Home Up

 

 

Suggested Security Engineering Reading List

Please note:  You should understand that as a student of security you will NOT find one single book that will tell you everything you need to know to do quality work.  With this in mind, below is a list of selected books that have been reviewed and were determined to be useful in your work in Security Engineering.  It is suggested that before you purchase any of these books consider your needs.  All have good information and would be a welcome addition to a personal library, though some are better written while others were selected as reference material.  If you do decide to purchase these books they should all be available through Amazon.com .   From time to time more books will be added to this list.

  • Security Engineering: A Guide to Building Dependable Distributed Systems by Ross J. Anderson, 640 pages (January 22, 2001) Published by John Wiley & Sons; ISBN: 0471389226
  • Information Security Risk Analysis, by Thomas R. Peltier,1st edition (January 23, 2001) Published by Auerbach Publications; ISBN: 0849308801
  • Secrets and Lies : Digital Security in a Networked World by Bruce Schneier,432 pages 1 edition (August 14, 2000) Published by John Wiley & Sons; ISBN: 0471253111
  • Hacking Exposed by Joel Scambray, Stuart McClure, George Kurtz, 703 pages 2nd edition (October 11, 2000) Published By McGraw-Hill Professional Publishing; ISBN: 0072127481
  • Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition by Bruce Schneier, 784 pages 2 edition (October 18, 1995) John Wiley & Sons; ISBN: 0471117099
  • The CERT(R) Guide to System and Network Security Practices (The SEI Series in Software Engineering) by Julia H. Allen, 464 pages 1 edition (June 7, 2001) Publsihed by Addison-Wesley Pub Co; ISBN: 020173723X
  • Information Security Management Handbook 2001 by Harold F. Tipton (Editor), Micki Krause (Editor) 626 pages 4th edition Vol 2 (January 15, 2000) Published By Auerbach Publications; ISBN: 0849308003
  • Rights and Responsibilities of Participants in Networked Communities by Dorothy E. Denning, Herbert S. Lin (Editor) 172 pages (December 1994) Published by National Academy Press; ISBN: 0309050901
  • The Information Systems Security Officer's Guide : Establishing and Managing an Information Protection Program by Gerald L. Kovacich, 224 pages (May 1998) Published by Butterworth-Heinemann; ISBN: 0750698969

 

Videos

Decoding Nazi Secrets  PBS NOVA  

If we choose to not to remember history...  In the 1930's the enigma machine was thought to be invincible.  By the end of the middle of the 1940's we were breaking the cryptography faster and reporting it faster than it could be decrypted and handled through the proper Nazi channels.   The video tells the story from the English perspective and the insight is worth watching.  You can find more about this online at  www.pbs.org/wgbh/nova/transcripts/2615decoding.html  

PBS has related their story to the modern Internet.  You can find out how we do things today in laymen's terms at  www.pbs.org/wgbh/nova/decoding/web.html

If you want to play cryptoanalyst the way that they did at Bletchley Park during World War II you can by visiting www.pbs.org/wgbh/nova/decoding/doubplayfair.html  .  The Double Playfair system was considered then to be MOST SECRET and has only recently described in declassified documents. 

The Mind of a Codebreaker is about the kind of people it took to break the German Enigma Machine.  www.pbs.org/wgbh/nova/decoding/mind.html  Alan Turing and his crew were not just dealing with mathematics, they were dealing with human nature.  Read and try to find out if 5h3 mow5 wimpl3 or d4yp5o dqn g3 g4ok3n.  See if you have what it takes to break this cipher by moving your left hand up one level on the keyboard and watching what you type.  Just remember, the most simple of crypto can be broken.   

Online Support:  

After WWII the United States found out that keeping a big secret known by a large number of people may be impossible.  The full resources of the Federal Government went into the safekeeping of the most important secret of our day and it was all undone by a guy and his Kleenex box.   The story is located at http://www.pbs.org/redfiles/kgb/inv/kgb_inv_ins.htm  .  There is more to be found about this and The KGB vs. The CIA: The Secret Struggle.  Just get on the WWW and visit www.pbs.org/redfiles/kgb/debrief/k_brief_ter_knightley.htm 

What the heck is a hacker anyway?  Someone that is really interested in security should be interested in this question.  Why?  Because we are saddled with words as well as being uplifted by them.  Frankly if we are going to use this word then we all need to get on board and quit listening to the rhetoric.   www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/index.html attempts to identify who hackers are.  I think they are saying more about what they are.  

 

 

.

Copyright (c) 2001-2007 RDFollendoreIII All Rights Reserved