|
Link to the Homepage: Security
| |
![]() |
Amoroso, Edward Fundamentals of Computer Security Technology Prentice Hall 1994 |
Anderson, Ross Security Engineering: A Guide to Building Dependable Distributed Systems Wiley 2008 | |
Basin, David; Schaller, Patrick and Schläpfer, Michael Applied Information Security: A hands-on approach Springer 2011 | |
Bishop, Matt Computer Security Addison-Wesley 2004 | |
Bishop, Matt Introduction to Computer Security Addison-Wesley 2005 | |
Buchmann, Johannes Einführung in die Kryptographie Springer 2001 | |
![]() |
Buchmann, Johannes Introduction to Cryptography Springer 2001 |
Eckert, Claudia IT-Sicherheit Oldenbourg 2001 | |
Ferraiolo, David F.; Kuhn, D. Richard and Chandramouli, Ramaswamy Role-based access control Artech House 2007 | |
Gollmann, Dieter Computer security Wiley 2006 | |
Pfleeger, Charles R. and Pfleeger, Shari Lawrence Security in Computing Prentice Hall 2003 | |
Schneier, Bruce Secrets and Lies Wiley and Sons 2000 | |
Schneier, Bruce Applied cryptography Wiley 2015 | |
Stallings, William Computer Security Principles and Practice Pearson 2015 | |
![]() |
Stallings, William Network security essentials Pearson 2016 |