Books and other reading material - PowerPoint PPT Presentation

1 / 9
About This Presentation
Title:

Books and other reading material

Description:

Incident Response, Investigation of computer crime, K. Mandia and C. Prosise, ... Nash / W. Duane / C. Joseph/ D. Brink, (Osborne/McGraw-Hill,2001) ISBN 0-007-213123-3 ... – PowerPoint PPT presentation

Number of Views:35
Avg rating:3.0/5.0
Slides: 10
Provided by: bensm
Category:

less

Transcript and Presenter's Notes

Title: Books and other reading material


1
Books and other reading material
2
Forensics
  • Incident Response, Investigation of computer
    crime, K. Mandia and C. Prosise, (McGraw Hill,
    2001)
  • http//www.crime-research.org/links/

3
Connection security
  • Radius RFC 2865
  • IPSEC, IKEV2 RFCs 43014309
  • IPSec N. Doraswamy and D. Harkins (Prentice Hall,
    1999).
  • http//www.freeswan.org/
  • TLS 1.0 RFC 2246 TLS 1.1 RFC 4346
  • SSL and TLS Designing and Building Secure
    Systems, E. Rescorla (Addison-Wesley
    Professional, )
  • Umts Security, V. Niemi, K. Nyberg, John Wiley
    And Sons Ltd, 2003)
  • 802.11 Wireless Networks The Definitive Guide
    Creating and Administering Wireless Networks
    BY M.Gast (OReilly, 2002) 

4
PKI
  • Understanding Public-Key Infrastructure, C. Adams
    / S. Lloyd, ISBN 1-57870-166-X
  • PKI / A Wiley Tech Brief, T. Austin, Wiley, ISBN
    0-471-35380-9 R.
  • Planning for PKI, Housley / T. Polk, Wiley, ISBN
    0-471-39702-4 A.
  • PKI Implementing and Managing E-Security, Nash /
    W. Duane / C. Joseph/ D. Brink,
    (Osborne/McGraw-Hill,2001) ISBN 0-007-213123-3

5
E-commerce IP-protection
  • Electronic Payment Systems for E-Commerce, D.
    O'Mahony, M. Peirce (Author), Hitesh Tewari,
    O'Mahony Donal, (Artech House Publishers 2nd
    edition, 2001)
  • OMA DRM v2.0

6
XML signatures and encryption
  • Signature
  • http//www.w3.org/TR/xmldsig-core/
  • Encryption
  • http//www.w3.org/TR/xmlenc-core/

7
Trusted Platforms
  • TCG specifications
  • TPM
  • Mobile TPM
  • TrustZone ARM
  • Virtualisation
  • http//www.kernelthread.com/publications/virtualiz
    ation/

8
Secure Software
  • Building Secure Software How to Avoid Security
    Problems the Right Way, J. Viega, G. McGraw,
    (Addison-Wesley Professional, 2005)
  • Secure Coding Principles and Practices, M. Graff
    (Author), K. Van Wyk (OReilly, 2003)

9
Bibliography-Smartcards
  • http//java.sun.com/products/javacard/ JavaCard
    2.2.2 spec
  • http//java.sun.com/products/javacard/documentatio
    n/
  • http//developers.sun.com/techtopics/mobility/java
    card/articles/javacard1/
  • Java Card Techniques for Smart Cards, Chen,
    Zhiqun, Addison Wesley, 2000
  • Smart Card Handbook 3rd English Edition by Rankle
    Effing
Write a Comment
User Comments (0)
About PowerShow.com