 2003,
(order book)
- Chirillo, J., and S. Blaul,
Implementing Biometric Security, ISBN 0764525026,
Wiley, 2003,
(order book)
- Jain, A.K., Flynn, P., and A.A. Ross (Eds.),
Handbook of Biometrics, ISBN 038771040X,
Springer-Verlag, 2007,
(order book)
- Ratha, N.K., and V. Govindaraju (Eds.),
Advances in Biometrics: Sensors, Algorithms and Systems, ISBN 1846289203,
Springer-Verlag, 2007,
(order book)
- Ross, A.A., Nandakumar, K., and A.K. Jain,
Handbook of Multibiometrics, ISBN 0387222960,
Springer-Verlag, 2006,
(order book)
- Vacca, J.R.,
Biometric Technologies and Verification Systems, ISBN 0750679670,
Butterworth-Heinemann, 2007,
(order book)
- Wayman, J., Jain, A., Maltoni, D., and D. Maio (Eds.),
Biometric Systems: Technology, Design and Performance Evaluation, ISBN 1852335963,
Springer-Verlag, 2004,
(order book)
- Axelrod, C.W.,
Outsourcing Information Security, ISBN 1580535313,
Artech House, Norwood, MA, 2004,
(order book)
- Humphreys, T.,
A Guide to ISO/IEC 27000 Information Security Management, ISBN 1596931728,
Artech House, Norwood, MA, 2007,
(order book)
- Purser, S.,
A Practical Guide to Managing Information Security, ISBN 1580537022,
Artech House, Norwood, MA, 2004,
(order book)
- Kahn, D.,
The Codebreakers - The Comprehensive History of Secret
Communication from Ancient Times to the Internet,
ISBN 0684831309, Scribner, 1996,
(order book)
- Levy, S.,
Crypto: How the Code Rebels Beat the Government -
Saving Privacy in the Digital Age,
ISBN 0670859508, Viking Press, 2001,
(order book)
- Mitnick, K.D, and W.L. Simon,
The Art of Intrusion - The Real Stories Behind the Exploits of Hackers,
Intruders & Deceivers, ISBN 0764569597, John Wiley & Sons, New York, NY, 2005
(order book)
- Power, R.,
Tangled Web: Tales of Digital Crime from the Shadows of
Cyberspace, ISBN 078972443X, Que, 2000,
(order book)
- Ranum, M.J.,
The Myth of Homeland Security, ISBN 0471458791, John Wiley & Sons, New York, NY, , 2003,
(order book)
- Schneier, B.,
Secrets and Lies: Digital Security in a Networked World,
ISBN 0471253111, John Wiley & Sons, New York, NY, 2000,
(order book)
- Schneier, B.,
Beyond Fear: Thinking Sensibly About Security in an Uncertain World,
ISBN 0387026207, Copernicus Books, 2003,
(order book)
© 1999-2014 eSECURITY Technologies Rolf Oppliger