SlideShare a Scribd company logo
Cybersecurity, Cryptography, and Privacy
All links to books in digital libraries are “local” – each
link will work without login on any campus (or VPN
remotely) with access to those libraries.
The Open Access items are colored green.
For a more comfortable library visit, use Google Chrome
and, while you are scrolling through the titles, always
right-click on the selected item’s link to “Open link in
new tab” – after you close the new tab, your cursor will
be where you right-clicked.
This section of the library was updated on 19 March 2016.
This work is licensed under the Creative Commons
Attribution-NonCommercial-NoDerivs 3.0 Unported License
(available at:
http://creativecommons.org/licenses/by-nc-nd/3.0/).
This work is free only for personal and classroom use.
Professor Joseph Vaisman
Department of Computer Science and Engineering, NYU-Poly
jv@competitive-learning.org
Table of Contents
Introduction to Information Security
Cybersecurity
Hacking and Penetration Testing
Homeland Security and Cyber Warfare
Managing Information Security
Economics of Information Security and Privacy
Information Hiding and Steganography
Data Encryption
Hardening Software
Network Security
Mobile Network Security
Hardware Security
RFID Security
Sensor Network Security
Internet of Things (IoT) Security
Cloud Security
Smart Grid Security
Smart City Security
Cyber-Physical Systems Security
Biometrics
Security Engineering
Digital Forensics
Risk
Trust
Professional Certifications
Careers in Cybersecurity
Programming
Mathematics for Cryptography
Cryptography
Homomorphic Encryption
History of Cryptology
How to Share a Secret
Anonymity
Privacy and Identity Management
Data Privacy
E-Cash
Security Science/Physical Security
Additional Web Resources
Legal Matters
Reference Material
Online Publications – Directly
Odds & Ends
Introduction to Information Security =======
Introduction to Information Security:
A Strategic-based Approach
Timothy J. Shimeall and Jonathan M. Spring
Elsevier, 2014, ISBN 978-1-59749-969-9
http://www.sciencedirect.com/science/book/9781597499699
The Basics of Information Security:
Understanding the Fundamentals of InfoSec in Theory and
Practice, Second Edition
Jason Andress
Elsevier, 2014, ISBN 978-0-12-800744-0
http://www.sciencedirect.com/science/book/9780128007440
Security Controls Evaluation, Testing, and Assessment
Handbook
Leighton Johnson
Elsevier, 2016, ISBN 978-0-12-802324-2
http://www.sciencedirect.com/science/book/9780128023242
Elements of Computer Security
David Salomon
Springer, 2010, ISBN 978-0-85729-006-9
http://dx.doi.org/10.1007/978-0-85729-006-9
Advanced Computing and Systems for Security, Volume 1
Rituparna Chaki, Agostino Cortesi, Khalid Saeed,
and Nabendu Chaki (Editors)
Springer, 2016, ISBN 978-81-322-2650-5
http://dx.doi.org/10.1007/978-81-322-2650-5
Applied Information Security: A Hands-on Approach
David Basin, Patrick Schaller, and Michael Schlapfer
Springer, 2011, ISBN 978-3-642-24474-2
http://dx.doi.org/10.1007/978-3-642-24474-2
Information Security: Principles and Practice, Second Edition
Mark Stamp
Wiley, 2011, ISBN 9781118027974
http://dx.doi.org/10.1002/9781118027974
What Is Computer Science? – An Information Security
Perspective
Daniel Page and Nigel Smart
Springer, 2014, ISBN 978-3-319-04042-4
http://dx.doi.org/10.1007/978-3-319-04042-4
Back to the Table of Contents
=======================================
Cybersecurity ==========================
The Information Systems Security Officer’s Guide:
Establishing and Managing a Cyber Security Program;
Third Edition
Gerald L. Kovacich
Elsevier, 2016, ISBN 978-0-12-802190-3
http://www.sciencedirect.com/science/book/9780128021903
Cyber Security and IT Infrastructure Protection
John R. Vacca (Editor)
Elsevier, 2014, ISBN 978-0-12-416681-3
http://www.sciencedirect.com/science/book/9780124166813
Cyber Security: Deterrence and IT Protection for Critical
Infrastructures
Maurizio Martellini (Editor)
Springer, 2013, ISBN 978-3-319-02279-6
http://dx.doi.org/10.1007/978-3-319-02279-6
Cyber Crime and Cyber Terrorism Investigator’s Handbook
Babak Akhgar, Andrew Staniforth, and Francesca Bosco
(Editors)
Elsevier, 2014, ISBN 978-0-12-800743-3
http://www.sciencedirect.com/science/book/9780128007433
Cyber Reconnaissance, Surveillance and Defense
Robert Shimonski
Elsevier, 2015, ISBN 978-0-12-801308-3
http://www.sciencedirect.com/science/book/9780128013083
Cyber Security: Analytics, Technology and Automation
Martti Lehto and Pekka Neittaanmaki (Editors)
Springer, 2015, ISBN 978-3-319-18302-2
http://dx.doi.org/10.1007/978-3-319-18302-2
How to Attack and Defend Your Website
Henry Dalziel
Elsevier, 2015, ISBN 978-0-12-802732-5
http://www.sciencedirect.com/science/book/9780128027325
Theoretical and Experimental Methods for Defending Against
DDoS Attacks
Mohammad Reza Khalifeh Soltanian, Iraj Sadegh Amiri
Elsevier, 2016, ISBN 978-0-12-805391-1
http://www.sciencedirect.com/science/book/9780128053911
Inside the Hack of the Century, Parts 1, 2, and 3
Peter Elkind
Fortune (July 1, 2015)
http://fortune.com/sony-hack-part-1/
Cybersecurity’s Human Factor: Lessons from the Pentagon
James A. “Sandy” Winnefeld Jr., Christopher Kirchoff,
and David M. Upton
Harvard Business Review,
Volume 93, Number 8 (September 2015)
http://search.ebscohost.com/login.aspx?direct=true&db=buh&
AN=108820482&site=bsi-live
Hacking Web Intelligence: Open Source Intelligence and Web
Reconnaissance Concepts and Techniques
Sudhanshu Chauhan and Nutan Kumar Panda
Elsevier, 2015, ISBN 978-0-12-801867-5
http://www.sciencedirect.com/science/book/9780128018675
Data Protection from Insider Threats
Elisa Bertino
Morgan & Claypool, 2012, ISBN 9781608457694
http://dx.doi.org/10.2200/S00431ED1V01Y201207DTM028
Detecting and Combating Malicious Email
Julie JCH Ryan and Cade Kamachi
Elsevier, 2015, ISBN 978-0-12-800110-3
http://www.sciencedirect.com/science/book/9780128001103
Phishing Dark Waters: The Offensive and Defensive Sides of
Malicious E-mails
Christopher Hadnagy and Michele Fincher
Wiley, 2015, ISBN 9781119183624
http://dx.doi.org/10.1002/9781119183624
Emerging Trends in ICT Security
Babak Akhgar and Hamid R. Arabnia (Editors)
Elsevier, 2014, ISBN 978-0-12-411474-6
http://www.sciencedirect.com/science/book/9780124114746
Human Aspects of Information Security, Privacy, and Trust,
First International Conference, HAS 2013
Louis Marinos and Ioannis Askoxylakis (Editors)
Springer, 2013, ISBN 978-3-642-39345-7
http://dx.doi.org/10.1007/978-3-642-39345-7
Measuring and Communicating Security’s Value:
A Compendium of Metrics for Enterprise Protection
George Campbell
Elsevier, 2015, ISBN 978-0-12-802841-4
http://www.sciencedirect.com/science/book/9780128028414
Information Security Analytics:
Finding Security Insights, Patterns, and Anomalies in Big Data
Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto,
and Jason L. Martin
Elsevier, 2015, ISBN 978-0-12-800207-0
http://www.sciencedirect.com/science/book/9780128002070
Introduction to Intelligent Surveillance
Wei Qi Yan
Springer, 2016, ISBN 978-3-319-28515-3
http://dx.doi.org/10.1007/978-3-319-28515-3
Industrial Espionage and Technical Surveillance Counter
Measures
Iosif Androulidakis and Fragkiskos – Emmanouil Kioupakis
Springer, 2016, ISBN 978-3-319-28666-2
http://dx.doi.org/10.1007/978-3-319-28666-2
Targeted Cyber Attacks:
Multi-staged Attacks Driven by
Exploits and Malware
Aditya K. Sood and Richard Enbody
Elsevier, 2014, ISBN 978-0-12-800604-7
http://www.sciencedirect.com/science/book/9780128006047
Towards Fundamental Science of Cyber Security
Alexander Kott
http://dx.doi.org/10.1007/978-1-4614-7597-2_1
Network Science and Cybersecurity
Robinson E. Pino (Editor)
Springer, 2014, ISBN 978-1-4614-7597-2
http://dx.doi.org/10.1007/978-1-4614-7597-2
The Psychology of Security
Ryan West
Communications of the ACM,
Volume 51, Number 4 (April 2008)
http://dx.doi.org/10.1145/1330311.1330320
Zen and the Art of Information Security
Ira Winkler
Elsevier, 2007, ISBN 978-1-59749-168-6
http://www.sciencedirect.com/science/book/9781597491686
Physical-Layer Security:
From Information Theory to Security Engineering
Matthieu Block and Joao Barros
Cambridge University Press, 2011, ISBN 9780511977985
http://dx.doi.org/10.1017/CBO9780511977985
Analyzing and Defending Against Web-Based Malware
Jian Chang, Krishna K. Venkatasubramanian,
Andrew G. West, and Insup Lee
ACM Computing Surveys, Volume 45, Number 4 (August 2013)
http://dx.doi.org/10.1145/2501654.2501663
Botnets: A survey
Sergio S.C. Silva, Rodrigo M.P. Silva, Raquel C.G. Pinto,
and Ronaldo M. Salles
Computer Networks, Volume 57, Number 2 (February 2013)
http://dx.doi.org/10.1016/j.comnet.2012.07.021
Botnets
Heli Tiirman-Klaar, Jan Gassen, Elmar Gerhards-Padilla,
and Peter Martini
Springer, 2013, ISBN 978-1-4471-5216-3
http://dx.doi.org/10.1007/978-1-4471-5216-3
Intelligent Systems for Security Informatics
Christopher Yang, Wenji Mao, Xiaolong Zheng, and Hui Wang
Elsevier, 2013, ISBN 978-0-12-404702-0
http://www.sciencedirect.com/science/book/9780124047020
Advanced Persistent Threat:
Understanding the Danger and How to Protect Your
Organization
Eric Cole
Elsevier, 2013, ISBN 978-1-59749-949-1
http://www.sciencedirect.com/science/book/9781597499491
Spyware and Adware
John Aycock
Springer, 2011, ISBN 978-0-387-77741-2
http://dx.doi.org/10.1007/978-0-387-77741-2
Identifying Malicious Code Through Reverse Engineering
Abhishek Singh (Editor)
Springer, 2009, ISBN 978-0-387-89468-3
http://dx.doi.org/10.1007/978-0-387-89468-3
SQL Injection Attacks and Defense, Second Edition
Justin Clarke
Elsevier, 2012, ISBN 978-1-59749-963-7
http://www.sciencedirect.com/science/book/9781597499637
Securing SQL Server: Protecting Your Database from Attacks,
Third Edition
Denny Cherry
Elsevier, 2015, ISBN 978-0-12-801275-9
http://www.sciencedirect.com/science/book/9780128012758
Windows 2012 Server Network Security:
Securing Your Windows Network Systems and Infrastructure
Derrick Rountree
Elsevier, 2013, ISBN 978-1-59749-958-3
http://www.sciencedirect.com/science/book/9781597499583
Windows Server 2012 Security from End to Edge and Beyond:
Architecting, Designing, Planning, and Deploying
Windows Server 2012 Security Solutions
Thomas W. Shinder, Yuri Diogenes, and Debra Littlejohn
Shinder
Elsevier, 2013, ISBN 978-1-59749-980-4
http://www.sciencedirect.com/science/book/9781597499804
http://dx.doi.org/10.1016/B978-1-59749-980-4.09985-4
Investigating Computer-Related Crime, Second Edition
Peter Stephenson and Keith Gilbert
CRC Press, 2013, ISBN 978-1-4200-0370-3
http://dx.doi.org/10.1201/b14664
Cybercrimes: A Multidisciplinary Analysis
Sumit Ghosh and Elliot Turrini
Springer, 2010, ISBN 978-3-642-13547-7
http://dx.doi.org/10.1007/978-3-642-13547-7
RE’09: Security Requirements Engineering (special issue)
Eric Dubois and Haralambos Mouratidis (Editors)
Requirements Engineering,
Volume 15, Number 1 (March 2010)
http://link.springer.com/journal/766/15/1/
6. Information Security Applications Based on Biomolecular
Systems
Guinevere Strack, Heather R. Lukarift,
Glenn R. Johnson, and Evgeny Katz
http://dx.doi.org/10.1002/9783527645480.ch6
Biomolecular Information Processing:
From Logic Systems to Smart Sensors and Actuators
Evgeny Katz (Editor)
Wiley, 2012, ISBN 9783527645480
http://dx.doi.org/10.1002/9783527645480
Cyber Security Policy Guidebook
Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer,
Marcus H. Sachs, Jeffrey Schmidt, and Joseph Weiss
Wiley, 2012, ISBN 9781118241530
http://dx.doi.org/10.1002/9781118241530
Cryptographic Protocol:
Security Analysis Based on Trusted Freshness
Ling Dong and Kefei Chen
Springer, 2012, ISBN 978-3-642-24073-7
http://dx.doi.org/10.1007/978-3-642-24073-7
Engineering Secure Two-Party Computation Protocols:
Design, Optimization, and Applications of Efficient
Secure Function Evaluation
Thomas Schneider
Springer, 2012, ISBN 978-3-642-30042-4
http://dx.doi.org/10.1007/978-3-642-30042-4
Secure Multi-Party Non-Repudiation Protocols and
Applications
Jose A. Onieva, Javier Lopez, and Jianying Zhou
Springer, 2009, ISBN 978-0-387-75630-1
http://dx.doi.org/10.1007/978-0-387-75630-1
Advances in Intelligence and Security Informatics
Wenji Mao and Fei-Yue Wang
Elsevier, 2012, ISBN 978-0-12 397200-2
http://www.sciencedirect.com/science/book/9780123972002
Balanced Secure Scan:
Partial Scan Approach for Secret Information Protection
Michiko Inoue, Tomokazu Yoneda, Mineo Hasegawa,
and Hideo Fujiwara
Journal of Electronic Testing,
Volume 27, Number 2 (April 2011)
http://dx.doi.org/10.1007/s10836-011-5204-0
Building an Information Security Awareness Program:
Defending Against Social Engineering and Technical Threats
Bill Gardner and Valerie Thomas
Elsevier, 2014, ISBN 978-0-12-419967-5
http://www.sciencedirect.com/science/book/9780124199675
Client-Side Attacks and Defense
Robert Shimonski and Sean-Philip Oriyano
Elsevier, 2012, ISBN 978-1-59749-590-5
http://www.sciencedirect.com/science/book/9781597495905
The Hacker’s Guide to OS X: Exploiting OS X from the Root Up
Rob Bathurst, Russ Rogers, and Alijohn Ghassemlouei
Elsevier, 2013, ISBN 978-1-59749-950-7
http://www.sciencedirect.com/science/book/9781597499507
Thor’s Microsoft Security Bible:
A Collection of Practical Security Techniques
Timothy “Thor” Mullen
Elsevier, 2011, ISBN 978-1-59749-572-1
http://www.sciencedirect.com/science/book/9781597495721
Embedded Systems Security: Practical Methods for
Safe and Secure Software and Systems Development
David Kleidermacher and Mike Kleidermacher
Elsevier, 2012, ISBN 978-0-12-386886-2
http://www.sciencedirect.com/science/book/9780123868862
Security Basics for Computer Architects
Ruby B. Lee
Morgan & Claypool, 2013, ISBN 9781627051569
http://dx.doi.org/10.2200/S00512ED1V01Y201305CAC025
Game Theory Meets Network Security and Privacy
Mohammad Hossein Manshael, Quanyan Zhu, Tansu Alpcan,
Tamer Basar, and Jan-Pierre Hubaux
ACM Computer Surveys, Volume 45, Number 3 (June 2013)
http://dx.doi.org/10.1145/2480741.2480742
Security and Game Theory:
Algorithms, Deployed Systems, Lessons Learned
Milind Tambe
Cambridge University Press, 2012, ISBN 9780511973031
http://dx.doi.org/10.1017/CBO9780511973031
Insider Threat:
Protecting the Enterprise from Sabotage, Spying, and Theft
Eric Cole and Sandra Ring
Elsevier, 2006, ISBN 978-1-59749-048-1
http://www.sciencedirect.com/science/book/9781597490481
Information Assurance and Security Education and Training:
WISE 8, WISE 7, and WISE 6 Revised Selected Papers
Ronald C. Dodge Jr. and Lynn Futcher (Editors)
Springer, 2013, ISBN 978-3-642-39377-8
http://dx.doi.org/10.1007/978-3-642-39377-8
Rethinking computing insanity, practice and research
Gene Spafford (December 15, 2008)
http://www.cerias.purdue.edu/site/blog/post/rethinking_com
puting_insanity_practice_and_research/
Perfect Password: Selection, Protection, Authentication
Mark Burnett and Dave Kleiman
Elsevier, 2005, ISBN 978-1-59749-041-2
http://www.sciencedirect.com/science/book/9781597490412
Online Security for the Business Traveler
Deborah Gonzalez
Elsevier, 2014, ISBN 978-0-12-800069-4
http://www.sciencedirect.com/science/book/9780128000694
Workshop Program
8th USENIX Workshop on Offensive Technologies, WOOT’14
https://www.usenix.org/conference/woot14/workshop-
program
Back to the Table of Contents
=======================================
Hacking and Penetration Testing ==========
Essential Skills for Hackers
Kevin Cardwell
Elsevier, 2016, ISBN 978-0-12-804755-2
http://www.sciencedirect.com/science/book/9780128047552
The Antivirus Hacker’s Handbook
Joxean Koret and Elias Bachaalany
Wiley, 2015, ISBN 9781119183525
http://dx.doi.org/10.1002/9781119183525
The Basics of Hacking and Penetration Testing:
Ethical Hacking and Penetration Testing Made Easy,
Second Edition
Patrick Engebretson
Elsevier, 2013, ISBN 978-0-12-411644-3
http://www.sciencedirect.com/science/book/9780124116443
The Basics of Web Hacking: Tools and Techniques to Attack
the Web
Josh Pauli
Elsevier, 2013, ISBN 978-0-12-416600-4
http://www.sciencedirect.com/science/book/9780124166004
Google Hacking for Penetration Testers; Third Edition
Johnny Lang, Bill Gardner, and Justin Brown
Elsevier, 2016, ISBN 978-0-12-802964-0
http://www.sciencedirect.com/science/book/9780128029640
Hacking and Penetration Testing with Low Power Devices
Philip Polstra
Elsevier, 2015, ISBN 978-0-12-800751-8
http://www.sciencedirect.com/science/book/9780128007518
Hacking Web Apps:
Detecting and Preventing Web Applications Security Problems
Mike Shema
Elsevier, 2012, ISBN 978-1-59749-951-4
http://www.sciencedirect.com/science/book/9781597499514
Hacking with Kali: Practical Penetration Testing Techniques
James Broad and Andrew Binder
Elsevier, 2014, ISBN 978-0-12-407749-2
http://www.sciencedirect.com/science/book/9780124077492
Low Tech Hacking
Jack Wiles, Terry Gudaitis, Jennifer Jabbusch,
Russ Rogers, and Sean Lowther
Elsevier, 2012, ISBN 978-1-59749-665-0
http://www.sciencedirect.com/science/book/9781597496650
Meeting People via WiFi and Bluetooth
Joshua Schroeder
Elsevier, 2016, ISBN 978-0-12-804721-7
http://www.sciencedirect.com/science/book/9780128047217
The Mobile Application Hacker’s Handbook
Dominic Chell, Tyrone Erasmus, Shaun Colley,
and Ollie Whitehouse
Wiley, 2015, ISBN 9781118958506
http://dx.doi.org/10.1002/9781119183655
Network Attacks & Exploitation: A Framework
Matthew Monte
Wiley, 2015, ISBN 9781119183440
http://dx.doi.org/10.1002/9781119183440
Professional Penetration Testing:
Creating and Learning in a Hacking Lab, Second Edition
Thomas Wilhelm
Elsevier, 2013, ISBN 978-1-59749-993-4
http://www.sciencedirect.com/science/book/9781597499934
Social Engineering Penetration Testing:
Executing Social Engineering Pen Tests,
Assessments and Defense
Gavin Watson, Andrew Mason, and Richard Ackroyd
Elsevier, 2014, ISBN 978-0-12-420124-8
http://www.sciencedirect.com/science/book/9780124201248
Wireless Reconnaissance in Penetration Testing
Matthew Neely, Alex Hamerstone, and Chris Sanyk
Elsevier, 2013, ISBN 978-1-59749-731-2
http://www.sciencedirect.com/science/book/9781597497312
Back to the Table of Contents
=======================================
Homeland Security and Cyber Warfare =====
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Homeland Security: The Essentials
Jane A. Bullock, George D. Haddow, and Damon P. Coppola
Elsevier, 2013, ISBN 978-0-12-415803-0
http://www.sciencedirect.com/science/book/9780124158030
Introduction to Cyber-Warfare: A Multidisciplinary Approach
Paolo Shakarian, Jana Shakarian, and Andrew Ruef
Elsevier, 2013, ISBN 978-0-12-407814-7
http://www.sciencedirect.com/science/book/9780124078147
Cyber War, Cyber Space:
National Security and Privacy in the Global Economy
Panel: Steven Bellovin, Yvo Desmedt, Amir Hertzberg, and
Bart Preneel; Moderator: Thomas Ferguson
New Economic Thinking (2014)
https://www.youtube.com/watch?v=Zzy0NT7vbxo
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Advanced Persistent Threat: Understanding the Danger and
How to Protect Your Organization
Eric Cole
Elsevier, 2013, ISBN 978-1-59749-949-1
http://www.sciencedirect.com/science/book/9781597499491
Application of Big Data for National Security:
A Practitioner’s Guide to Emerging Technologies
Babak Akhgar, Gregory B. Saathoff, Hamid R. Arabnia,
Richard Hill, Andrew Staniforth, and Petra Saskia Bayerl
(Editors)
Elsevier, 2015, ISBN 978-0-12-801967-2
http://www.sciencedirect.com/science/book/9780128019672
The Basics of Cyber Warfare:
Understanding the Fundamentals of Cyber Warfare in
Theory and Practice
Steve Winterfeld and Jason Andress
Elsevier, 2013, ISBN 978-0-12-404737-2
http://www.sciencedirect.com/science/book/9780124047372
Counterterrorism and Cybersecurity:
Total Information Awareness, Second edition
Newton Lee
Springer, 2015, ISBN 978-3-319-17244-6
http://dx.doi.org/10.1007/978-3-319-17244-6
Cyber Crime and Cyber Terrorism Investigator’s Handbook
Babak Akhgar, Andrew Staniforth, and Francesca Bosco
(Editors)
Elsevier, 2014, ISBN 978-0-12-800743-3
http://www.sciencedirect.com/science/book/9780128007433
Cyberterrorism: Understanding, Assessment, and Response
Thomas M. Chen, Lee Jarvis, and Stuart Macdonald (Editors)
Springer, 2014, ISBN 978-1-4939-0962-9
http://dx.doi.org/10.1007/978-1-4939-0962-9
Cyber Warfare: Building the Scientific Foundation
Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian,
Vipin Swarup, and Cliff Wang (Editors)
Springer, 2015, ISBN 978-3-319-14039-1
http://dx.doi.org/10.1007/978-3-319-14039-1
Cyber Warfare:
Techniques, Tactics and Tools for Security Practitioners,
Second Edition
Jason Andress and Steve Winterfeld
Elsevier, 2014, ISBN 978-0-12-416672-1
http://www.sciencedirect.com/science/book/9780124166721
Cyber Warfare and the Laws of War
Heather Harrison Dinniss
Cambridge University Press, 2013, ISBN 9780511894527
http://dx.doi.org/10.1017/CBO9780511894527
Handbook of Computational Approaches to Counterterrorism
V.S. Subrahmanian (Editor)
Springer, 2013, ISBN 978-1-4614-5311-6
http://dx.doi.org/10.1007/978-1-4614-5311-6
Intelligent Methods for Cyber Warfare
Ronald R. Yager, Marek Z. Reformat, and Naïf Alajlan (Editors)
Springer, 2015, ISBN 978-3-319-08624-8
http://dx.doi.org/10.1007/978-3-319-08624-8
Strategic Intelligence Management:
National Security Imperatives and Information and
Communication Technologies
Babak Akhgar and Simeon Yates (Editors)
Elsevier, 2013, ISBN 978-0-12-407191-9
http://www.sciencedirect.com/science/book/9780124071919
Back to the Table of Contents
=======================================
Managing Information Security ===========
Building a Corporate Culture of Security:
Strategies for Strengthening Organizational Resiliency
John Sullivant
Elsevier, 2016, ISBN 978-0-12-802019-7
http://www.sciencedirect.com/science/book/9780128020197
Infosec Management Fundamentals
Henry Dalziel
Elsevier, 2015, ISBN 978-0-12-804172-7
http://www.sciencedirect.com/science/book/978012804
1727
Becoming a Global Chief Security Executive Officer
Roland Cloutier
Elsevier, 2016, ISBN 978-0-12-802782-0
http://www.sciencedirect.com/science/book/9780128027820
Building an Intelligence-Led Security Program
Allan Liska
Elsevier, 2015, ISBN 978-0-12-802145-3
http://www.sciencedirect.com/science/book/9780128021453
Designing and Building A Security Operations Center
David Nathans
Elsevier, 2015, ISBN 978-0-12-800899-7
http://www.sciencedirect.com/science/book/9780128008997
Exploring the Security Landscape: Non-Traditional Security
Challenges
Anthony J. Masys (Editor)
Springer, 2016, ISBN 978-3-319-27914-5
http://dx.doi.org/10.1007/978-3-319-27914-5
How to Cheat at Managing Information Security
Mark Osborne
Elsevier, 2006, ISBN 978-1-59749-110-5
http://www.sciencedirect.com/science/book/9781597491105
The Manager’s Guide to Web Application Security:
A Concise Guide to the Weaker Side of the Web
Ron Lepofsky
Springer, 2014, ISBN 978-1-4842-0148-0
http://dx.doi.org/10.1007/978-1-4842-0148-0
Managing Information Security, Second Edition
John R. Vacca (Editor)
Elsevier, 2014, ISBN 978-0-12-416688-2
http://www.sciencedirect.com/science/book/9780124166882
Securing Social Media in the Enterprise
Henry Dalziel
Elsevier, 2015, ISBN 978-0-12-804180-2
http://www.sciencedirect.com/science/book/9780128041802
Security Planning: An Applied Approach
Susan Lincke
Springer, 2015, ISBN 978-3-319-16027-6
http://dx.doi.org/10.1007/978-3-319-16027-6
Back to the Table of Contents
=======================================
Economics of Information Security and Privacy
=======================================
Blackhatonomics:
An Inside Look at the Economics of Cybercrime
Will Gragido, Daniel Molina, John Pirc, and Nick Selby
Elsevier, 2013, ISBN 978-1-59749-740-4
http://www.sciencedirect.com/science/book/9781597497404
Economics of Information Security and Privacy
Tyler Moore, David J. Pym, and Christos Ioannidis (Editors)
Springer, 2010, ISBN 978-1-4419-6967-5
http://dx.doi.org/10.1007/978-1-4419-6967-5
The Economics of Information Security and Privacy
Rainer Bohme (Editor)
Springer, 2013, ISBN 978-3-642-39498-0
http://dx.doi.org/10.1007/978-3-642-39498-0
Economics of Information Security and Privacy III
Bruce Schneier (Editor)
Springer, 2013, ISBN 978-1-4614-1981-5
http://dx.doi.org/10.1007/978-1-4614-1981-5
Back to the Table of Contents
=======================================
Information Hiding and Steganography =====
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Hide and Seek: An Introduction to Steganography
Niels Provos and Peter Honeyman
IEEE Security & Privacy, Volume 1, Number 3 (May-June 2003)
http://niels.xtdnet.nl/papers/practical.pdf
Chapter 2 – An Overview of Steganography
Gary C. Kessler and Chet Hosmer
Advances in Computers, Volume 83
Elsevier, 2011, ISBN 978-0-12-385510-7
http://dx.doi.org/10.1016/B978-0-12-385510-7.00002-3
Current status and key issues in image steganography:
A survey
Mansi S. Subhedar and Vijay H. Mankar
Computer Science Review, Volumes 13-14 (November 2014)
http://dx.doi.org/10.1016/j.cosrev.2014.09.001
Transactions on Data Hiding and Multimedia Security X
Yun Q. Shi (Editor)
Springer, 2015, ISBN 978-2-662-46739-8
http://dx.doi.org/10.1007/978-3-662-46739-8
Trends in Steganography
Elzbieta Zielinska, Wojciech Mazurczyk,
and Krzysztof Szczypiorski
Communications of the ACM,
Volume 57, Number 3 (March 2014)
http://dx.doi.org/10.1145/2566590.2566610
Data Hiding:
Exposing Concealed Data in Multimedia,
Operating Systems, Mobile Devices and Network
Protocols
Michael Raggo and Chet Hosmer
Elsevier, 2013, ISBN 978-1-59749-743-5
http://www.sciencedirect.com/science/book/978159749
7435
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Cyber Warfare: Steganography vs. Steganalysis
Huaiqing Wang and Shuozhong Wang
Communications of the ACM,
Volume 47, Number 10 (October 2004)
http://dx.doi.org/10.1145/1022594.1022597
Digital image steganography:
Survey and analysis of current methods
Abbas Cheddad, Joan Condelll, Kevin Curran,
and Paul Mc Kevitt
Signal Processing, Volume 90, Number 3 (2010)
http://dx.doi.org/10.1016/j.sigpro.2009.08.010
Disappearing Cryptography – Information Hiding:
Steganography & Watermarking, Third Edition
Peter Wayner
Elsevier, 2009, ISBN 978-0-12-374479-1
http://www.sciencedirect.com/science/book/9780123744791
Information Hiding: First International Workshop
Ross Anderson (Editor)
Springer, 1996, ISBN 978-3-540-49589-5, LNCS 1174
http://dx.doi.org/10.1007/3-540-61996-8
Information Hiding: 14th International Conference, IH 2012
Matthias Kirchner and Dipak Ghosal (Editor)
Springer, 2013, ISBN 978-3-642-36373-3, LNCS 7692
http://dx.doi.org/10.1007/978-3-642-36373-3
Information Hiding in Speech Signals for
Secure Communication
Wu Zhijun
Elsevier, 2015, ISBN 978-0-12-801328-1
http://www.sciencedirect.com/science/book/9780128013281
Information Hiding: Steganography and Watermarking –
Attacks and Countermeasures
Neil F. Johnson, Zoran Duric, and Sushil Jajodia
Springer, 2001, ISBN 978-1-4615-4375-6
http://dx.doi.org/10.1007/978-1-4615-4375-6
Machine Learning in Image Steganalysis
Hans Georg Schaathun
Wiley, 2012, ISBN9781118437957
http://dx.doi.org/10.1002/9781118437957
The prisoner’s problem and the subliminal channel
Gustavus J. Simmons
http://dx.doi.org/10.1007/978-1-4684-4730-9_5
Advances in Cryptology: Proceedings of Crypto 83
David Chaum (Editor)
Springer, 1984, ISBN 978-1-4684-4730-9
http://dx.doi.org/10.1007/978-1-4684-4730-9
Back to the Table of Contents
=======================================
Data Encryption ========================
Digital Signatures
Jonathan Katz
Springer, 2010, ISBN 978-0-387-27712-7
http://dx.doi.org/10.1007/978-0-387-27712-7
Electronic Postage Systems: Technology, Security Economics
Gerrit Bleumer
Springer, 2007, ISBN 978-0-387-44606-6
http://dx.doi.org/10.1007/978-0-387-44606-6
Functional Encryption:
A New Vision for Public-Key Cryptography
Dan Boneh, Amit Sahai, and Brent Waters
Communications of the ACM,
Volume 55, Number 11 (November 2012)
http://dx.doi.org/10.1145/2366316.2366333
Identity-Based Encryption
Sanjit Chatterjee and Palash Sarkar
Springer, 2011, ISBN 978-1-4419-9383-0
http://dx.doi.org/10.1007/978-1-4419-9383-0
Practical Signcryption
Alexander W. Dent and Yuliang Zheng (Editors)
Springer, 2010, ISBN 978-3-540-89411-7
http://dx.doi.org/10.1007/978-3-540-89411-7
Simple Steps to Data Encryption:
A Practical Guide to Secure Computing
Peter Loshin
Elsevier, 2013, ISBN 978-0-12-411483-8
http://www.sciencedirect.com/science/book/9780124114838
Back to the Table of Contents
=======================================
Hardening Software =====================
Aspect-Oriented Security Hardening of UML Design Methods
Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi,
Lingyu Wang, Mariam Nouth, Raha Ziarati, Dima Alhadidi,
Chamseddine Talhi, and Vitor Lima
Springer, 2015, ISBN 978-3-319-16106-8
http://dx.doi.org/10.1007/978-3-319-16106-8
Hardening Azure Applications
Suren Machiraju and Suraj Gaurav
Springer, 2015, ISBN 978-1-4842-0920-2
http://dx.doi.org/10.1007/978-1-4842-0920-2
Hardening Linux
James Turnbull
Springer, 2005, ISBN 978-1-4302-0005-5
http://dx.doi.org/10.1007/978-1-4302-0005-5
Hardening Windows, Second Edition
Jonathan Hassell
Springer, 2006, ISBN 978-1-4302-0083-3
http://dx.doi.org/10.1007/978-1-4302-0083-3
Network Hardening
Lingyu Wang, Massimiliano Albanese, and Sushil Jajodia
Springer, 2014, ISBN 978-3-319-04612-9
http://dx.doi.org/10.1007/978-3-319-04612-9
Back to the Table of Contents
=======================================
Network Security =======================
Also see:
Telecommunications and Networking shelf in the
Information Technology … section;
Sensor Networks shelf in the
Information Technology … section.
Guide to Computer Network Security, Third Edition
Joseph Migga Kizza
Springer, 2015, ISBN 978-1-4471-6654-2
http://dx.doi.org/10.1007/978-1-4471-6654-2
Network and System Security, Second Edition
John R. Vacca (Editor)
Elsevier, 2014, ISBN 089-0-12-416689-9
http://www.sciencedirect.com/science/book/9780124166899
Network Attacks & Exploitation: A Framework
Matthew Monte
Wiley, 2015, ISBN 9781119183440
http://dx.doi.org/10.1002/9781119183440
The Network Security Test Lab: A Step-by-Step Guide
Michael Gregg
Wiley, 2015, ISBN 9781119183433
http://dx.doi.org/10.1002/9781119183433
PCI Compliance: Understand and Implement Effective PCI Data
Security Standard Compliance; Fourth Edition
Branden R. Williams and Anton A. Chuvakin
Elsevier, 2015, ISBN 978-0-12-801579-7
http://www.sciencedirect.com/science/book/9780128015797
PCI DSS 3.1: The Standard That Killed SSL
Branden R. Williams
Elsevier, 2016, ISBN 978-0-12-804627-2
http://www.sciencedirect.com/science/book/9780128046272
Emerging Trends in ICT Security
Babak Akhgar and Hamid R. Arabnia (Editors)
Elsevier, 2014, ISBN 978-0-12-411474-6
http://www.sciencedirect.com/science/book/9780124114746
Python Passive Network Mapping: P2NMAP
Chet Hosmer
Elsevier, 2015, ISBN 978-0-12-802721-9
http://www.sciencedirect.com/science/book/9780128027219
Dynamic Secrets in Communication Security
Sheng Xiao, Weibo Gong, and Don Towsley
Springer, 2014, ISBN 978-1-4614-7831-7
http://dx.doi.org/10.1007/978-1-4614-7831-7
Securing VoIP: Keeping Your VoIP Network Safe
Regis J. (Bud) Bates
Elsevier, 2015, ISBN 978-0-12-417039-1
http://www.sciencedirect.com/science/book/9780124170391
A study of Black Hole Attack Solutions:
On AODV Routing Protocol in MANET
Elahe Fazeldehkordi, Iraj Sadegh Amiri,
and Oluwatobi Ayodeji Akanbi
Elsevier, 2016, ISBN 978-0-12-805367-6
http://www.sciencedirect.com/science/book/9780128053676
Signal Processing Approaches to Secure Physical Layer
Communications in Multi-Antenna Wireless Systems
Y.-W. Peter Hong, Pang-Chang Lan, and C.-C. Jay Kuo
Springer, 2014, ISBN 978-981-4560-14-6
http://dx.doi.org/10.1007/978-981-4560-14-6
Introduction to UTM (Unified Threat Management) (Ch 1)
http://dx.doi.org/10.1016/B978-1-59-749747-3.00001-6
UTM Security with Fortinet: Mastering FortiOS
Kenneth Tam, Martin H. Hoz Salvador, Ken McAlpine,
Rick Basile, Bruce Matsugu, and Josh More
Elsevier, 2013, ISBN 978-1-59749-747-3
http://www.sciencedirect.com/science/book/9781597497473
The Death of the Internet
Markus Jacobsson (Editor)
Wiley, 2012, ISBN 9781118312551
http://dx.doi.org/10.1002/9781118312551
Applied Network Security Monitoring:
Collection, Detection, and Analysis
Chris sanders and Jason Smith
Elsevier, 2014, ISBN 978-0-12-417208-1
http://www.sciencedirect.com/science/book/9780124172081
Network Intrusion Detection and Prevention:
Concepts and Techniques
Ali A. Ghorbani, Wei Lu, and Mahbod Tavallaee
Springer, 2010, ISBN 978-0-387-88771-5
http://dx.doi.org/10.1007/978-0-387-88771-5
Network Intrusion Analysis: Methodologies, Tools,
and Techniques for Incident Analysis and Response
Joe Fichera and Steven Bolt
Elsevier, 2013, ISBN 978-1-59749-962-0
http://www.sciencedirect.com/science/book/9781597499620
Network Hardening:
An Automated Approach to Improving Network Security
Lingyu Wang, Massimiliano Albanese, and Sushil Jajodia
Springer, 2014, ISBN 978-3-319-04612-9
http://dx.doi.org/10.1007/978-3-319-04612-9
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Security and Privacy Protection in Visual Sensor Networks:
A Survey
Thomas Winkler and Bernhard Rinner
ACM Computing Surveys, Volume 47, Number 1 (July 2014)
http://dx.doi.org/10.1145/2545883
Back to the Table of Contents
=======================================
Sensor Network Security =================
Secure Wireless Sensor Networks: Threats and Solutions
Mauro Conti
Springer, 2016, ISBN 978-1-4939-3460-7
http://dx.doi.org/10.1007/978-1-4939-3460-7
Security in Wireless Sensor Networks
George S. Oreku and Tamara Pazynyuk
Springer, 2016, ISBN 978-3-319-21269-2
http://dx.doi.org/10.1007/978-3-319-21269-2
Security for Wireless Sensor Networks using Identity-Based
Cryptography
Harsh Kupwade Patil and Stephen A. Szygenda
CRC Press, 2013, ISBN 978-1-4398-6902-4
http://dx.doi.org/10.1201/b13080
Back to the Table of Contents
=======================================
Mobile Network Security ================
Identifying back doors, attack points,
and surveillance mechanisms in iOS devices
Jonathan Zdziarski
Digital Investigation, Volume 11, Number 1 (March 2014)
http://dx.doi.org/10.1016/j.diin.2014.01.001
Mobile Authentication: Problems and Solutions
Markus Jacobson
Springer, 2013, ISBN 978-1-4614-4878-5
http://dx.doi.org/10.1007/978-1-4614-4878-5
Securing Android: A Survey, Taxonomy, and Challenges
Sufatrio , Darell J. J. Tan, Tong-Wei Chua,
and Vrizlynn L. L. Thing
ACM Computing Surveys, Volume 47, Number 4 (July 2015)
http://dx.doi.org/10.1145/2733306
Security in Mobile Wireless Networks (special issue)
Abderrahim Benslimane, Chadi Assi, Fred Nen-Fu Huang,
and Stamatios V. Kartapoulos (Editors)
Security and Telecommunications Networks,
Volume 3, Numbers 2-3 (March-June 2010)
http://dx.doi.org/10.1002/sec.142
Security Issues in Mobile NFC Devices
Michael Roland
Springer, 2015, ISBN 978-3-319-15488-6
http://dx.doi.org/10.1007/978-3-319-15488-6
Software Test Attacks to Break Mobile and Embedded Devices
Jon Duncan Hagar
CRC Press, 2014, ISBN 978-1-4665-7531-8
http://www.crcnetbase.com/doi/book/10.1201/b15526
Trustworthy Execution on Mobile Devices
Amit Vasudevan, Jonathan M. McCune, and James Newsome
Springer, 2014, ISBN 978-1-4614-8190-4
http://dx.doi.org/10.1007/978-1-4614-8190-4
Wireless Mobile Internet Security, Second Edition
Man Young Rhee
Wiley, 2013, ISBN 9781118512920
http://dx.doi.org/10.1002/9781118512920
Back to the Table of Contents
=======================================
Hardware Security ======================
Rethinking Computers for Cybersecurity
Ruby B. Lee
IEEE Computer, Volume 48, Number 4 (April 2015)
http://dx.doi.org/10.1109/MC.2015.118
Advanced DPA Theory and Practice:
Towards the Security Limits of Secure Embedded Circuits
Eric Peeters
Springer, 2013, ISBN 978-1-4614-6783-0
http://dx.doi.org/10.1007/978-1-4614-6783-0
Hardware Security: Design, Threats, and Safeguards
Debdeep Mukhapadhyay and Rajat Subhra Chakraborty
CRC Press, 2015, ISBN 978-1-4398-9584-9
http://dx.doi.org/10.1201/b17555
Integrated Circuit Authentication:
Hardware Trojans and Counterfeit Detection
Mohammad Tehranipoor, Hassan Salmani, and Xuehui Zhang
Springer, 2014, ISBN 978-3-319-00816-5
http://dx.doi.org/10.1007/978-3-319-00816-5
Introduction to Hardware Security and Trust
Mohammad Tehranipoor and Cliff Wang (Editors)
Springer, 2012, ISBN 9781-4419-8080-9
http://dx.doi.org/10.1007/978-1-4419-8080-9
Physical Unclonable Functions in Theory and Practice
Christoph Bohm and Maximilian Hofer
Springer, 2013, ISBN 978-1-4614-5040-5
http://dx.doi.org/10.1007/978-1-4614-5040-5
Secure Smart Embedded Devices, Platforms and Applications
Konstantinos Markantonakis and Keith Mayes (Editors)
Springer, 2014, ISBN 978-1-4614-7915-4
http://dx.doi.org/10.1007/978-1-4614-7915-4
Secure System Design and Trustable Computing
Chip-Hong Chang and Miodrag Potkonjak (Editors)
Springer, 2016, ISBN 978-3-319-14971-4
http://dx.doi.org/10.1007/978-3-319-14971-4
A Survey of Security Issues in Hardware Virtualization
Gabor Pek, Levente Buttyan, and Boldizsar Bencsath
ACM Computing Surveys, Volume 45, Number 3 (June 2013)
http://dx.doi.org/10.1145/2480741.2480757
Trustworthy Reconfigurable Systems:
Enhancing the Security Capabilities of Reconfigurable
Hardware Architectures
Thomas Feller
Springer, 2014, ISBN 978-3-658-07005-2
http://dx.doi.org/10.1007/978-3-658-07005-2
Back to the Table of Contents
=======================================
RFID Security ==========================
Also see:
RFID shelf in the Information Technology, … section.
Classifying RFID attacks and defenses
Aikaterini Mitrokotsa, Melanie R. Rieback, and Andrew S.
Tanenbaum
Information Systems Frontiers,
Volume 12, Number 5 (November 2010)
http://dx.doi.org/10.1007/s10796-009-9210-z
The Evolution of RFID Security
Melanie R. Rieback, Bruno Crispo, and Andrew S. Tanenbaum
http://dx.doi.org/10.1109/MPRV.2006.17
IEEE Pervasive Computing,
Volume 5, Number 1 (January-March 2006)
Networked RFID Systems and Lightweight Cryptography:
Raising Barriers to Product Counterfeiting
Peter H. Cole and Damith C. Ranasinghe
Springer, 2008, ISBN 978-3-540-71641-9
http://dx.doi.org/10.1007/978-3-540-71641-9
RFID Security:
Techniques, Protocols and System-on-Chip Design
Paris Kitsos and Yan Zhang (Editors)
Springer, 2008, ISBN 978-0-387-76481-8
http://dx.doi.org/10.1007/978-0-387-76481-8
RFID Security and Privacy
Yingjiu Li, Robert H. Deng, and Elisa Bertino
Morgan & Claypool, 2014, ISBN 9781627053266
http://dx.doi.org/10.2200/S00550ED1V01Y201311SPT007
RFID Security & Privacy Lounge
Information Security Group, Universite catholique de Louvain
http://www.avoine.net/rfid/
Back to the Table of Contents
=======================================
Internet of Things (IoT) Security ===========
Also see:
Internet of Things (IoT) shelf in the
Information Technology, … section.
The Internet of Things Has Arrived – And So Have Massive
Security Issues
Andrew Rose (January 11, 2013)
http://www.wired.com/opinion/2013/01/securing-the-
internet-of-things/
Can You Trust Your Fridge?
Alan Grau
IEEE Spectrum, Volume 52, Number 3 (March 2015)
http://dx.doi.org/10.1109/MSPEC.2015.7049440
Smart Human Security Framework Using Internet of Things,
Cloud and Fog Computing
Vivek Kumar Sehgal, Anubhav Patrick, Ashutosh Soni,
and Lucky Rajput
http://dx.doi.org/10.1007/978-3-319-11227-5_22
Classification Mechanism for IoT Devices towards Creating a
Security Framework
V.J. Jincy and Sudharsan Sundararajan
http://dx.doi.org/10.1007/978-3-319-11227-5_23
Intelligent Distributed Systems
Rajkumar Buyya and Sabu M. Thampi (Editors)
Springer, 2015, ISBN 978-3-319-11227-5
http://dx.doi.org/10.1007/978-3-319-11227-5
On the features and challenges of security and privacy in
distributed internet of things
Rodrigo Roman, Jianying Zhou, and Javier Lopez
Computer Networks,
Volume 57, Number 10 (5 July 2013)
http://dx.doi.org/10.1016/j.comnet.2012.12.018
Security, privacy and trust in Internet of Things:
The road ahead
S. Sicari, A. Rizzardi, L.A. Grieco, and A. Coen-Porisini
Computer Networks,
Volume 76, (15 January 2015) Pages 146-164
http://dx.doi.org/10.1016/j.comnet.2014.11.008
A survey on trust management for Internet of Things
Zheng Yan, Pen Zhang, and Athanasios V. Vasilakos
Journal of Network and Computer Applications,
Volume 42 (2014)
http://dx.doi.org/10.1016/j.jnca.2014.01.014
Back to the Table of Contents
=======================================
Cloud Security =========================
Also see:
the Virtualization and Cloud Computing shelf in the
Information Technology, … section.
Cloud Computing Security: A Survey
Issa M. Khalil, Abdallah Khreishah, and Muhammad Azeem
Computers, Volume 3, Number 1 (February 2014)
http://dx.doi.org/10.3390/computers3010001
Cloud identity management security issues & solutions:
a taxonomy
Umme Habiba, Rahat Masood, Muhammad Awais Shibli, and
Muaz A Niazi
Complex Adaptive Systems Modeling, Volume 2 (2014)
http://www.casmodeling.com/content/2/1/5
From Security to Assurance in the Cloud: A Survey
Claudio A. Ardagna, Rasool Asal, Ernesto Damiani,
and Quang Hieu Vu
ACM Computing Surveys, Volume 48, Number 1 (August 2015)
http://dx.doi.org/10.1145/2767005
Cloud Storage Security: A Practical Guide
Aaron Wheeler and Michael Winbum
Elsevier, 2015, ISBN 978-0-12-802930-5
http://www.sciencedirect.com/science/book/9780128029305
A survey on securing the virtual cloud
Robert Denz and Stephen Taylor
Journal of Cloud Computing, Volume 2 (December 2013)
http://dx.doi.org/10.1186/2192-113X-2-17
Virtual machine introspection: towards bridging the semantic
gap
Asit More and Shashikala Tapaswi
Journal of Cloud Computing, Volume 3 (December 2014)
http://dx.doi.org/10.1186/s13677-014-0016-2
Cloud Management and Security
Imad M. Abbadi
Wiley, 2014, ISBN 9781118817087
http://dx.doi.org/10.1002/9781118817087
Cloud Security: A Gathering Storm
Mihir Nanavati, Patrick Colp, Bill Aiello, and Andrew Warfield
Communications of the ACM,
Volume 57, Number 5 (May 2014)
http://dx.doi.org/10.1145/2593686
The Cloud Security Ecosystem:
Technical, Legal, Business and Management Issues
Ryan Ko and Kim-Kwang Raymond Choo (Editors)
Elsevier, 2015, ISBN 978-0-12-801595-7
http://www.sciencedirect.com/science/book/9780128015957
Secure the Cloud:
From the Perspective of a Service-Oriented Organization
Arpan Roy, Santonu Sarkar, Rajeshwari Ganesan,
and Geetika Goel
ACM Computing Surveys, Volume 47, Number 3 (April 2015)
http://dx.doi.org/10.1145/2693841
CSA Guide to Cloud Computing:
Implementing Cloud Privacy and Security
Raj Samani, Brian Honan, and Jim Reavis
Elsevier, 2015, ISBN 978-0-12-420125-5
http://www.sciencedirect.com/science/book/9780124201255
Security and Privacy in Cloud Computing: A Survey
Mahesh U. Shankarwar and Ambika V. Pawar
http://dx.doi.org/10.1007/978-3-319-12012-6_1
Proceedings of the 3rd International Conference on
Frontiers of Intelligent Computing:
Theory and Applications (FICTA) 2014, Volume 2
Suresh Chandra Satapathy, Bhabendra Narayan Biswal,
Siba K. Ugata, and J.K. Mandal (Editors)
Springer, 2015, ISBN 978-3-319-12012-6
http://dx.doi.org/10.1007/978-3-319-12012-6
Securing the Cloud:
Cloud Computer Security Techniques and Tactics
Vic (J.R.) Winkler
Elsevier, 2011, ISBN 978-1-59749-592-9
http://www.sciencedirect.com/science/book/9781597495929
Privacy and Security for Cloud Computing
Siani Pearson and George Yee (Editors)
Springer, 2013, ISBN 978-1-4471-4189-1
http://dx.doi.org/10.1007/978-1-4471-4189-1
Building the Infrastructure for Cloud Security:
A Solutions View
Raghu Yeluri and Enrique Castro-Leon
Springer, 2014, ISBN 978-1-4302-6146-9
http://dx.doi.org/10.1007/978-1-4302-6146-9
Collaboration with Cloud Computing:
Security, Social Media, and Unified Communication
Ric Messier
Elsevier, 2014, ISBN 978-0-12-417040-7
http://www.sciencedirect.com/science/book/9780124170407
Secure Cloud Computing
Sushil Jajodia, Krishna Kant, Pierangela Samarati,
Anoop Singhal, Vipin Swarup, and Cliff Wang (Editors)
Springer, 2014, ISBN 978-1-4614-9278-8
http://dx.doi.org/10.1007/978-1-4614-9278-8
High Performance Cloud Auditing and Applications
Keesook J. Han, Baek-Young Choi, and Sejun Song (Editors)
Springer, 2014, ISBN 978-1-4614-3296-8
http://dx.doi.org/10.1007/978-1-4614-3296-8
Security for Cloud Storage Systems
Kan Yang and Xiaohua Jia
Springer, 2014, ISBN 978-1-4614-7873-7
http://dx.doi.org/10.1007/978-1-4614-7873-7
Back to the Table of Contents
=======================================
Smart Grid Security =====================
Smart Grid Security
Sanjay Goel, Yuan Hong, Vagelis Papakonstantinou,
and Dariusz Kloza
Springer, 2015, ISBN 978-4471-6663-4
http://dx.doi.org/10.1007/978-1-4471-6663-4
Smart Grid Security:
Innovative Solutions for a Modernized Grid
Florian Skopik and Paul Smith (Editors)
Elsevier, 2015, ISBN 978-0-12-802122-4
http://www.sciencedirect.com/science/book/9780128021224
Applied Cyber Security and the Smart Grid:
Implementing Security Controls into the Modern Power
Infrastructure
Eric D. Knapp and Raj Samani
Elsevier, 2013, ISBN 978-1-59749-998-9
http://www.sciencedirect.com/science/book/9781597499989
Cyber Security for Smart Grid Communications: Part I
(special Issue)
Rose Qingyang Hu, Yi Qian, Hsiao-Hwa Chen,
and Hussein T. Mouftah (Editors)
IEEE Communications Magazine,
Volume 50, Number 8 (August 2012)
http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=625751
4
Cyber Security for Smart Grid Communications: Part II
(special Issue)
Rose Qingyang Hu, Yi Qian, Hsiao-Hwa Chen,
and Hussein T. Mouftah (Editors)
IEEE Communications Magazine,
Volume 51, Number 1 (August 2013)
http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=640042
7
Back to the Table of Contents
=======================================
Smart City Security =====================
Also see:
Smart City shelf in the
Information Technology … section.
Architecture and Knowledge-Driven Self-Adaptive Security in
Smart Space
Antti Evesti, Jani Suomalainen, and Eila Ovaska
Computers, Volume 2, Number 1 (March 2013)
http://dx.doi.org/10.3390/computers2010034
Invited Paper:
VANET Security:
Going Beyond Cryptographic-Centric Solutions
Dhavy Gantsou
http://dx.doi.org/10.1007/978-981-287-158-9_4
Attack on Security Goals
(Confidentiality, Integrity, Availability) in VANET: A Survey
Irshad Ahmed Sumra, Halabi Bin Hasbullah,
and Jamalul-lail Bin AbManan
http://dx.doi.org/10.1007/978-981-287-158-9_5
Vehicular Ad-hoc Networks for Smart Cities:
First International Workshop, 2014
Anis Laouiti, Amir Qayyum, and Mohamad Naufal Mohamad
Saad (Editors)
Springer, 2015, ISBN 978-981-287-158-9
http://dx.doi.org/10.1007/978-981-287-158-9
Back to the Table of Contents
=======================================
Cyber-Physical Systems Security ===========
Aligning Cyber-Physical System Safety and Security
Giedre Sabaliauskaite and Aditya P. Mathur
http://dx.doi.org/10.1007/978-3-319-12544-2_4
Complex Systems Design & Management Asia:
CSD&M Asia 2014
Michel_Alexandre Cardin, Daniel Krob, Pao Chuen Lui,
Yang How Tan, and Kristin Wood (Editors)
Springer, 2015, ISBN 978-3-319-12544-2
http://dx.doi.org/10.1007/978-3-319-12544-2
Applied Cyber-Physical Systems
Sang C. Suh, U. John Tanik, John N. Carbone,
and Abdullah Eroglu (Editors)
Springer, 2014, ISBN 978-1-4614-7336-7
http://dx.doi.org/10.1007/978-1-4614-7336-7
Cyber-Physical Attacks: A Growing Invisible Threat
George Lukas
Elsevier, 2015, ISBN 978-0-12-801290-1
http://www.sciencedirect.com/science/book/9780128012901
Engineering Safe and Secure Cyber-Physical Systems:
The Specification PEARL Approach
Roman Gumzej
Springer, 2016, ISBN 978-3-319-28905-2
http://dx.doi.org/10.1007/978-3-319-28905-2
Handbook on Securing Cyber-Physical Critical Infrastructure:
Foundations and Challenges
Sajal K. das, Krishna Kant, and Nan Zhang
Elsevier, 2012, ISBN 978-0-12-415815-3
http://www.sciencedirect.com/science/book/9780124158153
MAC Protocols for Cyber-Physical Systems
Fen Xia and Azizur Rahim
Springer, 2016, ISBN 978-3-662-46361-1
http://dx.doi.org/10.1007/978-3-662-46361-1
Security and Privacy for Implantable Medical Devices
Wayne Burleson and Sandro Carrara (Editors)
Springer, 2014, ISBN 978-1-4614-1674-6
http://dx.doi.org/10.1007/978-1-4614-1674-6
Back to the Table of Contents
=======================================
Biometrics ============================
Encyclopedia of Biometrics
Stan Z. Li and Anil K. Jain (Editors)
Springer, Live Reference – Constantly updated,
ISBN 978-3-642-27733-7
http://dx.doi.org/10.1007/978-3-642-27733-7
Multispectral Biometrics: Systems and Applications
David Zhang, Zhenhua Guo, and Yazhuo Gong
Springer, 2016, ISBN 978-3-319-22485-5
http://dx.doi.org/10.1007/978-3-319-22485-5
Introduction to Biometrics
Anil K. Jain, Arun A. Ross, and Karthik Nandakumar
Springer, 2011, ISBN 978-0-387-77325-4
http://dx.doi.org/10.1007/978-0-387-77326-1
Practical Biometrics: From Aspiration to Implementation,
Second Edition
Julian Ashbourn
Springer, 2015, ISBN 978-1-4471-6717-4
http://dx.doi.org/10.1007/978-1-4471-6717-4
Biometrics in the New World:
The Cloud, Mobile Technology and Pervasive Identity
Julian Ashbourn
Springer, 2014, ISBN 978-3-319-04159-9
http://dx.doi.org/10.1007/978-3-319-04159-9
Guide to Biometrics for Large-Scale Systems:
Technological, Operational, and User-Related Factors
Julian Ashbourn
Springer, 2011, ISBN 978-0-85729-467-8
http://dx.doi.org/10.1007/978-0-85729-467-8
Touchless Palmprint Recognition Systems
Angelo Genovese, Vincenzo Piuri, and Fabio Scotti
Springer, 2014, ISBN 978-3-319-10365-5
http://dx.doi.org/10.1007/978-3-319-10365-5
Security Impact of High Resolution Smartphone Cameras
Tobias Fiebig, Jan Krissler, and Ronny Hansch
8th USENIX Workshop on Offensive Technologies, WOOT’14
https://www.usenix.org/conference/woot14/workshop-
program/presentation/fiebig
German minister photo fingerprint ‘theft’ seemed far too
EASY, wail securobods: Security industry fear after apparent
digit sig nickery
John Leyden (30 December 2014)
The Register
http://www.theregister.co.uk/2014/12/30/hacking_fingerprint
s_get_a_hires_pic_and_commercial_software/
Implementation and evaluation of a remote authentication
system using touchless palmprint recognition
Haruki Ota, Shoichiro Aoyama, Ryu Watanabe, Koichi Ito,
Yutaka Miyake, and Takafumi Aoki
Multimedia Systems, Volume 19, Number 2 (2013)
http://dx.doi.org/10.1007/s00530-012-0283-z
Iris Biometrics: From Segmentation to Template Security
Christian Rathgeb, Andreas Uhl, and Peter Wild
Springer, 2013, ISBN 978-1-4614-5571-4
http://dx.doi.org/10.1007/978-1-4614-5571-4
Iris Biometric Model for Network Access
Franjieh El Khoury
CRC Press, 2013, ISBN 978-1-4665-0214-7
http://dx.doi.org/10.1201/b14817
A Survey of Ear Biometrics
Ayman Abaza, Arun Ross, Christina Hebert,
Mary Ann F. Harrison, and Mark S. Nixon
ACM Computing Surveys,
Volume 45, Number 2 (February 2013)
http://dx.doi.org/10.1145/2431211.2431221
Ear Biometrics in 2D and 3D: Localization and Recognition
Surya Prakash and Phalguni Gupta
Springer, 2015, ISBN 978-981-287-375-0
http://dx.doi.org/10.1007/978-981-287-375-0
Transparent User Authentication:
Biometrics, RFID and Behavioral Profiling
Nathan Clarke
Springer, 2011, ISBN 978-0-85729-805-8
http://dx.doi.org/10.1007/978-0-85729-805-8
Multibiometrics for Human Identification
Bir Bhanu and Venu Govindraju (Editors)
Cambridge University Press, 2011, ISBN 9780511921056
http://dx.doi.org/10.1017/CBO9780511921056
Behavioral, Cognitive and Virtual Biometrics (Chapter 13)
Roman V. Yampolskiy
http://dx.doi.org/10.1007/978-0-85729-994-9_13
Computer Analysis of Human Behavior
Albert Ali Salah and Theo Gevers (Editors)
Springer, 2011, ISBN 978-0-85729-994-9
http://dx.doi.org/10.1007/978-0-85729-994-9
Enhancing Information Security and Privacy by
Combining Biometrics with Cryptography
Sanjay G. Kanade, Dijana Petrovska-Delacretaz,
and Bernadette Dorizzi
Morgan & Claypool, 2012, ISBN 9781608458486
http://dx.doi.org/10.2200/S00417ED1V01Y201205SPT003
Security and Privacy in Biometrics
Patrizio Campisi (Editor)
Springer, 2013, ISBN 978-1-4471-5230-9
http://dx.doi.org/10.1007/978-1-4471-5230-9
Biometrics: Algorithms and Applications (special issue)
Proceedings of the IEEE,
Volume 94, Number 11 (November 2006)
http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=405246
3
Handbook of Fingerprint Recognition, Second Edition
Davide Maltoni, Dario Maio, Anil K. Jain, and Salil Prabhakar
Springer, 2009, ISBN 978-1-84882-254-2
http://dx.doi.org/10.1007/978-1-84882-254-2
Back to the Table of Contents
=======================================
Security Engineering ====================
Platform Embedded Security Technology Revealed:
Safeguarding the Future of Computing with Intel Embedded
Security and Management Engine
Xiaoyu Ruan
Springer, 2014, ISBN 978-1-4302-6572-6
http://dx.doi.org/10.1007/978-1-4302-6572-6
Pattern and Security Requirements:
Engineering-Based Establishment of Security Standards
Kristian Beckers
Springer, 2015, ISBN 978-3-319-16664-3
http://dx.doi.org/10.1007/978-3-319-16664-3
Engineering Information Security: The Application of Systems
Engineering Concepts to Achieve Information Assurance
Stuart Jacobs
Wiley, 2011, ISBN 978-0-470-94791-3
http://dx.doi.org/10.1002/9780470947913
System Security Engineering for Information Systems (Ch 1)
Logan O. Mailloux, Michael R. Grimaila, John M. Colombi,
Douglas D. Hodson, and Gearld Baumgartner
http://dx.doi.org/10.1016/B978-0-12-411474-6.00001-3
Emerging Trends in ICT Security
Babak Akhgar and Hamid R. Arabnia (Editors)
Elsevier, 2014, ISBN 978-0-12-411474-6
http://www.sciencedirect.com/science/book/9780124114746
Advances in Model-Driven Security (Ch 3)
Levi Lucio, Qin Zhang, Phu H. Nguyen, Moussa Amrani,
Jacques Klein, Hans Vangheluwe, and Yves Le Traon
http://dx.doi.org/10.1016/B978-0-12-800162-2.00003-8
Advances in Computers, Volume Ninety Three
Atif Memon (Editor)
Elsevier, 2014, ISBN 978-0-12-800162-2
Virtualization: Issues, Security Threats, and Solutions
Michael Pearce, Sherali Zeadally, and Ray Hunt
ACM Computing Surveys,
Volume 45, Number 2 (February 2013)
http://dx.doi.org/10.1145/2431211.2431216
Security Engineering for Service-Oriented Architectures
Michael Hafner and Ruth Breu
Springer, 2009, ISBN 978-3-540-79539-1
http://dx.doi.org/10.1007/978-3-540-79539-1
Security Engineering with Patterns:
Origins, Theoretical Model, and New Applications
Markus Schumacher
Springer, 2003, ISBN 978-3-540-45180-8
http://dx.doi.org/10.1007/b11930
Certificate Transparency
Ben Laurie
http://dx.doi.org/10.1145/2659897
Security Collapse in the HTTPS Market
Axel Arnbak, Hadi Asghari, Michel Van Eeten,
and Nico van Eijk
http://dx.doi.org/10.1145/2660574
Why Is It Taking So Long to Secure Internet Routing?
Sharon Goldberg
http://dx.doi.org/10.1145/2659899
Communications of the ACM,
Volume 57, Number 10 (October 2014)
http://dl.acm.org/citation.cfm?id=2661061
Physical-Layer Security:
From Information Theory to Security Engineering
Matthieu Bloch and Joao Barros
Cambridge University Press, 2011, ISBN 9780511977985
http://dx.doi.org/10.1017/CBO9780511977985
Back to the Table of Contents
=======================================
Digital Forensics ========================
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The Basics of Digital Forensics:
The Primer for Getting Started in Digital Forensics,
Second Edition
John Sammons
Elsevier, 2015, ISBN 978-0-12-801635-0
http://www.sciencedirect.com/science/book/9780128016350
Digital Forensics: Threatscape and Best Practices
John Sammons (Editor)
Elsevier, 2016, ISBN 978-0-12-804526-8
http://www.sciencedirect.com/science/book/9780128045268
Official (ISC)
2
® Guide to the CCFP
SM
CBK®:
CCFP
SM
– Certified Cyber Forensics Professional
Peter Stephenson (Editor)
CRC Press, 2014, ISBN 978-1-4822-6248-3
http://dx.doi.org/10.1201/b17066
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Google Earth Forensics: Using Google Earth Geo-Location in
Digital Forensic Investigations
Michael Harrington and Michael Cross
Elsevier, 2015, ISBN 976-0-12-800216-2
http://www.sciencedirect.com/science/book/9780128002162
Handbook of Digital Forensics of Multimedia Data and Devices
Anthony T.S. Ho and Shujun Li (Editors)
Wiley, 2015, ISBN 9781118705773
http://dx.doi.org/10.1002/9781118705773
How to Defeat Advanced Malware:
New Tools for Protection and Forensics
Henry Dalziel
Elsevier, 2015, ISBN 978-0-12-802731-8
http://www.sciencedirect.com/science/book/9780128027318
Implementing Digital Forensic Readiness:
From Reactive to Proactive Process
Jason Sachowski
Elsevier, 2016, ISBN 978-0-12-804454-4
http://www.sciencedirect.com/science/book/9780128044544
Python Forensics:
A Workbench for Inventing and Sharing Digital Forensic
Technology
Chet Hosmer
Elsevier, 2014, ISBN 978-0-12-418676-7
http://www.sciencedirect.com/science/book/9780124186767
Unified Communications Forensics:
Anatomy of Common UC Attacks
Nicholas Grant & Joseph W Shaw II
Elsevier, 2014, ISBN 978-1-59749-992-7
http://www.sciencedirect.com/science/book/9781597499927
Investigating Internet Crimes:
An Introduction to Solving Crimes in Cyberspace
Todd G. Shipley and Art Bowker
Elsevier, 2014, ISBN 978-0-12-407817-8
http://www.sciencedirect.com/science/book/9780124078178
Cloud Storage Forensics
Darren Quick, Ben Martini, and Kim-Kwang Raymond Choo
Elsevier, 2014, ISBN 978-0-12-419970-5
http://www.sciencedirect.com/science/book/9780124199705
CyberForensics:
Understanding Information Security Investigations
Jennifer Bayuk (Editor)
Springer, 2010, ISBN 978-1-60761-772-3
http://dx.doi.org/10.1007/978-1-60761-772-3
Placing the Suspect Behind the Keyboard:
Using Digital Forensics and Investigative Techniques to
Identify Cybercrime Suspects
Brett Shavers
Elsevier, 2013, ISBN 978-1-59749-985-9
http://www.sciencedirect.com/science/book/9781597499859
Computer Incident Response and Forensics Team
Management: Conducting a Successful Incident Response
Leighton R. Johnson III
Elsevier, 2014, ISBN 978-1-59749-996-5
http://www.sciencedirect.com/science/book/9781597499965
X-Ways Forensics Practitioner’s Guide
Brett Shavers and Eric Zimmerman
Elsevier, 2014, ISBN 978-0-12-411605-4
http://www.sciencedirect.com/science/book/9780124116054
Digital Image Forensics:
There is More to a Picture than Meets the Eye
Husrev Taha Sencar and Nasir Memon (Editors)
Springer, 2013, ISBN 978-1-4614-0757-7
http://dx.doi.org/10.1007/978-1-4614-0757-7
Investigative Computer Forensics:
The Practical Guide for Lawyers, Accountants, Investigators,
and Business Executives
Erik Laykin
Wiley, 2013, ISBN 9781118572115
http://dx.doi.org/10.1002/9781118572115
Digital Forensics for Legal Professionals: Understanding
Digital Evidence – From the Warrant to the Courtroom
Larry E. Daniel and Lars E. Daniel
Elsevier, 2012, ISBN 978-1-59749-643-8
http://www.sciencedirect.com/science/book/9781597496438
Digital evolution: history, challenges and future
directions for the digital and multimedia sciences section
David W. Baker et al.
http://dx.doi.org/10.1002/9781118373880.ch10
Forensic Science: Current Issues, Future Directions
Douglas H. Ubelaker (Editor)
Wiley, 2013, ISBN 9781118373880
http://dx.doi.org/10.1002/9781118373880
Digital forensic research: current state of the art
Sriram Raghavan
CSI Transactions on ICT, Volume 1, Number 1 (March 2013)
http://dx.doi.org/10.1007/s40012-012-0008-7
A framework for unified digital evidence management
in security convergence
Kyung-Soo Lim and Changhoon Lee
Electronic Commerce Research (2013)
http://dx.doi.org/10.1007/s10660-013-9119-y
Digital Forensics Processing and Procedures:
Meeting the Requirements of ISO 17020, ISO 17025,
ISO 27001 and Best Practices Requirements
David Watson
Elsevier, 2013, ISBN 978-1-59749-8
http://www.sciencedirect.com/science/book/9781597497428
Advances in Digital Forensics VIII:
8th IFIP WG 11.9 International Conference 2012
Gilbert Peterson and Sujeet Shenoi (Editors)
Springer, 2012, ISBN 978-3-642-33962-2
http://dx.doi.org/10.1007/978-3-642-33962-2
Advances in Digital Forensics VII:
7th IFIP WG 11.9 International Conference 2011
Gilbert Peterson and Sujeet Shenoi (Editors)
Springer, 2011, ISBN 978-3-642-24212-0
http://dx.doi.org/10.1007/978-3-642-24212-0
Advances in Digital Forensics VI:
Sixth IFIP WG 11.9 International Conference 2010
Kam-Pui Chow and Sujeet Shenoi (Editors)
Springer, 2010, ISBN 978-3-642-15506-2
http://dx.doi.org/10.1007/978-3-642-15506-2
Advances in Digital Forensics V:
Fifth IFIP WG 11.9 International Conference 2009
Gilbert Peterson and Sujeet Shenoi (Editors)
Springer, 2009, ISBN 978-3-642-04155-6
http://dx.doi.org/10.1007/978-3-642-04155-6
Advances in Digital Forensics iV
Indrajit Ray and Sujeet Shenoi (Editors)
Springer, 2008, ISBN 978-0-387-84927-0
http://dx.doi.org/10.1007/978-0-387-84927-0
Digital Forensics and Cyber Crime:
Third International ICST Conference, ICDF2C 2011
Pavel Gladyshev and Marcus K. Rogers (Editors)
Springer, 2012, ISBN 978-3-642-35515-8
http://dx.doi.org/10.1007/978-3-642-35515-8
Digital Forensics and Cyber Crime:
Second International ICST Conference, ICDF2C 2010
Ibrahim Baggili (Editor)
Springer, 2011, ISBN 978-3-642-19513-6
http://dx.doi.org/10.1007/978-3-642-19513-6
Digital Forensics and Cyber Crime:
First International ICST Conference, ICDF2C 2009
Sanjay Goel (Editor)
Springer, 2010, ISBN 978-3-642-11534-9
http://dx.doi.org/10.1007/978-3-642-11534-9
Open Source Software for Digital Forensics
Ewa Huebner and Stefano Zanero (Editors)
Springer, 2010, ISBN 978-1-4419-5803-7
http://dx.doi.org/10.1007/978-1-4419-5803-7
Linux Malware Incident Response: A Practitioner’s Guide to
Forensic Collection and Examination of Volatile Data
Cameron H. Malin, Foghan Casey, and James A. Aquilina
Elsevier, 2013, ISBN 978-0-12-409507-6
http://www.sciencedirect.com/science/book/9780124095076
Malware Forensic Field Guide for Windows Systems
Cameron Malin, Eoghan Casey, and James Aquilina
Elsevier, 2012, ISBN 978-1-59749-472-4
http://www.sciencedirect.com/science/book/9781597494724
Windows Registry Forensics: Advanced Digital Forensic
Analysis of the Windows Registry; Second Edition
Harlan Carvey
Elsevier, 2016, ISBN 978-0-12-803291-6
http://www.sciencedirect.com/science/book/9780128032916
Android Malware
Xuxian Jiang and Yajin Zhou
Springer, 2013, ISBN 978-1-4614-7394-7
http://dx.doi.org/10.1007/978-1-4614-7394-7
Android Malware and Analysis
Ken Dunham, Shane Hartman, Jose Andre Morales,
Manu Quintans, and Tim Strazzere
CRC Press, 2015, ISBN 978-1-4822-5220-0
http://dx.doi.org/10.1201/b17598
Automatic Malware Analysis: An Emulator Based Approach
Heng Yin and Dawn Song
Springer, 2013, ISBN 978-1-4614-5523-3
http://dx.doi.org/10.1007/978-1-4614-5523-3
PBX Security and Forensics: A Practical Approach
Iosif I. Androulidakis
Springer, 2013, ISBN 978-1-4614-1656-2
http://dx.doi.org/10.1007/978-1-4614-1656-2
A critical review of 7 years of Mobile Device Forensics
Konstantia Barmpatsalou, Dimitrios Damopoulas,
Georgios Kambourakis, and Vasilios Katos
Digital Investigation, Volume 10, Number 4 (December 2013)
http://dx.doi.org/10.1016/j.diin.2013.10.003
Identifying back doors, attack points,
and surveillance mechanisms in iOS devices
Jonathan Zdziarski
Digital Investigation, Volume 11, Number 1 (March 2014)
http://dx.doi.org/10.1016/j.diin.2014.01.001
iPhone and iOS Forensics:
Investigation, Analysis and Mobile Security for Apple iPhone,
iPad, and iOS Devices
Andrew Hoog and Katie Strzempka
Elsevier, 2011, ISBN 978-1-59749-659-9
http://www.sciencedirect.com/science/book/9781597496599
Logging and Log Management:
The Authoritative Guide to Understanding the Concepts
Surrounding Logging and Log Management
Anton A. Chuvakin, Kevin J. Schmidt, and Christopher Phillips
Elsevier, 2013, ISBN 978-1-59749-635-3
http://www.sciencedirect.com/science/book/9781597496353
Virtualization and Forensics:
A Digital Forensic Investigator’s Guide to Virtual Environments
Diane Barrett and Gregory Kipper
Elsevier, 2010, ISBN 978-1-59749-557-8
http://www.sciencedirect.com/science/book/9781597495578
Secrets Stolen, Fortunes Lost
Christopher Burgess and Richard Power
Elsevier, 2008, ISBN 978-1-59749-255-3
http://www.sciencedirect.com/science/book/9781597492553
Inside the SPAM Cartel: Trade Secrets from the Dark Side
Stu Sjouwerman and Jeffrey Posluns
Elsevier, 2004, ISBN 978-1-932266-86-3
http://www.sciencedirect.com/science/book/9781932266863
Back to the Table of Contents
=======================================
Risk =================================
Managing Risk and Information Security: Protect to Enable
Malcolm Harkins
Springer, 2013, ISBN 978-1-4302-5114-9
http://dx.doi.org/10.1007/978-1-4302-5114-9
Information Security Risk Assessment Toolkit:
Practical Assessments through Data Collection and Data
Analysis
Mark Ryan M. Talabis and Jason L. Martin
Elsevier, 2013, ISBN 978-1-59749-735-0
http://www.sciencedirect.com/science/book/9781597497350
IT Security Risk Management:
Perceived IT Security Risks in the Context of Cloud Computing
Tobias Ackermann
Springer, 2013, ISBN 978-3-658-01115-4
http://dx.doi.org/10.1007/978-3-658-01115-4
Measuring and Managing Information Risk: A FAIR Approach
Jack Freund and Jack Jones
Elsevier, 2015, ISBN 978-0-12-420231-3
http://www.sciencedirect.com/science/book/9780124202313
Risk Management Framework:
A Lab-Based Approach to Securing Information Systems
James Broad
Elsevier, 2013, ISBN 978-1-59749-995-8
http://www.sciencedirect.com/science/book/9781597499958
FISMA and the Risk Management Framework:
The New Practice of Federal Cyber Security
Stephen D. Gantz and Daniel R. Philpott
Elsevier, 2013, ISBN 978-1-59749-641-4
http://www.sciencedirect.com/science/book/9781597496414
FISMA Compliance Handbook
Laura P. Taylor
Elsevier, 2013, ISBN 978-0-12-405871-2
http://www.sciencedirect.com/science/book/9780124058712
Social Media Security:
Leveraging Social Networking While Mitigating Risk
Michael Cross
Elsevier, 2014, ISBN 978-1-59749-986-6
http://www.sciencedirect.com/science/book/9781597499866
Managing Online Risk:
Apps, Mobile, and Social Media Security
Deborah Gonzalez
Elsevier, 2015, ISBN 978-0-12-20055-5
http://www.sciencedirect.com/science/book/9780124200555
The Science and Technology of Counterterrorism:
Measuring Physical and Electronic Security Risk
Carl S. Young
Elsevier, 2015, ISBN 978-0-12-420056-2
http://www.sciencedirect.com/science/book/9780124200562
Back to the Table of Contents
=======================================
Trust =================================
A Comparison of Trust Models
Marc Sel
http://dx.doi.org/10.1007/978-3-658-10934-9_17
ISSE 2015: Highlights of the Information Security Solutions
Europe 2015 Conference
Helmut Reimer, Norbert Pohlmann, and Wolfgang Schneider
(Editors)
Springer, 2015, ISBN 978-3-658-10934-9
http://dx.doi.org/10.1007/978-3-658-10934-9
Trust as a facilitator in cloud computing: a survey
Sheikh Mahbub Habib, Sascha Hauke, Sebastian Ries,
and Max Muhlhauser
Journal of Cloud Computing, Volume 1 (December 2012)
http://www.journalofcloudcomputing.com/content/1/1/19
Trust mechanisms for cloud computing
Jingwei Huang and David M. Nicol
Journal of Cloud Computing, Volume 2 (December 2013)
http://dx.doi.org/10.1186/2192-113X-2-9
Trust, Distrust and Commitment
Katherine Hawley
Noûs, Volume 48, Number 1 (March 2014)
http://dx.doi.org/10.1111/nous.12000
Trust, Computing, and Society
Richard H.R. Harper (Editor)
Cambridge University Press, 2014, ISBN 9781139828567
http://dx.doi.org/10.1017/CBO9781139828567
Trust: The Evolutionary Game of Mind and Society
Toshio Yamagishi
Springer, 2011, ISBN 978-1-431-53936-0
http://dx.doi.org/10.1007/978-4-431-53936-0
Towards a Theory of Trust in Networks of Humans and
Computers
Virgil Gligor and Jeannette M. Wing
CMU-CyLab-110016 (September 8, 2011)
CyLab, Carnegie Mellon University
http://repository.cmu.edu/cylab/88/
A Survey of Trust in Social Networks
Wanita Sherchan, Surya Nepal, and Cecile Paris
ACM Computing Surveys, Volume 45, Number 4 (August 2013)
http://dx.doi.org/10.1145/2501654.2501661
Introduction: Embedded Trust (Chapter 1)
http://dx.doi.org/10.1007/0-306-47645-2_1
Social Networks and Trust
Vincent Buskens
Springer, 2002, ISBN 978-0-306-47645-7
http://dx.doi.org/10.1007/b109038
Trust in Social Media
Jiliang Tang and Huan Liu
Morgan & Claypool, 2015, ISBN 9781627054058
http://dx.doi.org/10.2200/S00657ED1V01Y201507SPT013
Trust, Privacy and Security in Digital Business:
12th International Conference, TrustBus2015, Proceedings
Simone Fischer-Hubner, Costas Lambrinoudakis,
and Javier Lopez (Editors)
Springer, 2015, ISBN 978-3-319-22906-5, LNCS 9264
http://dx.doi.org/10.1007/978-3-319-22906-5
Trust Management in Cloud Services
Tala H. Noor, Quan Z. Sheng, and Athman Bouguettaya
Springer, 2014, ISBN 978-3-319-12250-2
http://dx.doi.org/10.1007/978-3-319-12250-2
Back to the Table of Contents
=======================================
Professional Certifications ================
CISSP (Certified Information Systems Security Professional)
Certification
https://www.isc2.org/cissp/default.aspx
Wikipedia:
http://en.wikipedia.org/wiki/Certified_Information_Systems_S
ecurity_Professional
CSSLP (Certified Secure Software Lifecycle Professional)
Certification
https://www.isc2.org/csslp/Default.aspx
Certification Programs
https://www.isc2.org/credentials/default.aspx
International Information Systems Security Certification
Consortium
https://www.isc2.org/
Wikipedia: http://en.wikipedia.org/wiki/(ISC)%C2%B2
Eleventh Hour CISSP® Study Guide, Second Edition
Eric Conrad, Seth Misenar, and Joshua Feldman
Elsevier, 2014, ISBN 978-0-12-417142-8
http://www.sciencedirect.com/science/book/9780124171428
CISSP® Practice Exams, Second Edition
Shon Harris
McGraw-Hill, 2013, ISBN 9780071792349
*** Search on the ISBN number above ***
http://library.books24x7.com/
CISSP® All–in-One Exam Guide, Sixth Edition
Shon Harris
McGraw-Hill, 2013, ISBN 9780071781749
*** Search on the ISBN number above ***
http://library.books24x7.com/
CSSLP® Certification All–in-One Exam Guide
Wm. Arthur Conklin and Dan Shoemaker
McGraw-Hill, 2013, ISBN 9780071760263
*** Search on the ISBN number above ***
http://library.books24x7.com/
HCISPPSM – HealthCare Information Security and Privacy
Professional
https://www.isc2.org/hcispp/default.aspx
https://www.isc2.org/innerpage.aspx?id=11284
HCISPP Study Guide
Timothy Virtue and Justin Rainey
Elsevier, 2015, ISBN 978-0-12-802043-2
http://www.sciencedirect.com/science/book/9780128020432
Back to the Table of Contents
=======================================
Careers in Cybersecurity =================
Also see:
Items on relevant shelves in the Skills for Success,
English, Job Search, and Entrepreneurship section.
Breaking into Information Security: Crafting a Custom
Career Path to Get the job You Really Want
Josh More, Anthony J. Stieber, and Chris Liu
Elsevier, 2016, ISBN 978-0-12-800783-9
http://www.sciencedirect.com/science/book/978012800
7839
Introduction to US Cybersecurity Careers
Henry Dalziel
Elsevier, 2015, ISBN 978-0-12-802722-6
http://www.sciencedirect.com/science/book/978012802
7226
Job Reconnaissance:
Using Hacking Skills to Win the Job Hunt Game
Josh More
Elsevier, 2014, ISBN 978-0-12-416601-1
http://www.sciencedirect.com/science/book/978012416
6011
From One Winning Career to the Next:
Transitioning Public Sector Leadership and Security Expertise
to the Business Bottom Line
J. David Quilter
Elsevier, 2013, ISBN 978-0-12-411594-1
http://www.sciencedirect.com/science/book/9780124115941
Security Careers: Skills, Compensation, and Career Paths;
Third Edition
Stephen W. Walker and James E. Fushee
Elsevier, 2014, ISBN 978-0-12-800104-2
http://www.sciencedirect.com/science/book/9780128001042
Back to the Table of Contents
=======================================
Programming ==========================
Advanced API Security: Securing APIs with OAuth 2.0,
OpenID Connect, JWS, and JWE
Prabath Siriwardena
Springer, 2014, ISBN 978-1-4302-6817-8
http://dx.doi.org/10.1007/978-1-4302-6817-8
Coding for Penetration Testers: Building Better Tools
Jason Andress and Ryan Linn
Elsevier, 2012, ISBN 978-1-59749-729-9
http://www.sciencedirect.com/science/book/9781597497299
Cryptography in C and C++
Michael Welschenbach
Springer, 2005, ISBN 978-1-4302-0026-0
http://dx.doi.org/10.1007/978-1-4302-0026-0
Foundations of Security:
What Every Programmer Needs to Know
Neil Daswani, Christoph Kern, and Anita Kesavan
Springer, 2007, ISBN 978-1-4302-0377-3
http://dx.doi.org/10.1007/978-1-4302-0377-3
Gray Hat Python:
Python Programming for Hackers and Reverse Engineers
Justin Seitz
No Starch Press, 2009, ISBN 9781593271923
*** Search on the ISBN number above ***
http://library.books24x7.com/
Introduction to Reliable and Secure Distributed Programming,
Second Edition
Christian Cachin, Rachid Guerraoui, and Luis Rodrigues
Springer, 2011, ISBN 978-3-642-15260-3
http://dx.doi.org/10.1007/978-3-642-15260-3
Perl Scripting for Windows Security:
Live Response, Forensic Analysis, and Monitoring
Harlan Carvey
Elsevier, 2007, ISBN 978-1-59749-173-0
http://www.sciencedirect.com/science/book/9781597491730
Practical Cryptography:
Algorithms and Implementations Using C++
Saiful Azad and Al-Sakib Khan Pathan (Editors)
CRC Press, 2015, ISBN 978-1-4822-2890-8
http://dx.doi.org/10.1201/b17707
Python Passive Network Mapping: P2NMAP
Chet Hosmer
Elsevier, 2015, ISBN 978-0-12-802721-9
http://www.sciencedirect.com/science/book/9780128027219
Secure Systems Development with UML
Jan Jurjens
Springer, 2005, ISBN 978-3-540-26494-1
http://dx.doi.org/10.1007/b137706
Securing the Tangled Web: Preventing script injection
vulnerabilities through software design
Christopher Kern
Communications of the ACM,
Volume 57, Number 9 (September 2014)
http://dx.doi.org/10.1145/2643134
Software Design for Resilient Computer Systems
Igor Schagaev and Thomas Kaegi-Trachsel
Springer, 2016, ISBN 978-3-319-29465-0
http://dx.doi.org/10.1007/978-3-319-29465-0
Violent Python:
A Cookbook for Hackers, Forensic Analysts, Penetration
Testers and Security Engineers
TJ. O’Connor
Elsevier, 2013, ISBN 978-1-59749-957-6
http://www.sciencedirect.com/science/book/9781597499576
Understanding Network Hacks:
Attack and Defense with Python
Bastian Ballmann
Springer, 2015, ISBN 978-3-662-44437-5
http://dx.doi.org/10.1007/978-3-662-44437-5
Web Application Obfuscation
Mario Heiderich, Eduardo Alberto Vela Nava,
Gareth Heyes, and David Lindsay
Elsevier, 2011, ISN 978-1-59749-604-9
http://www.sciencedirect.com/science/book/9781597496049
24 Deadly Sins of Software Security: Programming Flaws
and How to Fix Them
Michael Howard and David LeBlanc
McGraw-Hill, 2010, ISBN 9780071626750
http://www.accessengineeringlibrary.com/browse/24-deadly-
sins-of-software-security-programming-flaws-and-how-to-fix-
them
Back to the Table of Contents
=======================================
Mathematics for Cryptography ============
Algebra for Applications: Cryptography, Secret Sharing,
Error-Correcting, Fingerprinting, Compression
Arkadii Slinko
Springer, 2015, ISBN 978-3-319-21951-6
http://dx.doi.org/10.1007/978-3-319-21951-6
Applied Number Theory
Harald Niederreiter and Arne Winterhof
Springer, 2015, ISBN 978-3-319-22321-6
http://dx.doi.org/10.1007/978-3-319-22321-6
Yet Another Introductory Number Theory Textbook
(Cryptology Emphasis Version)
Jonathan A. Poritz (2014)
http://www.poritz.net/jonathan/share/yaintt/
Introduction to Public Key Cryptography and Modular
Arithmetic
Robert Milson (February 2008)
http://arxiv.org/abs/cs/9903001
Mathematical Foundations of Public Key Cryptography
Xiaoyun Wang, Guangwu Xu, Mingqiang Wang,
and Xianmeng Meng
CRC Press, 2016, ISBN 978-1-4987-0224-9
http://dx.doi.org/10.1201/b19324
Mathematics of Public Key Cryptography
Steven D. Galbraith
Cambridge University Press, 2012, ISBN 9781139013926
http://dx.doi.org/10.1017/CBO9781139012843
Concepts and Calculation in Cryptography
Dan Grundy
PhD Thesis, University of Kent (March 2008)
http://www.cs.kent.ac.uk/people/staff/eab2/crypto/thesis.we
b.pdf
Cryptography and Formal Methods Website (Publications)
University of Kent
http://www.cs.kent.ac.uk/people/staff/eab2/crypto/
Elementary Number Theory:
Primes, Congruences, and Secrets
William Stein (2011)
http://wstein.org/ent/
Elementary Number Theory, Cryptography and Codes
Maria Welleda Baldoni, Giro Giliberto,
and Giulia Maria Piacentini Cattaneo
Springer, 2009, ISBN 978-3-540-69200-3
http://dx.doi.org/10.1007/978-3-540-69200-3
Primality Testing and Integer Factorization in Public-Key
Cryptography
Song Y. Yan
Springer, 2009, ISBN 978-0-387-77268-4
http://dx.doi.org/10.1007/978-0-387-77268-4
Bent Functions: Results and Applications to Cryptography
Natalia Tokareva
Elsevier, 2015, ISBN 978-0-12-802318-1
http://www.sciencedirect.com/science/book/9780128023181
Black-Box Models of Computation in Cryptology
Tibor Jager
Springer, 2012, ISBN 978-3-8348-1990-1
http://dx.doi.org/10.1007/978-3-8348-1990-1
Codes: An Introduction to Information Communication
and Cryptography
N.L. Biggs
Springer, 2008, ISBN 978-1-84800-273-9
http://dx.doi.org/10.1007/978-1-84800-273-9
Codes and Turbo Codes
Claude Berrou
Springer, 2010, ISBN 978-2-8178-0039-4
http://dx.doi.org/10.1007/978-2-8178-0039-4
A Student’s Guide to Coding and Information Theory
Stefan M. Moser and Po-Ning Chen
Cambridge University Press, 2012, ISBN 9781139059534
http://dx.doi.org/10.1017/CBO9781139059534
Rubik’s for Cryptographers
Christophe Petit and Jean-Jacques Quisquater
http://www.ams.org/notices/201306/rnoti-p733.pdf
Notices of the AMS, Volume 60, Number 6 (June/July 2013)
http://www.ams.org/notices/201306/
A Mathematical Theory of Communication
C. E. Shannon
The Bell System Technical Journal,
Volume 27, Number 3 (July 1948)
http://www.alcatel-lucent.com/bstj/vol27-
1948/articles/bstj27-3-379.pdf
Communication Theory of Secrecy Systems
C. E. Shannon
The Bell System Technical Journal,
Volume 28, Number 4 (October 1949)
http://www.alcatel-lucent.com/bstj/vol28-
1949/articles/bstj28-4-656.pdf
Cryptography in Constant Parallel Time
Benny Applebaum
Springer, 2014, ISBN 978-3-642-17367-7
http://dx.doi.org/10.1007/978-3-642-17367-7
Back to the Table of Contents
=======================================
Cryptography ==========================
Cryptography Made Simple
Nigel P. Smart
Springer, 2016, ISBN 978-3-319-21936-3
http://dx.doi.org/10.1007/978-3-319-21936-3
Cryptography, An Introduction: Third Edition
Nigel P. Smart
http://www.cs.bris.ac.uk/~nigel/Crypto_Book/
Home Page of Nigel P. Smart (Publications)
http://www.cs.bris.ac.uk/~nigel/
Introduction to Cryptography: Principles and Applications,
Third Edition
Hans Delfs and Helmut Knebl
Springer, 2015, ISBN 978-3-662-47974-2
http://dx.doi.org/10.1007/978-3-662-47974-2
CryptoSchool
Joachim von zur Gathen
Springer, 2015, ISBN 978-3-662-48425-8
*** Introduction to cryptology ************
http://dx.doi.org/10.1007/978-3-662-48425-8
A Cryptography Primer: Secrets and Promises
Philip N. Klein
Cambridge University Press, 2014, ISBN 9781139084772
http://dx.doi.org/10.1017/CBO9781139084772
Modern Cryptography Primer:
Theoretical Foundations and Practical Applications
Czeslaw Koscielny, Miroslaw Kurkowski, and Marian Srebrny
Springer, 2013, ISBN 978-3-642-41386-5
http://dx.doi.org/10.1007/978-3-642-41386-5
A Brief History of Cryptology and Cryptographic Algorithms
John F. Dooley
Springer, 2013, ISBN 978-3-319-01628-3
http://dx.doi.org/10.1007/978-3-319-01628-3
Quantum Cryptography: A Survey
Dagmar Bruss, Gabor Erdelyi, Tim Meyer, Tobias Riege,
and Jorg Rohe
ACM Computing Surveys, Volume 39, Number 2 (July 2007)
http://dx.doi.org/10.1145/1242471.1242474
Cryptography and Secure Communication
Richard E. Blahut
Cambridge University Press, 2014, ISBN 9781139013673
http://dx.doi.org/10.1017/CBO9781139013673
Visual Cryptography for Image Processing and Security:
Theory, Methods, and Applications; Second Edition
Feng Liu and Wei Qi Yan
Springer, 2015, ISBN 978-3-319-23473-1
http://dx.doi.org/10.1007/978-3-319-23473-1
A Course in Mathematical Cryptography
Gilbert Baumslag, Benjamin Fine, Martin Kreuzer,
and Gerhard Rosenberger
Walter de Gruyter, 2015, ISBN 978-3-11-037277-9
http://www.degruyter.com/viewbooktoc/product/431540
The Rabin cryptosystem revisited
Michele Elia, Matteo Piva, and Davide Schipani
Applicable Algebra in Engineering, Communication and
Computing; Volume 26, Number 3 (June 2015)
http://dx.doi.org/10.1007/s00200-014-0237-0
Timing Channels in Cryptography:
A Micro-Architectural Perspective
Chester Rebeiro, Debdeep Mukhopadhyay,
and Sarani Bhattacharya
Springer, 2015, ISBN 978-3-319-12370-7
http://dx.doi.org/10.1007/978-3-319-12370-7
The Growth of Cryptography
Ronald Rivest, Erna Viterbi Professor of Electrical Engineering
and Computer Science, Massachusetts Institute of Technology
http://www.youtube.com/watch?v=D4HcvehEU9c
TURING CENTENNIAL CELEBRATION
Princeton University (May 10-12, 2012)
http://www.princeton.edu/turing/index.xml
Keeping Secrets: Cryptography In A Connected World
Panel Discussion, World Science Festival (2014)
Panel: Josh Zepps, Simon Singh, Orr Dunkelman,
Tal Rabin, and Brian Snow
https://www.youtube.com/watch?v=nVVF8dgKC38
Public Key Cryptography: Applications and Attacks
Lynn Margaret Batten
Wiley, 2013, ISBN 9781118482261
http://dx.doi.org/10.1002/9781118482261
Long-Term Confidentiality of PKI
Chi-Sung Laih, Shang-Ming Jen, and Chia-Yu Lu
Communications of the ACM,
Volume 55, Number 1 (January 2012)
http://dx.doi.org/10.1145/2063176.2063199
Introduction to Cryptography with Maple
Jose Luis Gomes Pardo
Springer, 2013, ISBN 978-3-642-32166-5
http://dx.doi.org/10.1007/978-3-642-32166-5
Understanding Cryptography:
A Textbook for Students and Practitioners
Christof Paar and Jan Pelzl
Springer, 2010, ISBN 978-3-642-04101-3
http://dx.doi.org/10.1007/978-3-642-04101-3
Protocols for Authentication and Key Establishment
Colin Boyd and Anish Mathuria
Springer, 2003, ISBN 978-3-662-09527-0
http://dx.doi.org/10.1007/978-3-662-09527-0
A Classical Introduction to Cryptography
Serge Vaudeney
Springer, 2006, ISBN 978-0-387-25880-5
http://dx.doi.org/10.1007/b136373
A Classical Introduction to Cryptography Exercise Book
Thomas Baigneres, Pascal Junod, Yi Lu, Jean Monnerat,
and Serge Vaudenay
Springer, 2006, ISBN 978-0-387-28835-2
http://dx.doi.org/10.1007/0-387-28835-X
Decrypted Secrets: Methods and Maxims of Cryptology
Friedrich Bauer
Springer, 2007, ISBN 978-3-540-48121-8
http://dx.doi.org/10.1007/978-3-540-48121-8
An Introduction to Mathematical Cryptography,
Second Edition
Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman
Springer, 2014, ISBN 978-1-4939-1711-2
http://dx.doi.org/10.1007/978-1-4939-1711-2
Foundations of Cryptography: Basic Tools
Oded Goldreich
Cambridge University Press, 2001, ISBN 9780511546891
http://dx.doi.org/10.1017/CBO9780511546891
Foundations of Cryptography II: Basic Applications
Oded Goldreich
Cambridge University Press, 2004, ISBN 9780511721656
http://dx.doi.org/10.1017/CBO9780511721656
Algebraic Cryptanalysis
Gregory V. Bard
Springer, 2009, ISBN 978-0-387-88757-9
http://dx.doi.org/10.1007/978-0-387-88757-9
Adaptive Cryptographic Access Control
Anne V.D.M. Kayem, Selim G. Akl, and Patrick Martin
Springer, 2010, ISBN 978-1-4419-6655-1
http://dx.doi.org/10.1007/978-1-4419-6655-1
Cryptography: all-out attacks or how to attack cryptography
without intensive cryptanalysis
Jean-Baptiste Bedrune, Eric Filiol, and Frederic Raynal
Journal in Computer Virology,
Volume 6, Number 3 (August 2010)
http://dx.doi.org/10.1007/s11416-008-0117-x
Brute Force: Cracking the Data Encryption Standard
Matt Curtin
Springer, 2005, ISBN 978-0-387-27160-6
http://dx.doi.org/10.1007/b138699
Cryptanalytic Attacks on RSA
Song Y. Yan
Springer, 2010, ISBN 978-0-387-48742-7
http://dx.doi.org/10.1007/978-0-387-48742-7
Quantum Attacks on Public-Key Cryptosystems
Song Y. Yan
Springer, 2013, ISBN 978-1-4419-7722-9
http://dx.doi.org/10.1007/978-1-4419-7722-9
Stream Ciphers
Andreas Klein
Springer, 2013, ISBN 978-1-4471-5079-4
http://dx.doi.org/10.1007/978-1-4471-5079-4
The Block Cipher Companion
Lars R. Knudsen and Matthew J.B. Robshaw
Springer, 2011, ISBN 978-3-642-17342-4
http://dx.doi.org/10.1007/978-3-642-17342-4
Security of Block Ciphers:
From Algorithm Design to Hardware Implementation
Kazuo Sakiyama, Yu Sasaki, and Yang Li
Wiley, 2015, ISBN 9781118660027
http://dx.doi.org/10.1002/9781118660027
Cryptography for Network Security:
Failures,
Successes and Challenges
Bart Preneel
http://dx.doi.org/10.1007/978-3-642-14706-7_4
From NLP (Natural Language Processing) to MLP (Machine
Language Processing)
Peter Teufl, Udo Payer, and Guenter Lackner
http://dx.doi.org/10.1007/978-3-642-14706-7_20
Computer Network Security: MMM-ACNS 2010
Igor Kotenko and Victor Skormin (Editors)
Springer, 2010, ISBN 98703-642-14706-7, LNCS 6258
http://dx.doi.org/10.1007/978-3-642-14706-7
Fault Analysis in Cryptography
Marc Joye and Michael Tunstall (Editors)
Springer, 2012, ISBN 978-3-642-29656-7
http://dx.doi.org/10.1007/978-3-642-29656-7
Handbook of Applied Cryptography
Alfred J. Menezes, Paul C. van Oorschot,
and Scott A. Vanstone
CRC Press, 1996 (Fifth Printing, August 2001,
ISBN 0-8493-8523-7
http://cacr.uwaterloo.ca/hac/
Website of Alfred Menezes
http://www.math.uwaterloo.ca/~ajmeneze/
Analysis and Design of Cryptographic Hash Functions
PhD Thesis (1993, book in progress)
Bart Preneel
*** Find link under Who am I – second paragraph ***
http://homes.esat.kuleuven.be/~preneel/
Merkle-Damgard Revisited: How to Construct a Hash Function
Jean-Sebastien Coron, Yevgeniy Dodis,
Cecile Malinaud, and Prashant Puniya
Advancess in Cryptology – Crypto 2005
Springer, 2005, ISBN 978-3-540-31870-5, LNCS 3621
http://dx.doi.org/10.1007/11535218_26
The Hash Function BLAKE
Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan,
and Luca Henzen
Springer, 2014, ISBN 978-3-662-44757-4
http://dx.doi.org/10.1007/978-3-662-44757-4
Symmetric Cryptographic Protocols
Mahalingam Ramkumar
Springer, 2015, ISBN 978-3-319-07584-6
http://dx.doi.org/10.1007/978-3-319-07584-6
Symmetric Key Encryption Through Data Structure and
Binary-Gray Conversion
Smita Paira, Sourabh Chandra, Sk. Safikul Alam,
and Siddharatha Bhattacharyya
http://dx.doi.org/10.1007/978-81-322-2550-8
A Rotation Based Encryption Technique USING Symmetric Key
Method
Sourabh Chandra, Smita Paira, Sk. Safikul Alam,
and Siddharatha Bhattacharyya
http://dx.doi.org/10.1007/978-81-322-2550-8_3
Emerging Research in Computing, Information,
Communication and Application: ERCICA 2015, Volume 1
N. R. Shetty, N.H. Prasad, and N. Nalini (Editors)
Springer, 2015, ISBN 978-81-322-2550-8
http://dx.doi.org/10.1007/978-81-322-2550-8
The Computational Lens – Pauli Lectures, ETH Zurich
The “P vs. NP” Problem: Efficient Computation,
Internet Security, and the Limits to Human Knowledge
(May 7, 2012)
http://www.youtube.com/watch?v=pTeZP-XfuKI
Cryptography: Secrets and Lies, Knowledge and Trust
(May 8, 2012)
http://www.youtube.com/watch?v=Eu_j5_tains
Randomness – the Utility of Unpredictability
(May 10, 2012)
http://www.youtube.com/watch?v=ZzsFb-6wvoE
Professor Avi Wigderson, Institute for Advanced Study
Website: http://www.math.ias.edu/avi/
DBLP: http://www.informatik.uni-
trier.de/~ley/pers/hd/w/Wigderson:Avi.html
Back to the Table of Contents
=======================================
Homomorphic Encryption ================
Alice and Bob in Cypherspace
Brian Hayes
American Scientist, Volume 100, Number 5
(September-October 2012)
http://www.americanscientist.org/issues/pub/2012/5/alice-
and-bob-in-cipherspace
A Fully Homomorphic Scheme
Ph.D. Dissertation, Department of Computer Science,
Stanford University (September 2009)
Craig Gentry
http://crypto.stanford.edu/craig/
Fully Homomorphic Encryption Using Ideal Lattices
Proceedings of the 41st Annual ACM Symposium on Theory of
Computing (STOC 2009)
Craig Gentry
http://dx.doi.org/10.1145/1536414.1536440
Homomorphic Encryption and Applications
Xun Yi, Russell Paulet, and Elisa Bertino
Springer, 2014, ISBN 978-3-319-12229-8
http://dx.doi.org/10.1007/978-3-319-12229-8
Evaluating 2-DNF Formulas on Ciphertexts
Dan Boneh, Eu-Jin Coh, and Kobbi Nissim
http://dx.doi.org/10.1007/978-3-540-30576-7_18
Theory of Cryptography:
Second Theory of Cryptography Conference, TCC 2005
Joe Kilian (Editor)
Springer, 2005, ISBN 978-3-540-30576-7, LNCS 3378
http://dx.doi.org/10.1007/b106171
Fully Homomorphic Encryption without Bootstrapping:
ITCS 2012
Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan
http://eprint.iacr.org/2011/277.pdf
Fully Homomorphic Encryption from Ring-LWE and Security
for Key Dependent Messages: Crypto 2011
Zvika Brakerski and Vinod Vaikuntanathan
Home Page of Zvika Brakerski (Publications)
http://www.wisdom.weizmann.ac.il/~zvikab/
Computing Blindfolded:
New Developments in Fully Homomorphic Encryption
Vinod Vaikuntanathan
http://www.cs.toronto.edu/~vinodv/FHE-focs-survey.pdf
Home Page of Vinod Vaikuntanathan (Publications)
http://www.cs.toronto.edu/~vinodv/
http://people.csail.mit.edu/vinodv/
Fully Homomorphic Encryption over the Integers
Marten van Dijk, Craig Gentry, Shai Halevi,
and Vinod Vaikuntanathan
http://dx.doi.org/10.1007/978-3-642-13190-5_2
Advances in Cryptology – EUROCRYPT 2010
Henri Gilbert (Editor)
Springer, 2010, ISBN 978-3-642-13190-5, LNCS 6110
http://dx.doi.org/10.1007/978-3-642-13190-5
Public Key Compression and Modulus Switching for Fully
Homomorphic Encryption over the Integers
Jean-Sebastien Coron, David Naccache, and Mehdi Tibouchi
http://dx.doi.org/10.1007/978-3-642-29011-4_27
Fully Homomorphic Encryption with Polylog Overhead
Craig Gentry, Shai Halevi, and Nigel P. Smart
http://dx.doi.org/10.1007/978-3-642-29011-4_28
Advances in Cryptology – EUROCRYPT 2012
David Pointcheval and Thomas Johansson (Editors)
Springer, 2012, ISBN 978-3-642-29011-4, LNCS 7237
http://dx.doi.org/10.1007/978-3-642-29011-4
Public Key Compression and Modulus Switching for Fully
Homomorphic Encryption over the Integers –
Talk at EUROCRYPT 2012
Jean-Sebastien Coron
http://www.youtube.com/watch?v=SDIXprI3D7k
Fully Homomorphic Encryption with Polylog Overhead –
Talk at EUROCRYPT 2012
http://www.youtube.com/watch?v=dIUU24jBFok
Talks at EUROCRYPT 2012
http://www.youtube.com/watch?v=X2W8YEppLbI&feature=list
_other&playnext=1&list=SPC73BF951C580030A
Implementing Gentry’s Fully-Homomorphic Encryption
Scheme
Craig Gentry and Shai Halevi
http://dx.doi.org/10.1007/978-3-642-20465-4_9
Advances in Cryptology – EUROCRYPT 2011
Kenneth G. Paterson (Editor)
Springer, 2011, ISBN 978-3-642-20464-7, LNCS 6632
http://dx.doi.org/10.1007/978-3-642-20465-4
Encrypted Messages from the Heights of Cryptomania
Craig Gentry
http://dx.doi.org/10.1007/978-3-642-36594-2_7
Theory of Cryptography,
10th Theory of Cryptography Conference, TCC2013
Amit Sahai (Editor)
Springer, 2013, ISBN 978-3-642-36594-2, LNCS 7785
http://dx.doi.org/10.1007/978-3-642-36594-2
Probabilistic Encryption & How To Play Mental Poker
Keeping Secret All Partial Information
Proceedings of the 14th Annual ACM Symposium on Theory of
Computing (STOC 1982)
Shafi Goldwasser and Silvio Micali
http://dx.doi.org/10.1145/800070.802212
Can Homomorphic Encryption be Practical?
Proceedings of the 3rd ACM Workshop on
Cloud Computing Security (CCSW 2011)
Kristin Lauter, Michael Naehrig, and Vinod Vaikuntanathan
http://dx.doi.org/10.1145/2046660.2046682
On Data Banks and Privacy Homomorphisms
Ronald L. Rivest, Len Adleman, and Michael L. Detouzos
http://people.csail.mit.edu/rivest/RivestAdlemanDertouzos-
OnDataBanksAndPrivacyHomomorphisms.pdf
Home Page of L. Rivest (Publications)
http://people.csail.mit.edu/rivest/
Google Scholar
http://scholar.google.com/citations?user=6qE0tdAAAAAJ&hl=e
n
Wikipedia: http://en.wikipedia.org/wiki/Ron_Rivest
Fully Homomorphic Encryption with Relatively
Small Key and Ciphertext Sizes
Nigel P. Smart and Frederick Vercauteren
http://dx.doi.org/10.1007/978-3-642-13013-7_25
Public Key Cryptography – PKC 2010
Phong Q. Nguyen and David Pointcheval (Editors)
Springer, 2010, ISBN 978-3-642-13012-0, LNCS 6056
http://dx.doi.org/10.1007/978-3-642-13013-7
Homomorphic Encryption Tutorial (Crypto 2011)
Shai Halevi, IBM Research
http://www.youtube.com/watch?v=jIWOR2bGC7c Part 1
http://www.youtube.com/watch?v=huLGjBpj3Os Part 2
Fully Homomorphic Encryption
Shai Halevi, IBM Research
http://www.youtube.com/watch?v=R5jaHNC_neI Part 1
http://www.youtube.com/watch?v=1UDZko9jW5w Part 2
Winter School on Secure Computation and Efficiency
Professor Yehuda Lindell,
Department of Computer Science, Bar-Ilan University
http://www.youtube.com/watch?v=z3U-5mf6hGw
Back to the Table of Contents
=======================================
History of Cryptology ====================
Cryptology: The Mathematics of Secure Communication
Gustavus J. Simmons
The Mathematical Intelligencer,
Volume 1, Number 4 (December 1979)
http://dx.doi.org/10.1007/BF03028244
Abraham Lincoln’s Cyphering Book and Ten other
Extraordinary Cyphering Books
Nerida F. Ellerton and M. A. (Ken) Clements
Springer, 2014, ISBN 978-3-319-02502-5
http://dx.doi.org/10.1007/978-3-319-02502-5
Code Breaking in the Pacific
Peter Donovan and John Mack
Springer, 2014, ISBN 978-3-319-08278-3
http://dx.doi.org/10.1007/978-3-319-08278-3
Back to the Table of Contents
=======================================
How to Share a Secret ===================
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
How to Share a Secret (Chapter 17)
Johannes Blomer
http://dx.doi.org/10.1007/978-3-642-15328-0_17
Algorithms Unplugged
B. Vocking et al. (Editors)
Springer, 2011, ISBN 978-3-642-15328-0
http://dx.doi.org/10.1007/978-3-642-15328-0
How to Share a Secret
Adi Shamir
Communications of the ACM,
Volume 22, Number 11 (November 1979)
http://dx.doi.org/10.1145/359168.359176
Safeguarding cryptographic keys
G. R. Blakley
Proceedings AFIPS 1979 National Computer Conference
http://dx.doi.org/10.1109/AFIPS.1979.98
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The breadth of Shamir’s secret-sharing scheme
Ed Dawson and Diane Donovan
Computers & Security, Volume 13, Number 1 (February 1994)
http://dx.doi.org/10.1016/0167-4048(94)90097-3
An Explication of Secret Sharing Schemes
D.R. Stinson
Designs, Codes and Cryptography,
Volume 2, Number 4 (December 1992)
http://dx.doi.org/10.1007/BF00125203
How to Leak a Secret:
Theory and Applications of Ring Signatures
Ronald L. Rivest, Adi Shamir, and Yael Tauman
http://dx.doi.org/10.1007/11685654_7
Theoretical Computer Science:
Essays in Memory of Shimon Even
Oded Goldreich, Arnold L. Rosenberg, and Alan M. Selman
(Editors)
Springer, 2006, ISBN 978-3-540-32881-0
http://dx.doi.org/10.1007/11685654
Secret swarm unit: Reactive k-secret sharing
Shlomi Dolev, Limor Lahiani, and Moti Yung
Ad Hoc Networks, Volume 10, Number 7 (September 2012)
http://dx.doi.org/10.1016/j.adhoc.2012.03.011
Secure Multiparty Computation and Secret Sharing
Ronald Cramer, Ivan Bjerre Damgard, and Jesper Buus Nielsen
Cambridge University Press, 2015, ISBN 9781107337756
http://dx.doi.org/10.1017/CBO9781107337756
Back to the Table of Contents
=======================================
Anonymity ============================
Seeking Anonymity in an Internet Panopticon
Joan Feigenbaum and Bryan Ford
Communications of the ACM,
Volume 58, Number 10 (October 2015)
http://dx.doi.org/10.1145/2714561
Dissent – accountable anonymous group communication
http://dedis.cs.yale.edu/dissent/
Tor Project – Anonymity Online
https://www.torproject.org/
Anonymization
Rolf H. Weber and Ulrike I. Heinrich
Springer, 2012, ISBN 978-1-4471-4066-5
http://dx.doi.org/10.1007/978-1-4471-4066-5
Anonymous Communication Networks:
Protecting Privacy on the Web
Kun Peng
CRC Press, 2014, ISBN 978-1-4398-8160-6
http://dx.doi.org/10.1201/b16756
On Anonymity in an Electronic Society:
A Survey of Anonymous Communication Systems
Matthew Edman and Bulent Yener
ACM Computing Surveys,
Volume 42, Number 1 (December 2009)
http://dx.doi.org/10.1145/1592451.1592456
The Dining Cryptographers Problem: Unconditional Sender
and Recipient Untraceability
David Chaum
Journal of Cryptology, Volume 1, Number 1 (January 1988)
http://dx.doi.org/10.1007/BF00206326
Practical Anonymity: Hiding in Plain Sight Online
Peter Loshin
Elsevier, 2013, ISBN 978-0-12-410404-4
http://www.sciencedirect.com/science/book/9780124104044
Privacy for Reporters of Human Rights Abuses:
Identity and Anonymity in Mobile Networks
Leonardo Martucci and Simone Fischer-Hubner
http://dx.doi.org/10.1007/978-94-007-1384-0_13
Personal Privacy in Mobile Networks
Claudio A. Ardagna, Sabrina De Capitani di Vimercati,
And Pierangela Samarati
http://dx.doi.org/10.1007/978-94-007-1384-0_14
Mobile Technologies for Conflict Management:
Online Dispute Resolution, Governance, Participation
Marta Poblet (Editor)
Springer, 2011, ISBN 978-94-007-1384-0
http://dx.doi.org/10.1007/978-94-007-1384-0
Back to the Table of Contents
=======================================
Privacy and Identity Management =========
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
You: for Sale – Protecting Your Personal Data and
Privacy Online
Stuart Sumner
Elsevier, 2016, ISBN 978-0-12-803405-7
http://www.sciencedirect.com/science/book/978012803
4057
If You’re Not Paranoid, You’re Crazy
Walter Klein
Atlantic (November 2015)
http://www.theatlantic.com/magazine/archive/2015/11
/if-youre-not-paranoid-youre-crazy/407833/
How Companies Learn Your Secrets
Charles Duhigg
New York Times Magazine (February 16, 2012)
http://www.nytimes.com/2012/02/19/magazine/shoppi
ng-habits.html?pagewanted=all
How Should We Think about Privacy?
Jaron Lanier
Scientific American,
Volume 309, Number 5 (November 2013)
http://dx.doi.org/10.1038/scientificamerican1113-64
Wikipedia: http://en.wikipedia.org/wiki/Jaron_Lanier
The Data-Driven Society
Alex “Sandy” Pentland
Scientific American,
Volume 309, Number 4 (October 2013)
http://dx.doi.org/10.1038/scientificamerican1013-78
Browse at Your Own Risk
Nick Nikiforakis and Gunes Acar
IEEE Spectrum, Volume 51, Number 8 (August 2014)
http://dx.doi.org/10.1109/MSPEC.2014.6866435
Privacy vs. Security
Sophie Stalla-Bourdillon, Joshua Phillips, and Mark D. Ryan
Springer, 2014, ISBN 978-1-4471-6530-9
http://dx.doi.org/10.1007/978-1-4471-6530-9
The End of Privacy (special issue)
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy

More Related Content

Similar to Cybersecurity, Cryptography, and Privacy

May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
Top Download Article in Computer Science & Information Technology Research: O...
Top Download Article in Computer Science & Information Technology Research: O...Top Download Article in Computer Science & Information Technology Research: O...
Top Download Article in Computer Science & Information Technology Research: O...
AIRCC Publishing Corporation
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1
IJNSA Journal
 
Nse seminar 4_dec_hammar_stadler
Nse seminar 4_dec_hammar_stadlerNse seminar 4_dec_hammar_stadler
Nse seminar 4_dec_hammar_stadler
Kim Hammar
 
© 2010 Taylor & Francis Group, LLCInformatio.docx
© 2010 Taylor & Francis Group, LLCInformatio.docx© 2010 Taylor & Francis Group, LLCInformatio.docx
© 2010 Taylor & Francis Group, LLCInformatio.docx
gerardkortney
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
laurieannwilliams
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
International Journal of Computer Science and Security (IJCSS) Volume (4) Iss...
International Journal of Computer Science and Security (IJCSS) Volume (4) Iss...International Journal of Computer Science and Security (IJCSS) Volume (4) Iss...
International Journal of Computer Science and Security (IJCSS) Volume (4) Iss...
CSCJournals
 
Health Information Privacy and Security (October 30, 2019)
Health Information Privacy and Security (October 30, 2019)Health Information Privacy and Security (October 30, 2019)
Health Information Privacy and Security (October 30, 2019)
Nawanan Theera-Ampornpunt
 
April 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information TechnologyApril 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information Technology
AIRCC Publishing Corporation
 
Chicago Security Meetup 08/2016
Chicago Security Meetup 08/2016Chicago Security Meetup 08/2016
Chicago Security Meetup 08/2016
Michael Roytman
 
Information Security And The Healthcare
Information Security And The HealthcareInformation Security And The Healthcare
Information Security And The Healthcare
Tracy Berry
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanWho Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Michael Roytman
 
New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...
AIRCC Publishing Corporation
 
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityApplication of Machine Learning in Cyber Security
Application of Machine Learning in Cyber Security
Dr. Umesh Rao.Hodeghatta
 
May 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyMay 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information Technology
AIRCC Publishing Corporation
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
IJNSA Journal
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
April Dillard
 

Similar to Cybersecurity, Cryptography, and Privacy (20)

May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its Applications
 
Top Download Article in Computer Science & Information Technology Research: O...
Top Download Article in Computer Science & Information Technology Research: O...Top Download Article in Computer Science & Information Technology Research: O...
Top Download Article in Computer Science & Information Technology Research: O...
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1
 
Nse seminar 4_dec_hammar_stadler
Nse seminar 4_dec_hammar_stadlerNse seminar 4_dec_hammar_stadler
Nse seminar 4_dec_hammar_stadler
 
© 2010 Taylor & Francis Group, LLCInformatio.docx
© 2010 Taylor & Francis Group, LLCInformatio.docx© 2010 Taylor & Francis Group, LLCInformatio.docx
© 2010 Taylor & Francis Group, LLCInformatio.docx
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
 
International Journal of Computer Science and Security (IJCSS) Volume (4) Iss...
International Journal of Computer Science and Security (IJCSS) Volume (4) Iss...International Journal of Computer Science and Security (IJCSS) Volume (4) Iss...
International Journal of Computer Science and Security (IJCSS) Volume (4) Iss...
 
Health Information Privacy and Security (October 30, 2019)
Health Information Privacy and Security (October 30, 2019)Health Information Privacy and Security (October 30, 2019)
Health Information Privacy and Security (October 30, 2019)
 
April 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information TechnologyApril 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information Technology
 
Chicago Security Meetup 08/2016
Chicago Security Meetup 08/2016Chicago Security Meetup 08/2016
Chicago Security Meetup 08/2016
 
Information Security And The Healthcare
Information Security And The HealthcareInformation Security And The Healthcare
Information Security And The Healthcare
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its Applications
 
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanWho Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
 
New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...
 
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityApplication of Machine Learning in Cyber Security
Application of Machine Learning in Cyber Security
 
May 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyMay 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information Technology
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 

More from HarshitParkar6677

Wi fi hacking
Wi fi hackingWi fi hacking
Wi fi hacking
HarshitParkar6677
 
D dos attack
D dos attackD dos attack
D dos attack
HarshitParkar6677
 
Notes chapter 6
Notes chapter  6Notes chapter  6
Notes chapter 6
HarshitParkar6677
 
Interface notes
Interface notesInterface notes
Interface notes
HarshitParkar6677
 
Chapter6 2
Chapter6 2Chapter6 2
Chapter6 2
HarshitParkar6677
 
Chapter6
Chapter6Chapter6
8086 cpu 1
8086 cpu 18086 cpu 1
8086 cpu 1
HarshitParkar6677
 
Chapter 6 notes
Chapter 6 notesChapter 6 notes
Chapter 6 notes
HarshitParkar6677
 
Chapter 5 notes
Chapter 5 notesChapter 5 notes
Chapter 5 notes
HarshitParkar6677
 
Chap6 procedures & macros
Chap6 procedures & macrosChap6 procedures & macros
Chap6 procedures & macros
HarshitParkar6677
 
Chapter 5 notes new
Chapter 5 notes newChapter 5 notes new
Chapter 5 notes new
HarshitParkar6677
 
Notes arithmetic instructions
Notes arithmetic instructionsNotes arithmetic instructions
Notes arithmetic instructions
HarshitParkar6677
 
Notes all instructions
Notes all instructionsNotes all instructions
Notes all instructions
HarshitParkar6677
 
Notes aaa aa
Notes aaa aaNotes aaa aa
Notes aaa aa
HarshitParkar6677
 
Notes 8086 instruction format
Notes 8086 instruction formatNotes 8086 instruction format
Notes 8086 instruction format
HarshitParkar6677
 
Misc
MiscMisc
Copy of 8086inst logical
Copy of 8086inst logicalCopy of 8086inst logical
Copy of 8086inst logical
HarshitParkar6677
 
Copy of 8086inst logical
Copy of 8086inst logicalCopy of 8086inst logical
Copy of 8086inst logical
HarshitParkar6677
 
Chapter3 program flow control instructions
Chapter3 program flow control instructionsChapter3 program flow control instructions
Chapter3 program flow control instructions
HarshitParkar6677
 
Chapter3 8086inst stringsl
Chapter3 8086inst stringslChapter3 8086inst stringsl
Chapter3 8086inst stringsl
HarshitParkar6677
 

More from HarshitParkar6677 (20)

Wi fi hacking
Wi fi hackingWi fi hacking
Wi fi hacking
 
D dos attack
D dos attackD dos attack
D dos attack
 
Notes chapter 6
Notes chapter  6Notes chapter  6
Notes chapter 6
 
Interface notes
Interface notesInterface notes
Interface notes
 
Chapter6 2
Chapter6 2Chapter6 2
Chapter6 2
 
Chapter6
Chapter6Chapter6
Chapter6
 
8086 cpu 1
8086 cpu 18086 cpu 1
8086 cpu 1
 
Chapter 6 notes
Chapter 6 notesChapter 6 notes
Chapter 6 notes
 
Chapter 5 notes
Chapter 5 notesChapter 5 notes
Chapter 5 notes
 
Chap6 procedures & macros
Chap6 procedures & macrosChap6 procedures & macros
Chap6 procedures & macros
 
Chapter 5 notes new
Chapter 5 notes newChapter 5 notes new
Chapter 5 notes new
 
Notes arithmetic instructions
Notes arithmetic instructionsNotes arithmetic instructions
Notes arithmetic instructions
 
Notes all instructions
Notes all instructionsNotes all instructions
Notes all instructions
 
Notes aaa aa
Notes aaa aaNotes aaa aa
Notes aaa aa
 
Notes 8086 instruction format
Notes 8086 instruction formatNotes 8086 instruction format
Notes 8086 instruction format
 
Misc
MiscMisc
Misc
 
Copy of 8086inst logical
Copy of 8086inst logicalCopy of 8086inst logical
Copy of 8086inst logical
 
Copy of 8086inst logical
Copy of 8086inst logicalCopy of 8086inst logical
Copy of 8086inst logical
 
Chapter3 program flow control instructions
Chapter3 program flow control instructionsChapter3 program flow control instructions
Chapter3 program flow control instructions
 
Chapter3 8086inst stringsl
Chapter3 8086inst stringslChapter3 8086inst stringsl
Chapter3 8086inst stringsl
 

Recently uploaded

Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
Madan Karki
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
TaghreedAltamimi
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
MiscAnnoy1
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 

Recently uploaded (20)

Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 

Cybersecurity, Cryptography, and Privacy

  • 1. Cybersecurity, Cryptography, and Privacy All links to books in digital libraries are “local” – each link will work without login on any campus (or VPN remotely) with access to those libraries. The Open Access items are colored green. For a more comfortable library visit, use Google Chrome and, while you are scrolling through the titles, always right-click on the selected item’s link to “Open link in new tab” – after you close the new tab, your cursor will be where you right-clicked. This section of the library was updated on 19 March 2016. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License (available at: http://creativecommons.org/licenses/by-nc-nd/3.0/). This work is free only for personal and classroom use. Professor Joseph Vaisman Department of Computer Science and Engineering, NYU-Poly jv@competitive-learning.org
  • 2. Table of Contents Introduction to Information Security Cybersecurity Hacking and Penetration Testing Homeland Security and Cyber Warfare Managing Information Security Economics of Information Security and Privacy Information Hiding and Steganography Data Encryption Hardening Software Network Security Mobile Network Security Hardware Security RFID Security Sensor Network Security Internet of Things (IoT) Security Cloud Security Smart Grid Security Smart City Security Cyber-Physical Systems Security
  • 3. Biometrics Security Engineering Digital Forensics Risk Trust Professional Certifications Careers in Cybersecurity Programming Mathematics for Cryptography Cryptography Homomorphic Encryption History of Cryptology How to Share a Secret Anonymity Privacy and Identity Management Data Privacy E-Cash Security Science/Physical Security Additional Web Resources Legal Matters Reference Material
  • 4. Online Publications – Directly Odds & Ends
  • 5. Introduction to Information Security ======= Introduction to Information Security: A Strategic-based Approach Timothy J. Shimeall and Jonathan M. Spring Elsevier, 2014, ISBN 978-1-59749-969-9 http://www.sciencedirect.com/science/book/9781597499699 The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice, Second Edition Jason Andress Elsevier, 2014, ISBN 978-0-12-800744-0 http://www.sciencedirect.com/science/book/9780128007440 Security Controls Evaluation, Testing, and Assessment Handbook Leighton Johnson Elsevier, 2016, ISBN 978-0-12-802324-2 http://www.sciencedirect.com/science/book/9780128023242 Elements of Computer Security David Salomon Springer, 2010, ISBN 978-0-85729-006-9 http://dx.doi.org/10.1007/978-0-85729-006-9
  • 6. Advanced Computing and Systems for Security, Volume 1 Rituparna Chaki, Agostino Cortesi, Khalid Saeed, and Nabendu Chaki (Editors) Springer, 2016, ISBN 978-81-322-2650-5 http://dx.doi.org/10.1007/978-81-322-2650-5 Applied Information Security: A Hands-on Approach David Basin, Patrick Schaller, and Michael Schlapfer Springer, 2011, ISBN 978-3-642-24474-2 http://dx.doi.org/10.1007/978-3-642-24474-2 Information Security: Principles and Practice, Second Edition Mark Stamp Wiley, 2011, ISBN 9781118027974 http://dx.doi.org/10.1002/9781118027974 What Is Computer Science? – An Information Security Perspective Daniel Page and Nigel Smart Springer, 2014, ISBN 978-3-319-04042-4 http://dx.doi.org/10.1007/978-3-319-04042-4 Back to the Table of Contents ======================================= Cybersecurity ==========================
  • 7. The Information Systems Security Officer’s Guide: Establishing and Managing a Cyber Security Program; Third Edition Gerald L. Kovacich Elsevier, 2016, ISBN 978-0-12-802190-3 http://www.sciencedirect.com/science/book/9780128021903 Cyber Security and IT Infrastructure Protection John R. Vacca (Editor) Elsevier, 2014, ISBN 978-0-12-416681-3 http://www.sciencedirect.com/science/book/9780124166813 Cyber Security: Deterrence and IT Protection for Critical Infrastructures Maurizio Martellini (Editor) Springer, 2013, ISBN 978-3-319-02279-6 http://dx.doi.org/10.1007/978-3-319-02279-6 Cyber Crime and Cyber Terrorism Investigator’s Handbook Babak Akhgar, Andrew Staniforth, and Francesca Bosco (Editors) Elsevier, 2014, ISBN 978-0-12-800743-3 http://www.sciencedirect.com/science/book/9780128007433 Cyber Reconnaissance, Surveillance and Defense Robert Shimonski Elsevier, 2015, ISBN 978-0-12-801308-3 http://www.sciencedirect.com/science/book/9780128013083
  • 8. Cyber Security: Analytics, Technology and Automation Martti Lehto and Pekka Neittaanmaki (Editors) Springer, 2015, ISBN 978-3-319-18302-2 http://dx.doi.org/10.1007/978-3-319-18302-2 How to Attack and Defend Your Website Henry Dalziel Elsevier, 2015, ISBN 978-0-12-802732-5 http://www.sciencedirect.com/science/book/9780128027325 Theoretical and Experimental Methods for Defending Against DDoS Attacks Mohammad Reza Khalifeh Soltanian, Iraj Sadegh Amiri Elsevier, 2016, ISBN 978-0-12-805391-1 http://www.sciencedirect.com/science/book/9780128053911 Inside the Hack of the Century, Parts 1, 2, and 3 Peter Elkind Fortune (July 1, 2015) http://fortune.com/sony-hack-part-1/ Cybersecurity’s Human Factor: Lessons from the Pentagon James A. “Sandy” Winnefeld Jr., Christopher Kirchoff, and David M. Upton Harvard Business Review, Volume 93, Number 8 (September 2015) http://search.ebscohost.com/login.aspx?direct=true&db=buh& AN=108820482&site=bsi-live
  • 9. Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques Sudhanshu Chauhan and Nutan Kumar Panda Elsevier, 2015, ISBN 978-0-12-801867-5 http://www.sciencedirect.com/science/book/9780128018675 Data Protection from Insider Threats Elisa Bertino Morgan & Claypool, 2012, ISBN 9781608457694 http://dx.doi.org/10.2200/S00431ED1V01Y201207DTM028 Detecting and Combating Malicious Email Julie JCH Ryan and Cade Kamachi Elsevier, 2015, ISBN 978-0-12-800110-3 http://www.sciencedirect.com/science/book/9780128001103 Phishing Dark Waters: The Offensive and Defensive Sides of Malicious E-mails Christopher Hadnagy and Michele Fincher Wiley, 2015, ISBN 9781119183624 http://dx.doi.org/10.1002/9781119183624 Emerging Trends in ICT Security Babak Akhgar and Hamid R. Arabnia (Editors) Elsevier, 2014, ISBN 978-0-12-411474-6 http://www.sciencedirect.com/science/book/9780124114746
  • 10. Human Aspects of Information Security, Privacy, and Trust, First International Conference, HAS 2013 Louis Marinos and Ioannis Askoxylakis (Editors) Springer, 2013, ISBN 978-3-642-39345-7 http://dx.doi.org/10.1007/978-3-642-39345-7 Measuring and Communicating Security’s Value: A Compendium of Metrics for Enterprise Protection George Campbell Elsevier, 2015, ISBN 978-0-12-802841-4 http://www.sciencedirect.com/science/book/9780128028414 Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, and Jason L. Martin Elsevier, 2015, ISBN 978-0-12-800207-0 http://www.sciencedirect.com/science/book/9780128002070 Introduction to Intelligent Surveillance Wei Qi Yan Springer, 2016, ISBN 978-3-319-28515-3 http://dx.doi.org/10.1007/978-3-319-28515-3 Industrial Espionage and Technical Surveillance Counter Measures Iosif Androulidakis and Fragkiskos – Emmanouil Kioupakis Springer, 2016, ISBN 978-3-319-28666-2 http://dx.doi.org/10.1007/978-3-319-28666-2
  • 11. Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware Aditya K. Sood and Richard Enbody Elsevier, 2014, ISBN 978-0-12-800604-7 http://www.sciencedirect.com/science/book/9780128006047 Towards Fundamental Science of Cyber Security Alexander Kott http://dx.doi.org/10.1007/978-1-4614-7597-2_1 Network Science and Cybersecurity Robinson E. Pino (Editor) Springer, 2014, ISBN 978-1-4614-7597-2 http://dx.doi.org/10.1007/978-1-4614-7597-2 The Psychology of Security Ryan West Communications of the ACM, Volume 51, Number 4 (April 2008) http://dx.doi.org/10.1145/1330311.1330320 Zen and the Art of Information Security Ira Winkler Elsevier, 2007, ISBN 978-1-59749-168-6 http://www.sciencedirect.com/science/book/9781597491686 Physical-Layer Security: From Information Theory to Security Engineering
  • 12. Matthieu Block and Joao Barros Cambridge University Press, 2011, ISBN 9780511977985 http://dx.doi.org/10.1017/CBO9780511977985 Analyzing and Defending Against Web-Based Malware Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, and Insup Lee ACM Computing Surveys, Volume 45, Number 4 (August 2013) http://dx.doi.org/10.1145/2501654.2501663 Botnets: A survey Sergio S.C. Silva, Rodrigo M.P. Silva, Raquel C.G. Pinto, and Ronaldo M. Salles Computer Networks, Volume 57, Number 2 (February 2013) http://dx.doi.org/10.1016/j.comnet.2012.07.021 Botnets Heli Tiirman-Klaar, Jan Gassen, Elmar Gerhards-Padilla, and Peter Martini Springer, 2013, ISBN 978-1-4471-5216-3 http://dx.doi.org/10.1007/978-1-4471-5216-3 Intelligent Systems for Security Informatics Christopher Yang, Wenji Mao, Xiaolong Zheng, and Hui Wang Elsevier, 2013, ISBN 978-0-12-404702-0 http://www.sciencedirect.com/science/book/9780124047020 Advanced Persistent Threat:
  • 13. Understanding the Danger and How to Protect Your Organization Eric Cole Elsevier, 2013, ISBN 978-1-59749-949-1 http://www.sciencedirect.com/science/book/9781597499491 Spyware and Adware John Aycock Springer, 2011, ISBN 978-0-387-77741-2 http://dx.doi.org/10.1007/978-0-387-77741-2 Identifying Malicious Code Through Reverse Engineering Abhishek Singh (Editor) Springer, 2009, ISBN 978-0-387-89468-3 http://dx.doi.org/10.1007/978-0-387-89468-3 SQL Injection Attacks and Defense, Second Edition Justin Clarke Elsevier, 2012, ISBN 978-1-59749-963-7 http://www.sciencedirect.com/science/book/9781597499637 Securing SQL Server: Protecting Your Database from Attacks, Third Edition Denny Cherry Elsevier, 2015, ISBN 978-0-12-801275-9 http://www.sciencedirect.com/science/book/9780128012758 Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure
  • 14. Derrick Rountree Elsevier, 2013, ISBN 978-1-59749-958-3 http://www.sciencedirect.com/science/book/9781597499583 Windows Server 2012 Security from End to Edge and Beyond: Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions Thomas W. Shinder, Yuri Diogenes, and Debra Littlejohn Shinder Elsevier, 2013, ISBN 978-1-59749-980-4 http://www.sciencedirect.com/science/book/9781597499804 http://dx.doi.org/10.1016/B978-1-59749-980-4.09985-4 Investigating Computer-Related Crime, Second Edition Peter Stephenson and Keith Gilbert CRC Press, 2013, ISBN 978-1-4200-0370-3 http://dx.doi.org/10.1201/b14664 Cybercrimes: A Multidisciplinary Analysis Sumit Ghosh and Elliot Turrini Springer, 2010, ISBN 978-3-642-13547-7 http://dx.doi.org/10.1007/978-3-642-13547-7 RE’09: Security Requirements Engineering (special issue) Eric Dubois and Haralambos Mouratidis (Editors) Requirements Engineering, Volume 15, Number 1 (March 2010) http://link.springer.com/journal/766/15/1/
  • 15. 6. Information Security Applications Based on Biomolecular Systems Guinevere Strack, Heather R. Lukarift, Glenn R. Johnson, and Evgeny Katz http://dx.doi.org/10.1002/9783527645480.ch6 Biomolecular Information Processing: From Logic Systems to Smart Sensors and Actuators Evgeny Katz (Editor) Wiley, 2012, ISBN 9783527645480 http://dx.doi.org/10.1002/9783527645480 Cyber Security Policy Guidebook Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt, and Joseph Weiss Wiley, 2012, ISBN 9781118241530 http://dx.doi.org/10.1002/9781118241530 Cryptographic Protocol: Security Analysis Based on Trusted Freshness Ling Dong and Kefei Chen Springer, 2012, ISBN 978-3-642-24073-7 http://dx.doi.org/10.1007/978-3-642-24073-7 Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation Thomas Schneider Springer, 2012, ISBN 978-3-642-30042-4 http://dx.doi.org/10.1007/978-3-642-30042-4
  • 16. Secure Multi-Party Non-Repudiation Protocols and Applications Jose A. Onieva, Javier Lopez, and Jianying Zhou Springer, 2009, ISBN 978-0-387-75630-1 http://dx.doi.org/10.1007/978-0-387-75630-1 Advances in Intelligence and Security Informatics Wenji Mao and Fei-Yue Wang Elsevier, 2012, ISBN 978-0-12 397200-2 http://www.sciencedirect.com/science/book/9780123972002 Balanced Secure Scan: Partial Scan Approach for Secret Information Protection Michiko Inoue, Tomokazu Yoneda, Mineo Hasegawa, and Hideo Fujiwara Journal of Electronic Testing, Volume 27, Number 2 (April 2011) http://dx.doi.org/10.1007/s10836-011-5204-0 Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats Bill Gardner and Valerie Thomas Elsevier, 2014, ISBN 978-0-12-419967-5 http://www.sciencedirect.com/science/book/9780124199675 Client-Side Attacks and Defense Robert Shimonski and Sean-Philip Oriyano Elsevier, 2012, ISBN 978-1-59749-590-5
  • 17. http://www.sciencedirect.com/science/book/9781597495905 The Hacker’s Guide to OS X: Exploiting OS X from the Root Up Rob Bathurst, Russ Rogers, and Alijohn Ghassemlouei Elsevier, 2013, ISBN 978-1-59749-950-7 http://www.sciencedirect.com/science/book/9781597499507 Thor’s Microsoft Security Bible: A Collection of Practical Security Techniques Timothy “Thor” Mullen Elsevier, 2011, ISBN 978-1-59749-572-1 http://www.sciencedirect.com/science/book/9781597495721 Embedded Systems Security: Practical Methods for Safe and Secure Software and Systems Development David Kleidermacher and Mike Kleidermacher Elsevier, 2012, ISBN 978-0-12-386886-2 http://www.sciencedirect.com/science/book/9780123868862 Security Basics for Computer Architects Ruby B. Lee Morgan & Claypool, 2013, ISBN 9781627051569 http://dx.doi.org/10.2200/S00512ED1V01Y201305CAC025 Game Theory Meets Network Security and Privacy Mohammad Hossein Manshael, Quanyan Zhu, Tansu Alpcan, Tamer Basar, and Jan-Pierre Hubaux ACM Computer Surveys, Volume 45, Number 3 (June 2013) http://dx.doi.org/10.1145/2480741.2480742
  • 18. Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned Milind Tambe Cambridge University Press, 2012, ISBN 9780511973031 http://dx.doi.org/10.1017/CBO9780511973031 Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft Eric Cole and Sandra Ring Elsevier, 2006, ISBN 978-1-59749-048-1 http://www.sciencedirect.com/science/book/9781597490481 Information Assurance and Security Education and Training: WISE 8, WISE 7, and WISE 6 Revised Selected Papers Ronald C. Dodge Jr. and Lynn Futcher (Editors) Springer, 2013, ISBN 978-3-642-39377-8 http://dx.doi.org/10.1007/978-3-642-39377-8 Rethinking computing insanity, practice and research Gene Spafford (December 15, 2008) http://www.cerias.purdue.edu/site/blog/post/rethinking_com puting_insanity_practice_and_research/ Perfect Password: Selection, Protection, Authentication Mark Burnett and Dave Kleiman Elsevier, 2005, ISBN 978-1-59749-041-2 http://www.sciencedirect.com/science/book/9781597490412
  • 19. Online Security for the Business Traveler Deborah Gonzalez Elsevier, 2014, ISBN 978-0-12-800069-4 http://www.sciencedirect.com/science/book/9780128000694 Workshop Program 8th USENIX Workshop on Offensive Technologies, WOOT’14 https://www.usenix.org/conference/woot14/workshop- program Back to the Table of Contents ======================================= Hacking and Penetration Testing ========== Essential Skills for Hackers Kevin Cardwell Elsevier, 2016, ISBN 978-0-12-804755-2 http://www.sciencedirect.com/science/book/9780128047552 The Antivirus Hacker’s Handbook Joxean Koret and Elias Bachaalany Wiley, 2015, ISBN 9781119183525 http://dx.doi.org/10.1002/9781119183525 The Basics of Hacking and Penetration Testing:
  • 20. Ethical Hacking and Penetration Testing Made Easy, Second Edition Patrick Engebretson Elsevier, 2013, ISBN 978-0-12-411644-3 http://www.sciencedirect.com/science/book/9780124116443 The Basics of Web Hacking: Tools and Techniques to Attack the Web Josh Pauli Elsevier, 2013, ISBN 978-0-12-416600-4 http://www.sciencedirect.com/science/book/9780124166004 Google Hacking for Penetration Testers; Third Edition Johnny Lang, Bill Gardner, and Justin Brown Elsevier, 2016, ISBN 978-0-12-802964-0 http://www.sciencedirect.com/science/book/9780128029640 Hacking and Penetration Testing with Low Power Devices Philip Polstra Elsevier, 2015, ISBN 978-0-12-800751-8 http://www.sciencedirect.com/science/book/9780128007518 Hacking Web Apps: Detecting and Preventing Web Applications Security Problems Mike Shema Elsevier, 2012, ISBN 978-1-59749-951-4 http://www.sciencedirect.com/science/book/9781597499514 Hacking with Kali: Practical Penetration Testing Techniques
  • 21. James Broad and Andrew Binder Elsevier, 2014, ISBN 978-0-12-407749-2 http://www.sciencedirect.com/science/book/9780124077492 Low Tech Hacking Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, and Sean Lowther Elsevier, 2012, ISBN 978-1-59749-665-0 http://www.sciencedirect.com/science/book/9781597496650 Meeting People via WiFi and Bluetooth Joshua Schroeder Elsevier, 2016, ISBN 978-0-12-804721-7 http://www.sciencedirect.com/science/book/9780128047217 The Mobile Application Hacker’s Handbook Dominic Chell, Tyrone Erasmus, Shaun Colley, and Ollie Whitehouse Wiley, 2015, ISBN 9781118958506 http://dx.doi.org/10.1002/9781119183655 Network Attacks & Exploitation: A Framework Matthew Monte Wiley, 2015, ISBN 9781119183440 http://dx.doi.org/10.1002/9781119183440 Professional Penetration Testing: Creating and Learning in a Hacking Lab, Second Edition Thomas Wilhelm
  • 22. Elsevier, 2013, ISBN 978-1-59749-993-4 http://www.sciencedirect.com/science/book/9781597499934 Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense Gavin Watson, Andrew Mason, and Richard Ackroyd Elsevier, 2014, ISBN 978-0-12-420124-8 http://www.sciencedirect.com/science/book/9780124201248 Wireless Reconnaissance in Penetration Testing Matthew Neely, Alex Hamerstone, and Chris Sanyk Elsevier, 2013, ISBN 978-1-59749-731-2 http://www.sciencedirect.com/science/book/9781597497312 Back to the Table of Contents ======================================= Homeland Security and Cyber Warfare ===== ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Homeland Security: The Essentials Jane A. Bullock, George D. Haddow, and Damon P. Coppola Elsevier, 2013, ISBN 978-0-12-415803-0 http://www.sciencedirect.com/science/book/9780124158030
  • 23. Introduction to Cyber-Warfare: A Multidisciplinary Approach Paolo Shakarian, Jana Shakarian, and Andrew Ruef Elsevier, 2013, ISBN 978-0-12-407814-7 http://www.sciencedirect.com/science/book/9780124078147 Cyber War, Cyber Space: National Security and Privacy in the Global Economy Panel: Steven Bellovin, Yvo Desmedt, Amir Hertzberg, and Bart Preneel; Moderator: Thomas Ferguson New Economic Thinking (2014) https://www.youtube.com/watch?v=Zzy0NT7vbxo ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization Eric Cole Elsevier, 2013, ISBN 978-1-59749-949-1 http://www.sciencedirect.com/science/book/9781597499491 Application of Big Data for National Security: A Practitioner’s Guide to Emerging Technologies Babak Akhgar, Gregory B. Saathoff, Hamid R. Arabnia, Richard Hill, Andrew Staniforth, and Petra Saskia Bayerl (Editors) Elsevier, 2015, ISBN 978-0-12-801967-2 http://www.sciencedirect.com/science/book/9780128019672
  • 24. The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice Steve Winterfeld and Jason Andress Elsevier, 2013, ISBN 978-0-12-404737-2 http://www.sciencedirect.com/science/book/9780124047372 Counterterrorism and Cybersecurity: Total Information Awareness, Second edition Newton Lee Springer, 2015, ISBN 978-3-319-17244-6 http://dx.doi.org/10.1007/978-3-319-17244-6 Cyber Crime and Cyber Terrorism Investigator’s Handbook Babak Akhgar, Andrew Staniforth, and Francesca Bosco (Editors) Elsevier, 2014, ISBN 978-0-12-800743-3 http://www.sciencedirect.com/science/book/9780128007433 Cyberterrorism: Understanding, Assessment, and Response Thomas M. Chen, Lee Jarvis, and Stuart Macdonald (Editors) Springer, 2014, ISBN 978-1-4939-0962-9 http://dx.doi.org/10.1007/978-1-4939-0962-9 Cyber Warfare: Building the Scientific Foundation Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, and Cliff Wang (Editors) Springer, 2015, ISBN 978-3-319-14039-1 http://dx.doi.org/10.1007/978-3-319-14039-1
  • 25. Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, Second Edition Jason Andress and Steve Winterfeld Elsevier, 2014, ISBN 978-0-12-416672-1 http://www.sciencedirect.com/science/book/9780124166721 Cyber Warfare and the Laws of War Heather Harrison Dinniss Cambridge University Press, 2013, ISBN 9780511894527 http://dx.doi.org/10.1017/CBO9780511894527 Handbook of Computational Approaches to Counterterrorism V.S. Subrahmanian (Editor) Springer, 2013, ISBN 978-1-4614-5311-6 http://dx.doi.org/10.1007/978-1-4614-5311-6 Intelligent Methods for Cyber Warfare Ronald R. Yager, Marek Z. Reformat, and Naïf Alajlan (Editors) Springer, 2015, ISBN 978-3-319-08624-8 http://dx.doi.org/10.1007/978-3-319-08624-8 Strategic Intelligence Management: National Security Imperatives and Information and Communication Technologies Babak Akhgar and Simeon Yates (Editors) Elsevier, 2013, ISBN 978-0-12-407191-9 http://www.sciencedirect.com/science/book/9780124071919
  • 26. Back to the Table of Contents ======================================= Managing Information Security =========== Building a Corporate Culture of Security: Strategies for Strengthening Organizational Resiliency John Sullivant Elsevier, 2016, ISBN 978-0-12-802019-7 http://www.sciencedirect.com/science/book/9780128020197 Infosec Management Fundamentals Henry Dalziel Elsevier, 2015, ISBN 978-0-12-804172-7 http://www.sciencedirect.com/science/book/978012804 1727 Becoming a Global Chief Security Executive Officer Roland Cloutier Elsevier, 2016, ISBN 978-0-12-802782-0 http://www.sciencedirect.com/science/book/9780128027820 Building an Intelligence-Led Security Program Allan Liska
  • 27. Elsevier, 2015, ISBN 978-0-12-802145-3 http://www.sciencedirect.com/science/book/9780128021453 Designing and Building A Security Operations Center David Nathans Elsevier, 2015, ISBN 978-0-12-800899-7 http://www.sciencedirect.com/science/book/9780128008997 Exploring the Security Landscape: Non-Traditional Security Challenges Anthony J. Masys (Editor) Springer, 2016, ISBN 978-3-319-27914-5 http://dx.doi.org/10.1007/978-3-319-27914-5 How to Cheat at Managing Information Security Mark Osborne Elsevier, 2006, ISBN 978-1-59749-110-5 http://www.sciencedirect.com/science/book/9781597491105 The Manager’s Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web Ron Lepofsky Springer, 2014, ISBN 978-1-4842-0148-0 http://dx.doi.org/10.1007/978-1-4842-0148-0 Managing Information Security, Second Edition John R. Vacca (Editor) Elsevier, 2014, ISBN 978-0-12-416688-2 http://www.sciencedirect.com/science/book/9780124166882
  • 28. Securing Social Media in the Enterprise Henry Dalziel Elsevier, 2015, ISBN 978-0-12-804180-2 http://www.sciencedirect.com/science/book/9780128041802 Security Planning: An Applied Approach Susan Lincke Springer, 2015, ISBN 978-3-319-16027-6 http://dx.doi.org/10.1007/978-3-319-16027-6 Back to the Table of Contents ======================================= Economics of Information Security and Privacy ======================================= Blackhatonomics: An Inside Look at the Economics of Cybercrime Will Gragido, Daniel Molina, John Pirc, and Nick Selby Elsevier, 2013, ISBN 978-1-59749-740-4 http://www.sciencedirect.com/science/book/9781597497404 Economics of Information Security and Privacy Tyler Moore, David J. Pym, and Christos Ioannidis (Editors)
  • 29. Springer, 2010, ISBN 978-1-4419-6967-5 http://dx.doi.org/10.1007/978-1-4419-6967-5 The Economics of Information Security and Privacy Rainer Bohme (Editor) Springer, 2013, ISBN 978-3-642-39498-0 http://dx.doi.org/10.1007/978-3-642-39498-0 Economics of Information Security and Privacy III Bruce Schneier (Editor) Springer, 2013, ISBN 978-1-4614-1981-5 http://dx.doi.org/10.1007/978-1-4614-1981-5 Back to the Table of Contents ======================================= Information Hiding and Steganography ===== ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Hide and Seek: An Introduction to Steganography Niels Provos and Peter Honeyman IEEE Security & Privacy, Volume 1, Number 3 (May-June 2003) http://niels.xtdnet.nl/papers/practical.pdf Chapter 2 – An Overview of Steganography
  • 30. Gary C. Kessler and Chet Hosmer Advances in Computers, Volume 83 Elsevier, 2011, ISBN 978-0-12-385510-7 http://dx.doi.org/10.1016/B978-0-12-385510-7.00002-3 Current status and key issues in image steganography: A survey Mansi S. Subhedar and Vijay H. Mankar Computer Science Review, Volumes 13-14 (November 2014) http://dx.doi.org/10.1016/j.cosrev.2014.09.001 Transactions on Data Hiding and Multimedia Security X Yun Q. Shi (Editor) Springer, 2015, ISBN 978-2-662-46739-8 http://dx.doi.org/10.1007/978-3-662-46739-8 Trends in Steganography Elzbieta Zielinska, Wojciech Mazurczyk, and Krzysztof Szczypiorski Communications of the ACM, Volume 57, Number 3 (March 2014) http://dx.doi.org/10.1145/2566590.2566610 Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols Michael Raggo and Chet Hosmer
  • 31. Elsevier, 2013, ISBN 978-1-59749-743-5 http://www.sciencedirect.com/science/book/978159749 7435 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Cyber Warfare: Steganography vs. Steganalysis Huaiqing Wang and Shuozhong Wang Communications of the ACM, Volume 47, Number 10 (October 2004) http://dx.doi.org/10.1145/1022594.1022597 Digital image steganography: Survey and analysis of current methods Abbas Cheddad, Joan Condelll, Kevin Curran, and Paul Mc Kevitt Signal Processing, Volume 90, Number 3 (2010) http://dx.doi.org/10.1016/j.sigpro.2009.08.010 Disappearing Cryptography – Information Hiding: Steganography & Watermarking, Third Edition Peter Wayner Elsevier, 2009, ISBN 978-0-12-374479-1 http://www.sciencedirect.com/science/book/9780123744791 Information Hiding: First International Workshop Ross Anderson (Editor) Springer, 1996, ISBN 978-3-540-49589-5, LNCS 1174 http://dx.doi.org/10.1007/3-540-61996-8
  • 32. Information Hiding: 14th International Conference, IH 2012 Matthias Kirchner and Dipak Ghosal (Editor) Springer, 2013, ISBN 978-3-642-36373-3, LNCS 7692 http://dx.doi.org/10.1007/978-3-642-36373-3 Information Hiding in Speech Signals for Secure Communication Wu Zhijun Elsevier, 2015, ISBN 978-0-12-801328-1 http://www.sciencedirect.com/science/book/9780128013281 Information Hiding: Steganography and Watermarking – Attacks and Countermeasures Neil F. Johnson, Zoran Duric, and Sushil Jajodia Springer, 2001, ISBN 978-1-4615-4375-6 http://dx.doi.org/10.1007/978-1-4615-4375-6 Machine Learning in Image Steganalysis Hans Georg Schaathun Wiley, 2012, ISBN9781118437957 http://dx.doi.org/10.1002/9781118437957 The prisoner’s problem and the subliminal channel Gustavus J. Simmons http://dx.doi.org/10.1007/978-1-4684-4730-9_5 Advances in Cryptology: Proceedings of Crypto 83 David Chaum (Editor) Springer, 1984, ISBN 978-1-4684-4730-9
  • 33. http://dx.doi.org/10.1007/978-1-4684-4730-9 Back to the Table of Contents ======================================= Data Encryption ======================== Digital Signatures Jonathan Katz Springer, 2010, ISBN 978-0-387-27712-7 http://dx.doi.org/10.1007/978-0-387-27712-7 Electronic Postage Systems: Technology, Security Economics Gerrit Bleumer Springer, 2007, ISBN 978-0-387-44606-6 http://dx.doi.org/10.1007/978-0-387-44606-6 Functional Encryption: A New Vision for Public-Key Cryptography Dan Boneh, Amit Sahai, and Brent Waters Communications of the ACM, Volume 55, Number 11 (November 2012) http://dx.doi.org/10.1145/2366316.2366333 Identity-Based Encryption Sanjit Chatterjee and Palash Sarkar
  • 34. Springer, 2011, ISBN 978-1-4419-9383-0 http://dx.doi.org/10.1007/978-1-4419-9383-0 Practical Signcryption Alexander W. Dent and Yuliang Zheng (Editors) Springer, 2010, ISBN 978-3-540-89411-7 http://dx.doi.org/10.1007/978-3-540-89411-7 Simple Steps to Data Encryption: A Practical Guide to Secure Computing Peter Loshin Elsevier, 2013, ISBN 978-0-12-411483-8 http://www.sciencedirect.com/science/book/9780124114838 Back to the Table of Contents ======================================= Hardening Software ===================== Aspect-Oriented Security Hardening of UML Design Methods Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouth, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, and Vitor Lima Springer, 2015, ISBN 978-3-319-16106-8 http://dx.doi.org/10.1007/978-3-319-16106-8
  • 35. Hardening Azure Applications Suren Machiraju and Suraj Gaurav Springer, 2015, ISBN 978-1-4842-0920-2 http://dx.doi.org/10.1007/978-1-4842-0920-2 Hardening Linux James Turnbull Springer, 2005, ISBN 978-1-4302-0005-5 http://dx.doi.org/10.1007/978-1-4302-0005-5 Hardening Windows, Second Edition Jonathan Hassell Springer, 2006, ISBN 978-1-4302-0083-3 http://dx.doi.org/10.1007/978-1-4302-0083-3 Network Hardening Lingyu Wang, Massimiliano Albanese, and Sushil Jajodia Springer, 2014, ISBN 978-3-319-04612-9 http://dx.doi.org/10.1007/978-3-319-04612-9 Back to the Table of Contents ======================================= Network Security ======================= Also see: Telecommunications and Networking shelf in the
  • 36. Information Technology … section; Sensor Networks shelf in the Information Technology … section. Guide to Computer Network Security, Third Edition Joseph Migga Kizza Springer, 2015, ISBN 978-1-4471-6654-2 http://dx.doi.org/10.1007/978-1-4471-6654-2 Network and System Security, Second Edition John R. Vacca (Editor) Elsevier, 2014, ISBN 089-0-12-416689-9 http://www.sciencedirect.com/science/book/9780124166899 Network Attacks & Exploitation: A Framework Matthew Monte Wiley, 2015, ISBN 9781119183440 http://dx.doi.org/10.1002/9781119183440 The Network Security Test Lab: A Step-by-Step Guide Michael Gregg Wiley, 2015, ISBN 9781119183433 http://dx.doi.org/10.1002/9781119183433 PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance; Fourth Edition Branden R. Williams and Anton A. Chuvakin Elsevier, 2015, ISBN 978-0-12-801579-7
  • 37. http://www.sciencedirect.com/science/book/9780128015797 PCI DSS 3.1: The Standard That Killed SSL Branden R. Williams Elsevier, 2016, ISBN 978-0-12-804627-2 http://www.sciencedirect.com/science/book/9780128046272 Emerging Trends in ICT Security Babak Akhgar and Hamid R. Arabnia (Editors) Elsevier, 2014, ISBN 978-0-12-411474-6 http://www.sciencedirect.com/science/book/9780124114746 Python Passive Network Mapping: P2NMAP Chet Hosmer Elsevier, 2015, ISBN 978-0-12-802721-9 http://www.sciencedirect.com/science/book/9780128027219 Dynamic Secrets in Communication Security Sheng Xiao, Weibo Gong, and Don Towsley Springer, 2014, ISBN 978-1-4614-7831-7 http://dx.doi.org/10.1007/978-1-4614-7831-7 Securing VoIP: Keeping Your VoIP Network Safe Regis J. (Bud) Bates Elsevier, 2015, ISBN 978-0-12-417039-1 http://www.sciencedirect.com/science/book/9780124170391 A study of Black Hole Attack Solutions: On AODV Routing Protocol in MANET
  • 38. Elahe Fazeldehkordi, Iraj Sadegh Amiri, and Oluwatobi Ayodeji Akanbi Elsevier, 2016, ISBN 978-0-12-805367-6 http://www.sciencedirect.com/science/book/9780128053676 Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems Y.-W. Peter Hong, Pang-Chang Lan, and C.-C. Jay Kuo Springer, 2014, ISBN 978-981-4560-14-6 http://dx.doi.org/10.1007/978-981-4560-14-6 Introduction to UTM (Unified Threat Management) (Ch 1) http://dx.doi.org/10.1016/B978-1-59-749747-3.00001-6 UTM Security with Fortinet: Mastering FortiOS Kenneth Tam, Martin H. Hoz Salvador, Ken McAlpine, Rick Basile, Bruce Matsugu, and Josh More Elsevier, 2013, ISBN 978-1-59749-747-3 http://www.sciencedirect.com/science/book/9781597497473 The Death of the Internet Markus Jacobsson (Editor) Wiley, 2012, ISBN 9781118312551 http://dx.doi.org/10.1002/9781118312551 Applied Network Security Monitoring: Collection, Detection, and Analysis Chris sanders and Jason Smith Elsevier, 2014, ISBN 978-0-12-417208-1 http://www.sciencedirect.com/science/book/9780124172081
  • 39. Network Intrusion Detection and Prevention: Concepts and Techniques Ali A. Ghorbani, Wei Lu, and Mahbod Tavallaee Springer, 2010, ISBN 978-0-387-88771-5 http://dx.doi.org/10.1007/978-0-387-88771-5 Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response Joe Fichera and Steven Bolt Elsevier, 2013, ISBN 978-1-59749-962-0 http://www.sciencedirect.com/science/book/9781597499620 Network Hardening: An Automated Approach to Improving Network Security Lingyu Wang, Massimiliano Albanese, and Sushil Jajodia Springer, 2014, ISBN 978-3-319-04612-9 http://dx.doi.org/10.1007/978-3-319-04612-9 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Security and Privacy Protection in Visual Sensor Networks: A Survey Thomas Winkler and Bernhard Rinner ACM Computing Surveys, Volume 47, Number 1 (July 2014) http://dx.doi.org/10.1145/2545883 Back to the Table of Contents =======================================
  • 40. Sensor Network Security ================= Secure Wireless Sensor Networks: Threats and Solutions Mauro Conti Springer, 2016, ISBN 978-1-4939-3460-7 http://dx.doi.org/10.1007/978-1-4939-3460-7 Security in Wireless Sensor Networks George S. Oreku and Tamara Pazynyuk Springer, 2016, ISBN 978-3-319-21269-2 http://dx.doi.org/10.1007/978-3-319-21269-2 Security for Wireless Sensor Networks using Identity-Based Cryptography Harsh Kupwade Patil and Stephen A. Szygenda CRC Press, 2013, ISBN 978-1-4398-6902-4 http://dx.doi.org/10.1201/b13080 Back to the Table of Contents ======================================= Mobile Network Security ================
  • 41. Identifying back doors, attack points, and surveillance mechanisms in iOS devices Jonathan Zdziarski Digital Investigation, Volume 11, Number 1 (March 2014) http://dx.doi.org/10.1016/j.diin.2014.01.001 Mobile Authentication: Problems and Solutions Markus Jacobson Springer, 2013, ISBN 978-1-4614-4878-5 http://dx.doi.org/10.1007/978-1-4614-4878-5 Securing Android: A Survey, Taxonomy, and Challenges Sufatrio , Darell J. J. Tan, Tong-Wei Chua, and Vrizlynn L. L. Thing ACM Computing Surveys, Volume 47, Number 4 (July 2015) http://dx.doi.org/10.1145/2733306 Security in Mobile Wireless Networks (special issue) Abderrahim Benslimane, Chadi Assi, Fred Nen-Fu Huang, and Stamatios V. Kartapoulos (Editors) Security and Telecommunications Networks, Volume 3, Numbers 2-3 (March-June 2010) http://dx.doi.org/10.1002/sec.142 Security Issues in Mobile NFC Devices Michael Roland Springer, 2015, ISBN 978-3-319-15488-6 http://dx.doi.org/10.1007/978-3-319-15488-6
  • 42. Software Test Attacks to Break Mobile and Embedded Devices Jon Duncan Hagar CRC Press, 2014, ISBN 978-1-4665-7531-8 http://www.crcnetbase.com/doi/book/10.1201/b15526 Trustworthy Execution on Mobile Devices Amit Vasudevan, Jonathan M. McCune, and James Newsome Springer, 2014, ISBN 978-1-4614-8190-4 http://dx.doi.org/10.1007/978-1-4614-8190-4 Wireless Mobile Internet Security, Second Edition Man Young Rhee Wiley, 2013, ISBN 9781118512920 http://dx.doi.org/10.1002/9781118512920 Back to the Table of Contents ======================================= Hardware Security ====================== Rethinking Computers for Cybersecurity Ruby B. Lee IEEE Computer, Volume 48, Number 4 (April 2015) http://dx.doi.org/10.1109/MC.2015.118
  • 43. Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits Eric Peeters Springer, 2013, ISBN 978-1-4614-6783-0 http://dx.doi.org/10.1007/978-1-4614-6783-0 Hardware Security: Design, Threats, and Safeguards Debdeep Mukhapadhyay and Rajat Subhra Chakraborty CRC Press, 2015, ISBN 978-1-4398-9584-9 http://dx.doi.org/10.1201/b17555 Integrated Circuit Authentication: Hardware Trojans and Counterfeit Detection Mohammad Tehranipoor, Hassan Salmani, and Xuehui Zhang Springer, 2014, ISBN 978-3-319-00816-5 http://dx.doi.org/10.1007/978-3-319-00816-5 Introduction to Hardware Security and Trust Mohammad Tehranipoor and Cliff Wang (Editors) Springer, 2012, ISBN 9781-4419-8080-9 http://dx.doi.org/10.1007/978-1-4419-8080-9 Physical Unclonable Functions in Theory and Practice Christoph Bohm and Maximilian Hofer Springer, 2013, ISBN 978-1-4614-5040-5 http://dx.doi.org/10.1007/978-1-4614-5040-5 Secure Smart Embedded Devices, Platforms and Applications Konstantinos Markantonakis and Keith Mayes (Editors)
  • 44. Springer, 2014, ISBN 978-1-4614-7915-4 http://dx.doi.org/10.1007/978-1-4614-7915-4 Secure System Design and Trustable Computing Chip-Hong Chang and Miodrag Potkonjak (Editors) Springer, 2016, ISBN 978-3-319-14971-4 http://dx.doi.org/10.1007/978-3-319-14971-4 A Survey of Security Issues in Hardware Virtualization Gabor Pek, Levente Buttyan, and Boldizsar Bencsath ACM Computing Surveys, Volume 45, Number 3 (June 2013) http://dx.doi.org/10.1145/2480741.2480757 Trustworthy Reconfigurable Systems: Enhancing the Security Capabilities of Reconfigurable Hardware Architectures Thomas Feller Springer, 2014, ISBN 978-3-658-07005-2 http://dx.doi.org/10.1007/978-3-658-07005-2 Back to the Table of Contents ======================================= RFID Security ========================== Also see: RFID shelf in the Information Technology, … section.
  • 45. Classifying RFID attacks and defenses Aikaterini Mitrokotsa, Melanie R. Rieback, and Andrew S. Tanenbaum Information Systems Frontiers, Volume 12, Number 5 (November 2010) http://dx.doi.org/10.1007/s10796-009-9210-z The Evolution of RFID Security Melanie R. Rieback, Bruno Crispo, and Andrew S. Tanenbaum http://dx.doi.org/10.1109/MPRV.2006.17 IEEE Pervasive Computing, Volume 5, Number 1 (January-March 2006) Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting Peter H. Cole and Damith C. Ranasinghe Springer, 2008, ISBN 978-3-540-71641-9 http://dx.doi.org/10.1007/978-3-540-71641-9 RFID Security: Techniques, Protocols and System-on-Chip Design Paris Kitsos and Yan Zhang (Editors) Springer, 2008, ISBN 978-0-387-76481-8 http://dx.doi.org/10.1007/978-0-387-76481-8 RFID Security and Privacy Yingjiu Li, Robert H. Deng, and Elisa Bertino Morgan & Claypool, 2014, ISBN 9781627053266
  • 46. http://dx.doi.org/10.2200/S00550ED1V01Y201311SPT007 RFID Security & Privacy Lounge Information Security Group, Universite catholique de Louvain http://www.avoine.net/rfid/ Back to the Table of Contents ======================================= Internet of Things (IoT) Security =========== Also see: Internet of Things (IoT) shelf in the Information Technology, … section. The Internet of Things Has Arrived – And So Have Massive Security Issues Andrew Rose (January 11, 2013) http://www.wired.com/opinion/2013/01/securing-the- internet-of-things/ Can You Trust Your Fridge? Alan Grau IEEE Spectrum, Volume 52, Number 3 (March 2015) http://dx.doi.org/10.1109/MSPEC.2015.7049440
  • 47. Smart Human Security Framework Using Internet of Things, Cloud and Fog Computing Vivek Kumar Sehgal, Anubhav Patrick, Ashutosh Soni, and Lucky Rajput http://dx.doi.org/10.1007/978-3-319-11227-5_22 Classification Mechanism for IoT Devices towards Creating a Security Framework V.J. Jincy and Sudharsan Sundararajan http://dx.doi.org/10.1007/978-3-319-11227-5_23 Intelligent Distributed Systems Rajkumar Buyya and Sabu M. Thampi (Editors) Springer, 2015, ISBN 978-3-319-11227-5 http://dx.doi.org/10.1007/978-3-319-11227-5 On the features and challenges of security and privacy in distributed internet of things Rodrigo Roman, Jianying Zhou, and Javier Lopez Computer Networks, Volume 57, Number 10 (5 July 2013) http://dx.doi.org/10.1016/j.comnet.2012.12.018 Security, privacy and trust in Internet of Things: The road ahead S. Sicari, A. Rizzardi, L.A. Grieco, and A. Coen-Porisini Computer Networks, Volume 76, (15 January 2015) Pages 146-164 http://dx.doi.org/10.1016/j.comnet.2014.11.008
  • 48. A survey on trust management for Internet of Things Zheng Yan, Pen Zhang, and Athanasios V. Vasilakos Journal of Network and Computer Applications, Volume 42 (2014) http://dx.doi.org/10.1016/j.jnca.2014.01.014 Back to the Table of Contents ======================================= Cloud Security ========================= Also see: the Virtualization and Cloud Computing shelf in the Information Technology, … section. Cloud Computing Security: A Survey Issa M. Khalil, Abdallah Khreishah, and Muhammad Azeem Computers, Volume 3, Number 1 (February 2014) http://dx.doi.org/10.3390/computers3010001 Cloud identity management security issues & solutions: a taxonomy Umme Habiba, Rahat Masood, Muhammad Awais Shibli, and Muaz A Niazi Complex Adaptive Systems Modeling, Volume 2 (2014) http://www.casmodeling.com/content/2/1/5
  • 49. From Security to Assurance in the Cloud: A Survey Claudio A. Ardagna, Rasool Asal, Ernesto Damiani, and Quang Hieu Vu ACM Computing Surveys, Volume 48, Number 1 (August 2015) http://dx.doi.org/10.1145/2767005 Cloud Storage Security: A Practical Guide Aaron Wheeler and Michael Winbum Elsevier, 2015, ISBN 978-0-12-802930-5 http://www.sciencedirect.com/science/book/9780128029305 A survey on securing the virtual cloud Robert Denz and Stephen Taylor Journal of Cloud Computing, Volume 2 (December 2013) http://dx.doi.org/10.1186/2192-113X-2-17 Virtual machine introspection: towards bridging the semantic gap Asit More and Shashikala Tapaswi Journal of Cloud Computing, Volume 3 (December 2014) http://dx.doi.org/10.1186/s13677-014-0016-2 Cloud Management and Security Imad M. Abbadi Wiley, 2014, ISBN 9781118817087 http://dx.doi.org/10.1002/9781118817087 Cloud Security: A Gathering Storm
  • 50. Mihir Nanavati, Patrick Colp, Bill Aiello, and Andrew Warfield Communications of the ACM, Volume 57, Number 5 (May 2014) http://dx.doi.org/10.1145/2593686 The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues Ryan Ko and Kim-Kwang Raymond Choo (Editors) Elsevier, 2015, ISBN 978-0-12-801595-7 http://www.sciencedirect.com/science/book/9780128015957 Secure the Cloud: From the Perspective of a Service-Oriented Organization Arpan Roy, Santonu Sarkar, Rajeshwari Ganesan, and Geetika Goel ACM Computing Surveys, Volume 47, Number 3 (April 2015) http://dx.doi.org/10.1145/2693841 CSA Guide to Cloud Computing: Implementing Cloud Privacy and Security Raj Samani, Brian Honan, and Jim Reavis Elsevier, 2015, ISBN 978-0-12-420125-5 http://www.sciencedirect.com/science/book/9780124201255 Security and Privacy in Cloud Computing: A Survey Mahesh U. Shankarwar and Ambika V. Pawar http://dx.doi.org/10.1007/978-3-319-12012-6_1 Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing:
  • 51. Theory and Applications (FICTA) 2014, Volume 2 Suresh Chandra Satapathy, Bhabendra Narayan Biswal, Siba K. Ugata, and J.K. Mandal (Editors) Springer, 2015, ISBN 978-3-319-12012-6 http://dx.doi.org/10.1007/978-3-319-12012-6 Securing the Cloud: Cloud Computer Security Techniques and Tactics Vic (J.R.) Winkler Elsevier, 2011, ISBN 978-1-59749-592-9 http://www.sciencedirect.com/science/book/9781597495929 Privacy and Security for Cloud Computing Siani Pearson and George Yee (Editors) Springer, 2013, ISBN 978-1-4471-4189-1 http://dx.doi.org/10.1007/978-1-4471-4189-1 Building the Infrastructure for Cloud Security: A Solutions View Raghu Yeluri and Enrique Castro-Leon Springer, 2014, ISBN 978-1-4302-6146-9 http://dx.doi.org/10.1007/978-1-4302-6146-9 Collaboration with Cloud Computing: Security, Social Media, and Unified Communication Ric Messier Elsevier, 2014, ISBN 978-0-12-417040-7 http://www.sciencedirect.com/science/book/9780124170407
  • 52. Secure Cloud Computing Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, and Cliff Wang (Editors) Springer, 2014, ISBN 978-1-4614-9278-8 http://dx.doi.org/10.1007/978-1-4614-9278-8 High Performance Cloud Auditing and Applications Keesook J. Han, Baek-Young Choi, and Sejun Song (Editors) Springer, 2014, ISBN 978-1-4614-3296-8 http://dx.doi.org/10.1007/978-1-4614-3296-8 Security for Cloud Storage Systems Kan Yang and Xiaohua Jia Springer, 2014, ISBN 978-1-4614-7873-7 http://dx.doi.org/10.1007/978-1-4614-7873-7 Back to the Table of Contents ======================================= Smart Grid Security ===================== Smart Grid Security Sanjay Goel, Yuan Hong, Vagelis Papakonstantinou, and Dariusz Kloza Springer, 2015, ISBN 978-4471-6663-4 http://dx.doi.org/10.1007/978-1-4471-6663-4
  • 53. Smart Grid Security: Innovative Solutions for a Modernized Grid Florian Skopik and Paul Smith (Editors) Elsevier, 2015, ISBN 978-0-12-802122-4 http://www.sciencedirect.com/science/book/9780128021224 Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure Eric D. Knapp and Raj Samani Elsevier, 2013, ISBN 978-1-59749-998-9 http://www.sciencedirect.com/science/book/9781597499989 Cyber Security for Smart Grid Communications: Part I (special Issue) Rose Qingyang Hu, Yi Qian, Hsiao-Hwa Chen, and Hussein T. Mouftah (Editors) IEEE Communications Magazine, Volume 50, Number 8 (August 2012) http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=625751 4 Cyber Security for Smart Grid Communications: Part II (special Issue) Rose Qingyang Hu, Yi Qian, Hsiao-Hwa Chen, and Hussein T. Mouftah (Editors) IEEE Communications Magazine, Volume 51, Number 1 (August 2013)
  • 54. http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=640042 7 Back to the Table of Contents ======================================= Smart City Security ===================== Also see: Smart City shelf in the Information Technology … section. Architecture and Knowledge-Driven Self-Adaptive Security in Smart Space Antti Evesti, Jani Suomalainen, and Eila Ovaska Computers, Volume 2, Number 1 (March 2013) http://dx.doi.org/10.3390/computers2010034 Invited Paper: VANET Security: Going Beyond Cryptographic-Centric Solutions Dhavy Gantsou http://dx.doi.org/10.1007/978-981-287-158-9_4 Attack on Security Goals (Confidentiality, Integrity, Availability) in VANET: A Survey Irshad Ahmed Sumra, Halabi Bin Hasbullah, and Jamalul-lail Bin AbManan
  • 55. http://dx.doi.org/10.1007/978-981-287-158-9_5 Vehicular Ad-hoc Networks for Smart Cities: First International Workshop, 2014 Anis Laouiti, Amir Qayyum, and Mohamad Naufal Mohamad Saad (Editors) Springer, 2015, ISBN 978-981-287-158-9 http://dx.doi.org/10.1007/978-981-287-158-9 Back to the Table of Contents ======================================= Cyber-Physical Systems Security =========== Aligning Cyber-Physical System Safety and Security Giedre Sabaliauskaite and Aditya P. Mathur http://dx.doi.org/10.1007/978-3-319-12544-2_4 Complex Systems Design & Management Asia: CSD&M Asia 2014 Michel_Alexandre Cardin, Daniel Krob, Pao Chuen Lui, Yang How Tan, and Kristin Wood (Editors) Springer, 2015, ISBN 978-3-319-12544-2 http://dx.doi.org/10.1007/978-3-319-12544-2 Applied Cyber-Physical Systems Sang C. Suh, U. John Tanik, John N. Carbone, and Abdullah Eroglu (Editors)
  • 56. Springer, 2014, ISBN 978-1-4614-7336-7 http://dx.doi.org/10.1007/978-1-4614-7336-7 Cyber-Physical Attacks: A Growing Invisible Threat George Lukas Elsevier, 2015, ISBN 978-0-12-801290-1 http://www.sciencedirect.com/science/book/9780128012901 Engineering Safe and Secure Cyber-Physical Systems: The Specification PEARL Approach Roman Gumzej Springer, 2016, ISBN 978-3-319-28905-2 http://dx.doi.org/10.1007/978-3-319-28905-2 Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges Sajal K. das, Krishna Kant, and Nan Zhang Elsevier, 2012, ISBN 978-0-12-415815-3 http://www.sciencedirect.com/science/book/9780124158153 MAC Protocols for Cyber-Physical Systems Fen Xia and Azizur Rahim Springer, 2016, ISBN 978-3-662-46361-1 http://dx.doi.org/10.1007/978-3-662-46361-1 Security and Privacy for Implantable Medical Devices Wayne Burleson and Sandro Carrara (Editors) Springer, 2014, ISBN 978-1-4614-1674-6 http://dx.doi.org/10.1007/978-1-4614-1674-6
  • 57. Back to the Table of Contents ======================================= Biometrics ============================ Encyclopedia of Biometrics Stan Z. Li and Anil K. Jain (Editors) Springer, Live Reference – Constantly updated, ISBN 978-3-642-27733-7 http://dx.doi.org/10.1007/978-3-642-27733-7 Multispectral Biometrics: Systems and Applications David Zhang, Zhenhua Guo, and Yazhuo Gong Springer, 2016, ISBN 978-3-319-22485-5 http://dx.doi.org/10.1007/978-3-319-22485-5 Introduction to Biometrics Anil K. Jain, Arun A. Ross, and Karthik Nandakumar Springer, 2011, ISBN 978-0-387-77325-4 http://dx.doi.org/10.1007/978-0-387-77326-1 Practical Biometrics: From Aspiration to Implementation, Second Edition Julian Ashbourn
  • 58. Springer, 2015, ISBN 978-1-4471-6717-4 http://dx.doi.org/10.1007/978-1-4471-6717-4 Biometrics in the New World: The Cloud, Mobile Technology and Pervasive Identity Julian Ashbourn Springer, 2014, ISBN 978-3-319-04159-9 http://dx.doi.org/10.1007/978-3-319-04159-9 Guide to Biometrics for Large-Scale Systems: Technological, Operational, and User-Related Factors Julian Ashbourn Springer, 2011, ISBN 978-0-85729-467-8 http://dx.doi.org/10.1007/978-0-85729-467-8 Touchless Palmprint Recognition Systems Angelo Genovese, Vincenzo Piuri, and Fabio Scotti Springer, 2014, ISBN 978-3-319-10365-5 http://dx.doi.org/10.1007/978-3-319-10365-5 Security Impact of High Resolution Smartphone Cameras Tobias Fiebig, Jan Krissler, and Ronny Hansch 8th USENIX Workshop on Offensive Technologies, WOOT’14 https://www.usenix.org/conference/woot14/workshop- program/presentation/fiebig German minister photo fingerprint ‘theft’ seemed far too EASY, wail securobods: Security industry fear after apparent digit sig nickery
  • 59. John Leyden (30 December 2014) The Register http://www.theregister.co.uk/2014/12/30/hacking_fingerprint s_get_a_hires_pic_and_commercial_software/ Implementation and evaluation of a remote authentication system using touchless palmprint recognition Haruki Ota, Shoichiro Aoyama, Ryu Watanabe, Koichi Ito, Yutaka Miyake, and Takafumi Aoki Multimedia Systems, Volume 19, Number 2 (2013) http://dx.doi.org/10.1007/s00530-012-0283-z Iris Biometrics: From Segmentation to Template Security Christian Rathgeb, Andreas Uhl, and Peter Wild Springer, 2013, ISBN 978-1-4614-5571-4 http://dx.doi.org/10.1007/978-1-4614-5571-4 Iris Biometric Model for Network Access Franjieh El Khoury CRC Press, 2013, ISBN 978-1-4665-0214-7 http://dx.doi.org/10.1201/b14817 A Survey of Ear Biometrics Ayman Abaza, Arun Ross, Christina Hebert, Mary Ann F. Harrison, and Mark S. Nixon ACM Computing Surveys, Volume 45, Number 2 (February 2013) http://dx.doi.org/10.1145/2431211.2431221
  • 60. Ear Biometrics in 2D and 3D: Localization and Recognition Surya Prakash and Phalguni Gupta Springer, 2015, ISBN 978-981-287-375-0 http://dx.doi.org/10.1007/978-981-287-375-0 Transparent User Authentication: Biometrics, RFID and Behavioral Profiling Nathan Clarke Springer, 2011, ISBN 978-0-85729-805-8 http://dx.doi.org/10.1007/978-0-85729-805-8 Multibiometrics for Human Identification Bir Bhanu and Venu Govindraju (Editors) Cambridge University Press, 2011, ISBN 9780511921056 http://dx.doi.org/10.1017/CBO9780511921056 Behavioral, Cognitive and Virtual Biometrics (Chapter 13) Roman V. Yampolskiy http://dx.doi.org/10.1007/978-0-85729-994-9_13 Computer Analysis of Human Behavior Albert Ali Salah and Theo Gevers (Editors) Springer, 2011, ISBN 978-0-85729-994-9 http://dx.doi.org/10.1007/978-0-85729-994-9 Enhancing Information Security and Privacy by Combining Biometrics with Cryptography Sanjay G. Kanade, Dijana Petrovska-Delacretaz, and Bernadette Dorizzi Morgan & Claypool, 2012, ISBN 9781608458486
  • 61. http://dx.doi.org/10.2200/S00417ED1V01Y201205SPT003 Security and Privacy in Biometrics Patrizio Campisi (Editor) Springer, 2013, ISBN 978-1-4471-5230-9 http://dx.doi.org/10.1007/978-1-4471-5230-9 Biometrics: Algorithms and Applications (special issue) Proceedings of the IEEE, Volume 94, Number 11 (November 2006) http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=405246 3 Handbook of Fingerprint Recognition, Second Edition Davide Maltoni, Dario Maio, Anil K. Jain, and Salil Prabhakar Springer, 2009, ISBN 978-1-84882-254-2 http://dx.doi.org/10.1007/978-1-84882-254-2 Back to the Table of Contents ======================================= Security Engineering ==================== Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine
  • 62. Xiaoyu Ruan Springer, 2014, ISBN 978-1-4302-6572-6 http://dx.doi.org/10.1007/978-1-4302-6572-6 Pattern and Security Requirements: Engineering-Based Establishment of Security Standards Kristian Beckers Springer, 2015, ISBN 978-3-319-16664-3 http://dx.doi.org/10.1007/978-3-319-16664-3 Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance Stuart Jacobs Wiley, 2011, ISBN 978-0-470-94791-3 http://dx.doi.org/10.1002/9780470947913 System Security Engineering for Information Systems (Ch 1) Logan O. Mailloux, Michael R. Grimaila, John M. Colombi, Douglas D. Hodson, and Gearld Baumgartner http://dx.doi.org/10.1016/B978-0-12-411474-6.00001-3 Emerging Trends in ICT Security Babak Akhgar and Hamid R. Arabnia (Editors) Elsevier, 2014, ISBN 978-0-12-411474-6 http://www.sciencedirect.com/science/book/9780124114746 Advances in Model-Driven Security (Ch 3) Levi Lucio, Qin Zhang, Phu H. Nguyen, Moussa Amrani, Jacques Klein, Hans Vangheluwe, and Yves Le Traon http://dx.doi.org/10.1016/B978-0-12-800162-2.00003-8
  • 63. Advances in Computers, Volume Ninety Three Atif Memon (Editor) Elsevier, 2014, ISBN 978-0-12-800162-2 Virtualization: Issues, Security Threats, and Solutions Michael Pearce, Sherali Zeadally, and Ray Hunt ACM Computing Surveys, Volume 45, Number 2 (February 2013) http://dx.doi.org/10.1145/2431211.2431216 Security Engineering for Service-Oriented Architectures Michael Hafner and Ruth Breu Springer, 2009, ISBN 978-3-540-79539-1 http://dx.doi.org/10.1007/978-3-540-79539-1 Security Engineering with Patterns: Origins, Theoretical Model, and New Applications Markus Schumacher Springer, 2003, ISBN 978-3-540-45180-8 http://dx.doi.org/10.1007/b11930 Certificate Transparency Ben Laurie http://dx.doi.org/10.1145/2659897 Security Collapse in the HTTPS Market Axel Arnbak, Hadi Asghari, Michel Van Eeten, and Nico van Eijk http://dx.doi.org/10.1145/2660574 Why Is It Taking So Long to Secure Internet Routing?
  • 64. Sharon Goldberg http://dx.doi.org/10.1145/2659899 Communications of the ACM, Volume 57, Number 10 (October 2014) http://dl.acm.org/citation.cfm?id=2661061 Physical-Layer Security: From Information Theory to Security Engineering Matthieu Bloch and Joao Barros Cambridge University Press, 2011, ISBN 9780511977985 http://dx.doi.org/10.1017/CBO9780511977985 Back to the Table of Contents ======================================= Digital Forensics ======================== ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics, Second Edition John Sammons Elsevier, 2015, ISBN 978-0-12-801635-0 http://www.sciencedirect.com/science/book/9780128016350
  • 65. Digital Forensics: Threatscape and Best Practices John Sammons (Editor) Elsevier, 2016, ISBN 978-0-12-804526-8 http://www.sciencedirect.com/science/book/9780128045268 Official (ISC) 2 ® Guide to the CCFP SM CBK®: CCFP SM – Certified Cyber Forensics Professional Peter Stephenson (Editor) CRC Press, 2014, ISBN 978-1-4822-6248-3 http://dx.doi.org/10.1201/b17066 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Google Earth Forensics: Using Google Earth Geo-Location in Digital Forensic Investigations Michael Harrington and Michael Cross Elsevier, 2015, ISBN 976-0-12-800216-2 http://www.sciencedirect.com/science/book/9780128002162 Handbook of Digital Forensics of Multimedia Data and Devices Anthony T.S. Ho and Shujun Li (Editors) Wiley, 2015, ISBN 9781118705773 http://dx.doi.org/10.1002/9781118705773 How to Defeat Advanced Malware: New Tools for Protection and Forensics Henry Dalziel Elsevier, 2015, ISBN 978-0-12-802731-8 http://www.sciencedirect.com/science/book/9780128027318
  • 66. Implementing Digital Forensic Readiness: From Reactive to Proactive Process Jason Sachowski Elsevier, 2016, ISBN 978-0-12-804454-4 http://www.sciencedirect.com/science/book/9780128044544 Python Forensics: A Workbench for Inventing and Sharing Digital Forensic Technology Chet Hosmer Elsevier, 2014, ISBN 978-0-12-418676-7 http://www.sciencedirect.com/science/book/9780124186767 Unified Communications Forensics: Anatomy of Common UC Attacks Nicholas Grant & Joseph W Shaw II Elsevier, 2014, ISBN 978-1-59749-992-7 http://www.sciencedirect.com/science/book/9781597499927 Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace Todd G. Shipley and Art Bowker Elsevier, 2014, ISBN 978-0-12-407817-8 http://www.sciencedirect.com/science/book/9780124078178 Cloud Storage Forensics Darren Quick, Ben Martini, and Kim-Kwang Raymond Choo Elsevier, 2014, ISBN 978-0-12-419970-5
  • 67. http://www.sciencedirect.com/science/book/9780124199705 CyberForensics: Understanding Information Security Investigations Jennifer Bayuk (Editor) Springer, 2010, ISBN 978-1-60761-772-3 http://dx.doi.org/10.1007/978-1-60761-772-3 Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects Brett Shavers Elsevier, 2013, ISBN 978-1-59749-985-9 http://www.sciencedirect.com/science/book/9781597499859 Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response Leighton R. Johnson III Elsevier, 2014, ISBN 978-1-59749-996-5 http://www.sciencedirect.com/science/book/9781597499965 X-Ways Forensics Practitioner’s Guide Brett Shavers and Eric Zimmerman Elsevier, 2014, ISBN 978-0-12-411605-4 http://www.sciencedirect.com/science/book/9780124116054 Digital Image Forensics: There is More to a Picture than Meets the Eye Husrev Taha Sencar and Nasir Memon (Editors)
  • 68. Springer, 2013, ISBN 978-1-4614-0757-7 http://dx.doi.org/10.1007/978-1-4614-0757-7 Investigative Computer Forensics: The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives Erik Laykin Wiley, 2013, ISBN 9781118572115 http://dx.doi.org/10.1002/9781118572115 Digital Forensics for Legal Professionals: Understanding Digital Evidence – From the Warrant to the Courtroom Larry E. Daniel and Lars E. Daniel Elsevier, 2012, ISBN 978-1-59749-643-8 http://www.sciencedirect.com/science/book/9781597496438 Digital evolution: history, challenges and future directions for the digital and multimedia sciences section David W. Baker et al. http://dx.doi.org/10.1002/9781118373880.ch10 Forensic Science: Current Issues, Future Directions Douglas H. Ubelaker (Editor) Wiley, 2013, ISBN 9781118373880 http://dx.doi.org/10.1002/9781118373880 Digital forensic research: current state of the art Sriram Raghavan CSI Transactions on ICT, Volume 1, Number 1 (March 2013) http://dx.doi.org/10.1007/s40012-012-0008-7
  • 69. A framework for unified digital evidence management in security convergence Kyung-Soo Lim and Changhoon Lee Electronic Commerce Research (2013) http://dx.doi.org/10.1007/s10660-013-9119-y Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practices Requirements David Watson Elsevier, 2013, ISBN 978-1-59749-8 http://www.sciencedirect.com/science/book/9781597497428 Advances in Digital Forensics VIII: 8th IFIP WG 11.9 International Conference 2012 Gilbert Peterson and Sujeet Shenoi (Editors) Springer, 2012, ISBN 978-3-642-33962-2 http://dx.doi.org/10.1007/978-3-642-33962-2 Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference 2011 Gilbert Peterson and Sujeet Shenoi (Editors) Springer, 2011, ISBN 978-3-642-24212-0 http://dx.doi.org/10.1007/978-3-642-24212-0 Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference 2010 Kam-Pui Chow and Sujeet Shenoi (Editors)
  • 70. Springer, 2010, ISBN 978-3-642-15506-2 http://dx.doi.org/10.1007/978-3-642-15506-2 Advances in Digital Forensics V: Fifth IFIP WG 11.9 International Conference 2009 Gilbert Peterson and Sujeet Shenoi (Editors) Springer, 2009, ISBN 978-3-642-04155-6 http://dx.doi.org/10.1007/978-3-642-04155-6 Advances in Digital Forensics iV Indrajit Ray and Sujeet Shenoi (Editors) Springer, 2008, ISBN 978-0-387-84927-0 http://dx.doi.org/10.1007/978-0-387-84927-0 Digital Forensics and Cyber Crime: Third International ICST Conference, ICDF2C 2011 Pavel Gladyshev and Marcus K. Rogers (Editors) Springer, 2012, ISBN 978-3-642-35515-8 http://dx.doi.org/10.1007/978-3-642-35515-8 Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010 Ibrahim Baggili (Editor) Springer, 2011, ISBN 978-3-642-19513-6 http://dx.doi.org/10.1007/978-3-642-19513-6 Digital Forensics and Cyber Crime: First International ICST Conference, ICDF2C 2009 Sanjay Goel (Editor)
  • 71. Springer, 2010, ISBN 978-3-642-11534-9 http://dx.doi.org/10.1007/978-3-642-11534-9 Open Source Software for Digital Forensics Ewa Huebner and Stefano Zanero (Editors) Springer, 2010, ISBN 978-1-4419-5803-7 http://dx.doi.org/10.1007/978-1-4419-5803-7 Linux Malware Incident Response: A Practitioner’s Guide to Forensic Collection and Examination of Volatile Data Cameron H. Malin, Foghan Casey, and James A. Aquilina Elsevier, 2013, ISBN 978-0-12-409507-6 http://www.sciencedirect.com/science/book/9780124095076 Malware Forensic Field Guide for Windows Systems Cameron Malin, Eoghan Casey, and James Aquilina Elsevier, 2012, ISBN 978-1-59749-472-4 http://www.sciencedirect.com/science/book/9781597494724 Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry; Second Edition Harlan Carvey Elsevier, 2016, ISBN 978-0-12-803291-6 http://www.sciencedirect.com/science/book/9780128032916 Android Malware Xuxian Jiang and Yajin Zhou Springer, 2013, ISBN 978-1-4614-7394-7 http://dx.doi.org/10.1007/978-1-4614-7394-7
  • 72. Android Malware and Analysis Ken Dunham, Shane Hartman, Jose Andre Morales, Manu Quintans, and Tim Strazzere CRC Press, 2015, ISBN 978-1-4822-5220-0 http://dx.doi.org/10.1201/b17598 Automatic Malware Analysis: An Emulator Based Approach Heng Yin and Dawn Song Springer, 2013, ISBN 978-1-4614-5523-3 http://dx.doi.org/10.1007/978-1-4614-5523-3 PBX Security and Forensics: A Practical Approach Iosif I. Androulidakis Springer, 2013, ISBN 978-1-4614-1656-2 http://dx.doi.org/10.1007/978-1-4614-1656-2 A critical review of 7 years of Mobile Device Forensics Konstantia Barmpatsalou, Dimitrios Damopoulas, Georgios Kambourakis, and Vasilios Katos Digital Investigation, Volume 10, Number 4 (December 2013) http://dx.doi.org/10.1016/j.diin.2013.10.003 Identifying back doors, attack points, and surveillance mechanisms in iOS devices Jonathan Zdziarski Digital Investigation, Volume 11, Number 1 (March 2014) http://dx.doi.org/10.1016/j.diin.2014.01.001
  • 73. iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad, and iOS Devices Andrew Hoog and Katie Strzempka Elsevier, 2011, ISBN 978-1-59749-659-9 http://www.sciencedirect.com/science/book/9781597496599 Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management Anton A. Chuvakin, Kevin J. Schmidt, and Christopher Phillips Elsevier, 2013, ISBN 978-1-59749-635-3 http://www.sciencedirect.com/science/book/9781597496353 Virtualization and Forensics: A Digital Forensic Investigator’s Guide to Virtual Environments Diane Barrett and Gregory Kipper Elsevier, 2010, ISBN 978-1-59749-557-8 http://www.sciencedirect.com/science/book/9781597495578 Secrets Stolen, Fortunes Lost Christopher Burgess and Richard Power Elsevier, 2008, ISBN 978-1-59749-255-3 http://www.sciencedirect.com/science/book/9781597492553 Inside the SPAM Cartel: Trade Secrets from the Dark Side Stu Sjouwerman and Jeffrey Posluns Elsevier, 2004, ISBN 978-1-932266-86-3 http://www.sciencedirect.com/science/book/9781932266863
  • 74. Back to the Table of Contents ======================================= Risk ================================= Managing Risk and Information Security: Protect to Enable Malcolm Harkins Springer, 2013, ISBN 978-1-4302-5114-9 http://dx.doi.org/10.1007/978-1-4302-5114-9 Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis Mark Ryan M. Talabis and Jason L. Martin Elsevier, 2013, ISBN 978-1-59749-735-0 http://www.sciencedirect.com/science/book/9781597497350 IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing Tobias Ackermann Springer, 2013, ISBN 978-3-658-01115-4 http://dx.doi.org/10.1007/978-3-658-01115-4 Measuring and Managing Information Risk: A FAIR Approach Jack Freund and Jack Jones
  • 75. Elsevier, 2015, ISBN 978-0-12-420231-3 http://www.sciencedirect.com/science/book/9780124202313 Risk Management Framework: A Lab-Based Approach to Securing Information Systems James Broad Elsevier, 2013, ISBN 978-1-59749-995-8 http://www.sciencedirect.com/science/book/9781597499958 FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security Stephen D. Gantz and Daniel R. Philpott Elsevier, 2013, ISBN 978-1-59749-641-4 http://www.sciencedirect.com/science/book/9781597496414 FISMA Compliance Handbook Laura P. Taylor Elsevier, 2013, ISBN 978-0-12-405871-2 http://www.sciencedirect.com/science/book/9780124058712 Social Media Security: Leveraging Social Networking While Mitigating Risk Michael Cross Elsevier, 2014, ISBN 978-1-59749-986-6 http://www.sciencedirect.com/science/book/9781597499866 Managing Online Risk: Apps, Mobile, and Social Media Security Deborah Gonzalez
  • 76. Elsevier, 2015, ISBN 978-0-12-20055-5 http://www.sciencedirect.com/science/book/9780124200555 The Science and Technology of Counterterrorism: Measuring Physical and Electronic Security Risk Carl S. Young Elsevier, 2015, ISBN 978-0-12-420056-2 http://www.sciencedirect.com/science/book/9780124200562 Back to the Table of Contents ======================================= Trust ================================= A Comparison of Trust Models Marc Sel http://dx.doi.org/10.1007/978-3-658-10934-9_17 ISSE 2015: Highlights of the Information Security Solutions Europe 2015 Conference Helmut Reimer, Norbert Pohlmann, and Wolfgang Schneider (Editors) Springer, 2015, ISBN 978-3-658-10934-9 http://dx.doi.org/10.1007/978-3-658-10934-9 Trust as a facilitator in cloud computing: a survey Sheikh Mahbub Habib, Sascha Hauke, Sebastian Ries,
  • 77. and Max Muhlhauser Journal of Cloud Computing, Volume 1 (December 2012) http://www.journalofcloudcomputing.com/content/1/1/19 Trust mechanisms for cloud computing Jingwei Huang and David M. Nicol Journal of Cloud Computing, Volume 2 (December 2013) http://dx.doi.org/10.1186/2192-113X-2-9 Trust, Distrust and Commitment Katherine Hawley Noûs, Volume 48, Number 1 (March 2014) http://dx.doi.org/10.1111/nous.12000 Trust, Computing, and Society Richard H.R. Harper (Editor) Cambridge University Press, 2014, ISBN 9781139828567 http://dx.doi.org/10.1017/CBO9781139828567 Trust: The Evolutionary Game of Mind and Society Toshio Yamagishi Springer, 2011, ISBN 978-1-431-53936-0 http://dx.doi.org/10.1007/978-4-431-53936-0 Towards a Theory of Trust in Networks of Humans and Computers Virgil Gligor and Jeannette M. Wing CMU-CyLab-110016 (September 8, 2011)
  • 78. CyLab, Carnegie Mellon University http://repository.cmu.edu/cylab/88/ A Survey of Trust in Social Networks Wanita Sherchan, Surya Nepal, and Cecile Paris ACM Computing Surveys, Volume 45, Number 4 (August 2013) http://dx.doi.org/10.1145/2501654.2501661 Introduction: Embedded Trust (Chapter 1) http://dx.doi.org/10.1007/0-306-47645-2_1 Social Networks and Trust Vincent Buskens Springer, 2002, ISBN 978-0-306-47645-7 http://dx.doi.org/10.1007/b109038 Trust in Social Media Jiliang Tang and Huan Liu Morgan & Claypool, 2015, ISBN 9781627054058 http://dx.doi.org/10.2200/S00657ED1V01Y201507SPT013 Trust, Privacy and Security in Digital Business: 12th International Conference, TrustBus2015, Proceedings Simone Fischer-Hubner, Costas Lambrinoudakis, and Javier Lopez (Editors) Springer, 2015, ISBN 978-3-319-22906-5, LNCS 9264 http://dx.doi.org/10.1007/978-3-319-22906-5 Trust Management in Cloud Services Tala H. Noor, Quan Z. Sheng, and Athman Bouguettaya
  • 79. Springer, 2014, ISBN 978-3-319-12250-2 http://dx.doi.org/10.1007/978-3-319-12250-2 Back to the Table of Contents ======================================= Professional Certifications ================ CISSP (Certified Information Systems Security Professional) Certification https://www.isc2.org/cissp/default.aspx Wikipedia: http://en.wikipedia.org/wiki/Certified_Information_Systems_S ecurity_Professional CSSLP (Certified Secure Software Lifecycle Professional) Certification https://www.isc2.org/csslp/Default.aspx Certification Programs https://www.isc2.org/credentials/default.aspx International Information Systems Security Certification Consortium https://www.isc2.org/ Wikipedia: http://en.wikipedia.org/wiki/(ISC)%C2%B2
  • 80. Eleventh Hour CISSP® Study Guide, Second Edition Eric Conrad, Seth Misenar, and Joshua Feldman Elsevier, 2014, ISBN 978-0-12-417142-8 http://www.sciencedirect.com/science/book/9780124171428 CISSP® Practice Exams, Second Edition Shon Harris McGraw-Hill, 2013, ISBN 9780071792349 *** Search on the ISBN number above *** http://library.books24x7.com/ CISSP® All–in-One Exam Guide, Sixth Edition Shon Harris McGraw-Hill, 2013, ISBN 9780071781749 *** Search on the ISBN number above *** http://library.books24x7.com/ CSSLP® Certification All–in-One Exam Guide Wm. Arthur Conklin and Dan Shoemaker McGraw-Hill, 2013, ISBN 9780071760263 *** Search on the ISBN number above *** http://library.books24x7.com/ HCISPPSM – HealthCare Information Security and Privacy Professional https://www.isc2.org/hcispp/default.aspx https://www.isc2.org/innerpage.aspx?id=11284 HCISPP Study Guide
  • 81. Timothy Virtue and Justin Rainey Elsevier, 2015, ISBN 978-0-12-802043-2 http://www.sciencedirect.com/science/book/9780128020432 Back to the Table of Contents ======================================= Careers in Cybersecurity ================= Also see: Items on relevant shelves in the Skills for Success, English, Job Search, and Entrepreneurship section. Breaking into Information Security: Crafting a Custom Career Path to Get the job You Really Want Josh More, Anthony J. Stieber, and Chris Liu Elsevier, 2016, ISBN 978-0-12-800783-9 http://www.sciencedirect.com/science/book/978012800 7839 Introduction to US Cybersecurity Careers Henry Dalziel Elsevier, 2015, ISBN 978-0-12-802722-6 http://www.sciencedirect.com/science/book/978012802 7226
  • 82. Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game Josh More Elsevier, 2014, ISBN 978-0-12-416601-1 http://www.sciencedirect.com/science/book/978012416 6011 From One Winning Career to the Next: Transitioning Public Sector Leadership and Security Expertise to the Business Bottom Line J. David Quilter Elsevier, 2013, ISBN 978-0-12-411594-1 http://www.sciencedirect.com/science/book/9780124115941 Security Careers: Skills, Compensation, and Career Paths; Third Edition Stephen W. Walker and James E. Fushee Elsevier, 2014, ISBN 978-0-12-800104-2 http://www.sciencedirect.com/science/book/9780128001042 Back to the Table of Contents ======================================= Programming ==========================
  • 83. Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE Prabath Siriwardena Springer, 2014, ISBN 978-1-4302-6817-8 http://dx.doi.org/10.1007/978-1-4302-6817-8 Coding for Penetration Testers: Building Better Tools Jason Andress and Ryan Linn Elsevier, 2012, ISBN 978-1-59749-729-9 http://www.sciencedirect.com/science/book/9781597497299 Cryptography in C and C++ Michael Welschenbach Springer, 2005, ISBN 978-1-4302-0026-0 http://dx.doi.org/10.1007/978-1-4302-0026-0 Foundations of Security: What Every Programmer Needs to Know Neil Daswani, Christoph Kern, and Anita Kesavan Springer, 2007, ISBN 978-1-4302-0377-3 http://dx.doi.org/10.1007/978-1-4302-0377-3 Gray Hat Python: Python Programming for Hackers and Reverse Engineers Justin Seitz No Starch Press, 2009, ISBN 9781593271923 *** Search on the ISBN number above *** http://library.books24x7.com/
  • 84. Introduction to Reliable and Secure Distributed Programming, Second Edition Christian Cachin, Rachid Guerraoui, and Luis Rodrigues Springer, 2011, ISBN 978-3-642-15260-3 http://dx.doi.org/10.1007/978-3-642-15260-3 Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring Harlan Carvey Elsevier, 2007, ISBN 978-1-59749-173-0 http://www.sciencedirect.com/science/book/9781597491730 Practical Cryptography: Algorithms and Implementations Using C++ Saiful Azad and Al-Sakib Khan Pathan (Editors) CRC Press, 2015, ISBN 978-1-4822-2890-8 http://dx.doi.org/10.1201/b17707 Python Passive Network Mapping: P2NMAP Chet Hosmer Elsevier, 2015, ISBN 978-0-12-802721-9 http://www.sciencedirect.com/science/book/9780128027219 Secure Systems Development with UML Jan Jurjens Springer, 2005, ISBN 978-3-540-26494-1 http://dx.doi.org/10.1007/b137706
  • 85. Securing the Tangled Web: Preventing script injection vulnerabilities through software design Christopher Kern Communications of the ACM, Volume 57, Number 9 (September 2014) http://dx.doi.org/10.1145/2643134 Software Design for Resilient Computer Systems Igor Schagaev and Thomas Kaegi-Trachsel Springer, 2016, ISBN 978-3-319-29465-0 http://dx.doi.org/10.1007/978-3-319-29465-0 Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers TJ. O’Connor Elsevier, 2013, ISBN 978-1-59749-957-6 http://www.sciencedirect.com/science/book/9781597499576 Understanding Network Hacks: Attack and Defense with Python Bastian Ballmann Springer, 2015, ISBN 978-3-662-44437-5 http://dx.doi.org/10.1007/978-3-662-44437-5 Web Application Obfuscation Mario Heiderich, Eduardo Alberto Vela Nava, Gareth Heyes, and David Lindsay
  • 86. Elsevier, 2011, ISN 978-1-59749-604-9 http://www.sciencedirect.com/science/book/9781597496049 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them Michael Howard and David LeBlanc McGraw-Hill, 2010, ISBN 9780071626750 http://www.accessengineeringlibrary.com/browse/24-deadly- sins-of-software-security-programming-flaws-and-how-to-fix- them Back to the Table of Contents ======================================= Mathematics for Cryptography ============ Algebra for Applications: Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression Arkadii Slinko Springer, 2015, ISBN 978-3-319-21951-6 http://dx.doi.org/10.1007/978-3-319-21951-6 Applied Number Theory Harald Niederreiter and Arne Winterhof Springer, 2015, ISBN 978-3-319-22321-6 http://dx.doi.org/10.1007/978-3-319-22321-6
  • 87. Yet Another Introductory Number Theory Textbook (Cryptology Emphasis Version) Jonathan A. Poritz (2014) http://www.poritz.net/jonathan/share/yaintt/ Introduction to Public Key Cryptography and Modular Arithmetic Robert Milson (February 2008) http://arxiv.org/abs/cs/9903001 Mathematical Foundations of Public Key Cryptography Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, and Xianmeng Meng CRC Press, 2016, ISBN 978-1-4987-0224-9 http://dx.doi.org/10.1201/b19324 Mathematics of Public Key Cryptography Steven D. Galbraith Cambridge University Press, 2012, ISBN 9781139013926 http://dx.doi.org/10.1017/CBO9781139012843 Concepts and Calculation in Cryptography Dan Grundy PhD Thesis, University of Kent (March 2008) http://www.cs.kent.ac.uk/people/staff/eab2/crypto/thesis.we b.pdf Cryptography and Formal Methods Website (Publications) University of Kent
  • 88. http://www.cs.kent.ac.uk/people/staff/eab2/crypto/ Elementary Number Theory: Primes, Congruences, and Secrets William Stein (2011) http://wstein.org/ent/ Elementary Number Theory, Cryptography and Codes Maria Welleda Baldoni, Giro Giliberto, and Giulia Maria Piacentini Cattaneo Springer, 2009, ISBN 978-3-540-69200-3 http://dx.doi.org/10.1007/978-3-540-69200-3 Primality Testing and Integer Factorization in Public-Key Cryptography Song Y. Yan Springer, 2009, ISBN 978-0-387-77268-4 http://dx.doi.org/10.1007/978-0-387-77268-4 Bent Functions: Results and Applications to Cryptography Natalia Tokareva Elsevier, 2015, ISBN 978-0-12-802318-1 http://www.sciencedirect.com/science/book/9780128023181 Black-Box Models of Computation in Cryptology Tibor Jager Springer, 2012, ISBN 978-3-8348-1990-1 http://dx.doi.org/10.1007/978-3-8348-1990-1
  • 89. Codes: An Introduction to Information Communication and Cryptography N.L. Biggs Springer, 2008, ISBN 978-1-84800-273-9 http://dx.doi.org/10.1007/978-1-84800-273-9 Codes and Turbo Codes Claude Berrou Springer, 2010, ISBN 978-2-8178-0039-4 http://dx.doi.org/10.1007/978-2-8178-0039-4 A Student’s Guide to Coding and Information Theory Stefan M. Moser and Po-Ning Chen Cambridge University Press, 2012, ISBN 9781139059534 http://dx.doi.org/10.1017/CBO9781139059534 Rubik’s for Cryptographers Christophe Petit and Jean-Jacques Quisquater http://www.ams.org/notices/201306/rnoti-p733.pdf Notices of the AMS, Volume 60, Number 6 (June/July 2013) http://www.ams.org/notices/201306/ A Mathematical Theory of Communication C. E. Shannon The Bell System Technical Journal, Volume 27, Number 3 (July 1948) http://www.alcatel-lucent.com/bstj/vol27- 1948/articles/bstj27-3-379.pdf
  • 90. Communication Theory of Secrecy Systems C. E. Shannon The Bell System Technical Journal, Volume 28, Number 4 (October 1949) http://www.alcatel-lucent.com/bstj/vol28- 1949/articles/bstj28-4-656.pdf Cryptography in Constant Parallel Time Benny Applebaum Springer, 2014, ISBN 978-3-642-17367-7 http://dx.doi.org/10.1007/978-3-642-17367-7 Back to the Table of Contents ======================================= Cryptography ========================== Cryptography Made Simple Nigel P. Smart Springer, 2016, ISBN 978-3-319-21936-3 http://dx.doi.org/10.1007/978-3-319-21936-3 Cryptography, An Introduction: Third Edition Nigel P. Smart http://www.cs.bris.ac.uk/~nigel/Crypto_Book/ Home Page of Nigel P. Smart (Publications)
  • 91. http://www.cs.bris.ac.uk/~nigel/ Introduction to Cryptography: Principles and Applications, Third Edition Hans Delfs and Helmut Knebl Springer, 2015, ISBN 978-3-662-47974-2 http://dx.doi.org/10.1007/978-3-662-47974-2 CryptoSchool Joachim von zur Gathen Springer, 2015, ISBN 978-3-662-48425-8 *** Introduction to cryptology ************ http://dx.doi.org/10.1007/978-3-662-48425-8 A Cryptography Primer: Secrets and Promises Philip N. Klein Cambridge University Press, 2014, ISBN 9781139084772 http://dx.doi.org/10.1017/CBO9781139084772 Modern Cryptography Primer: Theoretical Foundations and Practical Applications Czeslaw Koscielny, Miroslaw Kurkowski, and Marian Srebrny Springer, 2013, ISBN 978-3-642-41386-5 http://dx.doi.org/10.1007/978-3-642-41386-5 A Brief History of Cryptology and Cryptographic Algorithms John F. Dooley Springer, 2013, ISBN 978-3-319-01628-3 http://dx.doi.org/10.1007/978-3-319-01628-3
  • 92. Quantum Cryptography: A Survey Dagmar Bruss, Gabor Erdelyi, Tim Meyer, Tobias Riege, and Jorg Rohe ACM Computing Surveys, Volume 39, Number 2 (July 2007) http://dx.doi.org/10.1145/1242471.1242474 Cryptography and Secure Communication Richard E. Blahut Cambridge University Press, 2014, ISBN 9781139013673 http://dx.doi.org/10.1017/CBO9781139013673 Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications; Second Edition Feng Liu and Wei Qi Yan Springer, 2015, ISBN 978-3-319-23473-1 http://dx.doi.org/10.1007/978-3-319-23473-1 A Course in Mathematical Cryptography Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, and Gerhard Rosenberger Walter de Gruyter, 2015, ISBN 978-3-11-037277-9 http://www.degruyter.com/viewbooktoc/product/431540 The Rabin cryptosystem revisited Michele Elia, Matteo Piva, and Davide Schipani Applicable Algebra in Engineering, Communication and Computing; Volume 26, Number 3 (June 2015) http://dx.doi.org/10.1007/s00200-014-0237-0
  • 93. Timing Channels in Cryptography: A Micro-Architectural Perspective Chester Rebeiro, Debdeep Mukhopadhyay, and Sarani Bhattacharya Springer, 2015, ISBN 978-3-319-12370-7 http://dx.doi.org/10.1007/978-3-319-12370-7 The Growth of Cryptography Ronald Rivest, Erna Viterbi Professor of Electrical Engineering and Computer Science, Massachusetts Institute of Technology http://www.youtube.com/watch?v=D4HcvehEU9c TURING CENTENNIAL CELEBRATION Princeton University (May 10-12, 2012) http://www.princeton.edu/turing/index.xml Keeping Secrets: Cryptography In A Connected World Panel Discussion, World Science Festival (2014) Panel: Josh Zepps, Simon Singh, Orr Dunkelman, Tal Rabin, and Brian Snow https://www.youtube.com/watch?v=nVVF8dgKC38 Public Key Cryptography: Applications and Attacks Lynn Margaret Batten Wiley, 2013, ISBN 9781118482261 http://dx.doi.org/10.1002/9781118482261 Long-Term Confidentiality of PKI
  • 94. Chi-Sung Laih, Shang-Ming Jen, and Chia-Yu Lu Communications of the ACM, Volume 55, Number 1 (January 2012) http://dx.doi.org/10.1145/2063176.2063199 Introduction to Cryptography with Maple Jose Luis Gomes Pardo Springer, 2013, ISBN 978-3-642-32166-5 http://dx.doi.org/10.1007/978-3-642-32166-5 Understanding Cryptography: A Textbook for Students and Practitioners Christof Paar and Jan Pelzl Springer, 2010, ISBN 978-3-642-04101-3 http://dx.doi.org/10.1007/978-3-642-04101-3 Protocols for Authentication and Key Establishment Colin Boyd and Anish Mathuria Springer, 2003, ISBN 978-3-662-09527-0 http://dx.doi.org/10.1007/978-3-662-09527-0 A Classical Introduction to Cryptography Serge Vaudeney Springer, 2006, ISBN 978-0-387-25880-5 http://dx.doi.org/10.1007/b136373 A Classical Introduction to Cryptography Exercise Book Thomas Baigneres, Pascal Junod, Yi Lu, Jean Monnerat, and Serge Vaudenay
  • 95. Springer, 2006, ISBN 978-0-387-28835-2 http://dx.doi.org/10.1007/0-387-28835-X Decrypted Secrets: Methods and Maxims of Cryptology Friedrich Bauer Springer, 2007, ISBN 978-3-540-48121-8 http://dx.doi.org/10.1007/978-3-540-48121-8 An Introduction to Mathematical Cryptography, Second Edition Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman Springer, 2014, ISBN 978-1-4939-1711-2 http://dx.doi.org/10.1007/978-1-4939-1711-2 Foundations of Cryptography: Basic Tools Oded Goldreich Cambridge University Press, 2001, ISBN 9780511546891 http://dx.doi.org/10.1017/CBO9780511546891 Foundations of Cryptography II: Basic Applications Oded Goldreich Cambridge University Press, 2004, ISBN 9780511721656 http://dx.doi.org/10.1017/CBO9780511721656 Algebraic Cryptanalysis Gregory V. Bard Springer, 2009, ISBN 978-0-387-88757-9 http://dx.doi.org/10.1007/978-0-387-88757-9
  • 96. Adaptive Cryptographic Access Control Anne V.D.M. Kayem, Selim G. Akl, and Patrick Martin Springer, 2010, ISBN 978-1-4419-6655-1 http://dx.doi.org/10.1007/978-1-4419-6655-1 Cryptography: all-out attacks or how to attack cryptography without intensive cryptanalysis Jean-Baptiste Bedrune, Eric Filiol, and Frederic Raynal Journal in Computer Virology, Volume 6, Number 3 (August 2010) http://dx.doi.org/10.1007/s11416-008-0117-x Brute Force: Cracking the Data Encryption Standard Matt Curtin Springer, 2005, ISBN 978-0-387-27160-6 http://dx.doi.org/10.1007/b138699 Cryptanalytic Attacks on RSA Song Y. Yan Springer, 2010, ISBN 978-0-387-48742-7 http://dx.doi.org/10.1007/978-0-387-48742-7 Quantum Attacks on Public-Key Cryptosystems Song Y. Yan Springer, 2013, ISBN 978-1-4419-7722-9 http://dx.doi.org/10.1007/978-1-4419-7722-9 Stream Ciphers Andreas Klein
  • 97. Springer, 2013, ISBN 978-1-4471-5079-4 http://dx.doi.org/10.1007/978-1-4471-5079-4 The Block Cipher Companion Lars R. Knudsen and Matthew J.B. Robshaw Springer, 2011, ISBN 978-3-642-17342-4 http://dx.doi.org/10.1007/978-3-642-17342-4 Security of Block Ciphers: From Algorithm Design to Hardware Implementation Kazuo Sakiyama, Yu Sasaki, and Yang Li Wiley, 2015, ISBN 9781118660027 http://dx.doi.org/10.1002/9781118660027 Cryptography for Network Security: Failures, Successes and Challenges Bart Preneel http://dx.doi.org/10.1007/978-3-642-14706-7_4 From NLP (Natural Language Processing) to MLP (Machine Language Processing) Peter Teufl, Udo Payer, and Guenter Lackner http://dx.doi.org/10.1007/978-3-642-14706-7_20 Computer Network Security: MMM-ACNS 2010 Igor Kotenko and Victor Skormin (Editors) Springer, 2010, ISBN 98703-642-14706-7, LNCS 6258 http://dx.doi.org/10.1007/978-3-642-14706-7 Fault Analysis in Cryptography
  • 98. Marc Joye and Michael Tunstall (Editors) Springer, 2012, ISBN 978-3-642-29656-7 http://dx.doi.org/10.1007/978-3-642-29656-7 Handbook of Applied Cryptography Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone CRC Press, 1996 (Fifth Printing, August 2001, ISBN 0-8493-8523-7 http://cacr.uwaterloo.ca/hac/ Website of Alfred Menezes http://www.math.uwaterloo.ca/~ajmeneze/ Analysis and Design of Cryptographic Hash Functions PhD Thesis (1993, book in progress) Bart Preneel *** Find link under Who am I – second paragraph *** http://homes.esat.kuleuven.be/~preneel/ Merkle-Damgard Revisited: How to Construct a Hash Function Jean-Sebastien Coron, Yevgeniy Dodis, Cecile Malinaud, and Prashant Puniya Advancess in Cryptology – Crypto 2005 Springer, 2005, ISBN 978-3-540-31870-5, LNCS 3621 http://dx.doi.org/10.1007/11535218_26 The Hash Function BLAKE Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan, and Luca Henzen
  • 99. Springer, 2014, ISBN 978-3-662-44757-4 http://dx.doi.org/10.1007/978-3-662-44757-4 Symmetric Cryptographic Protocols Mahalingam Ramkumar Springer, 2015, ISBN 978-3-319-07584-6 http://dx.doi.org/10.1007/978-3-319-07584-6 Symmetric Key Encryption Through Data Structure and Binary-Gray Conversion Smita Paira, Sourabh Chandra, Sk. Safikul Alam, and Siddharatha Bhattacharyya http://dx.doi.org/10.1007/978-81-322-2550-8 A Rotation Based Encryption Technique USING Symmetric Key Method Sourabh Chandra, Smita Paira, Sk. Safikul Alam, and Siddharatha Bhattacharyya http://dx.doi.org/10.1007/978-81-322-2550-8_3 Emerging Research in Computing, Information, Communication and Application: ERCICA 2015, Volume 1 N. R. Shetty, N.H. Prasad, and N. Nalini (Editors) Springer, 2015, ISBN 978-81-322-2550-8 http://dx.doi.org/10.1007/978-81-322-2550-8 The Computational Lens – Pauli Lectures, ETH Zurich The “P vs. NP” Problem: Efficient Computation, Internet Security, and the Limits to Human Knowledge (May 7, 2012) http://www.youtube.com/watch?v=pTeZP-XfuKI
  • 100. Cryptography: Secrets and Lies, Knowledge and Trust (May 8, 2012) http://www.youtube.com/watch?v=Eu_j5_tains Randomness – the Utility of Unpredictability (May 10, 2012) http://www.youtube.com/watch?v=ZzsFb-6wvoE Professor Avi Wigderson, Institute for Advanced Study Website: http://www.math.ias.edu/avi/ DBLP: http://www.informatik.uni- trier.de/~ley/pers/hd/w/Wigderson:Avi.html Back to the Table of Contents ======================================= Homomorphic Encryption ================ Alice and Bob in Cypherspace Brian Hayes American Scientist, Volume 100, Number 5 (September-October 2012) http://www.americanscientist.org/issues/pub/2012/5/alice- and-bob-in-cipherspace A Fully Homomorphic Scheme Ph.D. Dissertation, Department of Computer Science, Stanford University (September 2009)
  • 101. Craig Gentry http://crypto.stanford.edu/craig/ Fully Homomorphic Encryption Using Ideal Lattices Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC 2009) Craig Gentry http://dx.doi.org/10.1145/1536414.1536440 Homomorphic Encryption and Applications Xun Yi, Russell Paulet, and Elisa Bertino Springer, 2014, ISBN 978-3-319-12229-8 http://dx.doi.org/10.1007/978-3-319-12229-8 Evaluating 2-DNF Formulas on Ciphertexts Dan Boneh, Eu-Jin Coh, and Kobbi Nissim http://dx.doi.org/10.1007/978-3-540-30576-7_18 Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 Joe Kilian (Editor) Springer, 2005, ISBN 978-3-540-30576-7, LNCS 3378 http://dx.doi.org/10.1007/b106171 Fully Homomorphic Encryption without Bootstrapping: ITCS 2012 Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan http://eprint.iacr.org/2011/277.pdf Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages: Crypto 2011
  • 102. Zvika Brakerski and Vinod Vaikuntanathan Home Page of Zvika Brakerski (Publications) http://www.wisdom.weizmann.ac.il/~zvikab/ Computing Blindfolded: New Developments in Fully Homomorphic Encryption Vinod Vaikuntanathan http://www.cs.toronto.edu/~vinodv/FHE-focs-survey.pdf Home Page of Vinod Vaikuntanathan (Publications) http://www.cs.toronto.edu/~vinodv/ http://people.csail.mit.edu/vinodv/ Fully Homomorphic Encryption over the Integers Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan http://dx.doi.org/10.1007/978-3-642-13190-5_2 Advances in Cryptology – EUROCRYPT 2010 Henri Gilbert (Editor) Springer, 2010, ISBN 978-3-642-13190-5, LNCS 6110 http://dx.doi.org/10.1007/978-3-642-13190-5 Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers Jean-Sebastien Coron, David Naccache, and Mehdi Tibouchi http://dx.doi.org/10.1007/978-3-642-29011-4_27 Fully Homomorphic Encryption with Polylog Overhead Craig Gentry, Shai Halevi, and Nigel P. Smart http://dx.doi.org/10.1007/978-3-642-29011-4_28 Advances in Cryptology – EUROCRYPT 2012 David Pointcheval and Thomas Johansson (Editors)
  • 103. Springer, 2012, ISBN 978-3-642-29011-4, LNCS 7237 http://dx.doi.org/10.1007/978-3-642-29011-4 Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers – Talk at EUROCRYPT 2012 Jean-Sebastien Coron http://www.youtube.com/watch?v=SDIXprI3D7k Fully Homomorphic Encryption with Polylog Overhead – Talk at EUROCRYPT 2012 http://www.youtube.com/watch?v=dIUU24jBFok Talks at EUROCRYPT 2012 http://www.youtube.com/watch?v=X2W8YEppLbI&feature=list _other&playnext=1&list=SPC73BF951C580030A Implementing Gentry’s Fully-Homomorphic Encryption Scheme Craig Gentry and Shai Halevi http://dx.doi.org/10.1007/978-3-642-20465-4_9 Advances in Cryptology – EUROCRYPT 2011 Kenneth G. Paterson (Editor) Springer, 2011, ISBN 978-3-642-20464-7, LNCS 6632 http://dx.doi.org/10.1007/978-3-642-20465-4 Encrypted Messages from the Heights of Cryptomania Craig Gentry http://dx.doi.org/10.1007/978-3-642-36594-2_7 Theory of Cryptography, 10th Theory of Cryptography Conference, TCC2013
  • 104. Amit Sahai (Editor) Springer, 2013, ISBN 978-3-642-36594-2, LNCS 7785 http://dx.doi.org/10.1007/978-3-642-36594-2 Probabilistic Encryption & How To Play Mental Poker Keeping Secret All Partial Information Proceedings of the 14th Annual ACM Symposium on Theory of Computing (STOC 1982) Shafi Goldwasser and Silvio Micali http://dx.doi.org/10.1145/800070.802212 Can Homomorphic Encryption be Practical? Proceedings of the 3rd ACM Workshop on Cloud Computing Security (CCSW 2011) Kristin Lauter, Michael Naehrig, and Vinod Vaikuntanathan http://dx.doi.org/10.1145/2046660.2046682 On Data Banks and Privacy Homomorphisms Ronald L. Rivest, Len Adleman, and Michael L. Detouzos http://people.csail.mit.edu/rivest/RivestAdlemanDertouzos- OnDataBanksAndPrivacyHomomorphisms.pdf Home Page of L. Rivest (Publications) http://people.csail.mit.edu/rivest/ Google Scholar http://scholar.google.com/citations?user=6qE0tdAAAAAJ&hl=e n Wikipedia: http://en.wikipedia.org/wiki/Ron_Rivest Fully Homomorphic Encryption with Relatively
  • 105. Small Key and Ciphertext Sizes Nigel P. Smart and Frederick Vercauteren http://dx.doi.org/10.1007/978-3-642-13013-7_25 Public Key Cryptography – PKC 2010 Phong Q. Nguyen and David Pointcheval (Editors) Springer, 2010, ISBN 978-3-642-13012-0, LNCS 6056 http://dx.doi.org/10.1007/978-3-642-13013-7 Homomorphic Encryption Tutorial (Crypto 2011) Shai Halevi, IBM Research http://www.youtube.com/watch?v=jIWOR2bGC7c Part 1 http://www.youtube.com/watch?v=huLGjBpj3Os Part 2 Fully Homomorphic Encryption Shai Halevi, IBM Research http://www.youtube.com/watch?v=R5jaHNC_neI Part 1 http://www.youtube.com/watch?v=1UDZko9jW5w Part 2 Winter School on Secure Computation and Efficiency Professor Yehuda Lindell, Department of Computer Science, Bar-Ilan University http://www.youtube.com/watch?v=z3U-5mf6hGw Back to the Table of Contents =======================================
  • 106. History of Cryptology ==================== Cryptology: The Mathematics of Secure Communication Gustavus J. Simmons The Mathematical Intelligencer, Volume 1, Number 4 (December 1979) http://dx.doi.org/10.1007/BF03028244 Abraham Lincoln’s Cyphering Book and Ten other Extraordinary Cyphering Books Nerida F. Ellerton and M. A. (Ken) Clements Springer, 2014, ISBN 978-3-319-02502-5 http://dx.doi.org/10.1007/978-3-319-02502-5 Code Breaking in the Pacific Peter Donovan and John Mack Springer, 2014, ISBN 978-3-319-08278-3 http://dx.doi.org/10.1007/978-3-319-08278-3 Back to the Table of Contents ======================================= How to Share a Secret =================== ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  • 107. How to Share a Secret (Chapter 17) Johannes Blomer http://dx.doi.org/10.1007/978-3-642-15328-0_17 Algorithms Unplugged B. Vocking et al. (Editors) Springer, 2011, ISBN 978-3-642-15328-0 http://dx.doi.org/10.1007/978-3-642-15328-0 How to Share a Secret Adi Shamir Communications of the ACM, Volume 22, Number 11 (November 1979) http://dx.doi.org/10.1145/359168.359176 Safeguarding cryptographic keys G. R. Blakley Proceedings AFIPS 1979 National Computer Conference http://dx.doi.org/10.1109/AFIPS.1979.98 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The breadth of Shamir’s secret-sharing scheme Ed Dawson and Diane Donovan Computers & Security, Volume 13, Number 1 (February 1994) http://dx.doi.org/10.1016/0167-4048(94)90097-3 An Explication of Secret Sharing Schemes
  • 108. D.R. Stinson Designs, Codes and Cryptography, Volume 2, Number 4 (December 1992) http://dx.doi.org/10.1007/BF00125203 How to Leak a Secret: Theory and Applications of Ring Signatures Ronald L. Rivest, Adi Shamir, and Yael Tauman http://dx.doi.org/10.1007/11685654_7 Theoretical Computer Science: Essays in Memory of Shimon Even Oded Goldreich, Arnold L. Rosenberg, and Alan M. Selman (Editors) Springer, 2006, ISBN 978-3-540-32881-0 http://dx.doi.org/10.1007/11685654 Secret swarm unit: Reactive k-secret sharing Shlomi Dolev, Limor Lahiani, and Moti Yung Ad Hoc Networks, Volume 10, Number 7 (September 2012) http://dx.doi.org/10.1016/j.adhoc.2012.03.011 Secure Multiparty Computation and Secret Sharing Ronald Cramer, Ivan Bjerre Damgard, and Jesper Buus Nielsen Cambridge University Press, 2015, ISBN 9781107337756 http://dx.doi.org/10.1017/CBO9781107337756 Back to the Table of Contents =======================================
  • 109. Anonymity ============================ Seeking Anonymity in an Internet Panopticon Joan Feigenbaum and Bryan Ford Communications of the ACM, Volume 58, Number 10 (October 2015) http://dx.doi.org/10.1145/2714561 Dissent – accountable anonymous group communication http://dedis.cs.yale.edu/dissent/ Tor Project – Anonymity Online https://www.torproject.org/ Anonymization Rolf H. Weber and Ulrike I. Heinrich Springer, 2012, ISBN 978-1-4471-4066-5 http://dx.doi.org/10.1007/978-1-4471-4066-5 Anonymous Communication Networks: Protecting Privacy on the Web Kun Peng CRC Press, 2014, ISBN 978-1-4398-8160-6 http://dx.doi.org/10.1201/b16756 On Anonymity in an Electronic Society: A Survey of Anonymous Communication Systems
  • 110. Matthew Edman and Bulent Yener ACM Computing Surveys, Volume 42, Number 1 (December 2009) http://dx.doi.org/10.1145/1592451.1592456 The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability David Chaum Journal of Cryptology, Volume 1, Number 1 (January 1988) http://dx.doi.org/10.1007/BF00206326 Practical Anonymity: Hiding in Plain Sight Online Peter Loshin Elsevier, 2013, ISBN 978-0-12-410404-4 http://www.sciencedirect.com/science/book/9780124104044 Privacy for Reporters of Human Rights Abuses: Identity and Anonymity in Mobile Networks Leonardo Martucci and Simone Fischer-Hubner http://dx.doi.org/10.1007/978-94-007-1384-0_13 Personal Privacy in Mobile Networks Claudio A. Ardagna, Sabrina De Capitani di Vimercati, And Pierangela Samarati http://dx.doi.org/10.1007/978-94-007-1384-0_14 Mobile Technologies for Conflict Management: Online Dispute Resolution, Governance, Participation Marta Poblet (Editor) Springer, 2011, ISBN 978-94-007-1384-0 http://dx.doi.org/10.1007/978-94-007-1384-0
  • 111. Back to the Table of Contents ======================================= Privacy and Identity Management ========= ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ You: for Sale – Protecting Your Personal Data and Privacy Online Stuart Sumner Elsevier, 2016, ISBN 978-0-12-803405-7 http://www.sciencedirect.com/science/book/978012803 4057 If You’re Not Paranoid, You’re Crazy Walter Klein Atlantic (November 2015) http://www.theatlantic.com/magazine/archive/2015/11 /if-youre-not-paranoid-youre-crazy/407833/ How Companies Learn Your Secrets Charles Duhigg New York Times Magazine (February 16, 2012)
  • 112. http://www.nytimes.com/2012/02/19/magazine/shoppi ng-habits.html?pagewanted=all How Should We Think about Privacy? Jaron Lanier Scientific American, Volume 309, Number 5 (November 2013) http://dx.doi.org/10.1038/scientificamerican1113-64 Wikipedia: http://en.wikipedia.org/wiki/Jaron_Lanier The Data-Driven Society Alex “Sandy” Pentland Scientific American, Volume 309, Number 4 (October 2013) http://dx.doi.org/10.1038/scientificamerican1013-78 Browse at Your Own Risk Nick Nikiforakis and Gunes Acar IEEE Spectrum, Volume 51, Number 8 (August 2014) http://dx.doi.org/10.1109/MSPEC.2014.6866435 Privacy vs. Security Sophie Stalla-Bourdillon, Joshua Phillips, and Mark D. Ryan Springer, 2014, ISBN 978-1-4471-6530-9 http://dx.doi.org/10.1007/978-1-4471-6530-9 The End of Privacy (special issue)