Textbooks: None References
Textbooks:
- W. Mao, Modern Cryptography: Theory and Practice,
Prentice Hall, 2004.
- W.
Stallings, Network and Internetwork
Security:
Primciples and Practice, IEEE Press, 1995.
- C.
Kaufman, R. Perlman and M.
Speciner, Network Security: Private
Communication in a Public World, Second Edition, Prentice Hall PTR,
2002 (errata).
- S.
Vaudenay, A Classical
Introduction to Cryptography: Applications for Communications Security,
Springer, 2006.
- M.
Bishop, Introduction to Computer
Security, Addison Wesley, 2005.
- B. A. Forouzan, Introduction to Cryptography and Network
Security, McGraw-Hill, 2008.
More
on cryptography:
- B.
Schneier. Applied
Cryptography, Second Edition,
Wiley, 1996.
- J.
Buchmann. Introduction to
Cryptography,
Spinger, 2000.
- O. Goldreich. Foundations of Cryptography: Basic Tools,
Cambridge University Press, 2001.
- N. Ferguson and B. Schneier, and Tadaysoshi, Cryptograhpy Engineering, Wiley 2010 (previously N. Ferguson and B. Schneier. Practical Cryptography, Wiley, 2003).
- B. Schneier. Twofish Encryption Algorithm.
Wiley, 1999.
- D. Stinson. Cryptography: Theory and Practice, Chapman
& Hall/CRC, Second Edition, 2002.
- A. Menezes and P. van Oorschot. Handbook of Applied Cryptography, CRC Press, 1996.
Specific
topics:
- S.
Brands, Rethinking
Public Key Infrastructures and
Digital Certificates, The MIT Press, 2001.
- D. B.
Chapman and E. D.
Zwicky, Building Internet Firewalls.
Second Edition, O’Reilly & Associates, 2000.
- W. Cheswick and S. Bellovin, Firewalls and Internet Security,
Second Edition, Addison Wesley,
2003.
- N. Doraswamy and
D. Harkins, IPSec, Prentice Hall, 1999.
- S. Mann and E.
Mitchell, Linux System Security, Prentice Hall
PTR, 2000.
- C. Adams and S. Lloyd, Understanding Public-Key Infrastructure,
New Riders, 1999.
More leisure reading:
- B.
Schneier, Secrets and Lies, Wiley, 2000.
- S. Flannery, In Code: A
Mathematical Journey, Workman Publishing, 2000.