Bibliografía

¿Cuál es la bibliografía que se utiliza para este diplomado?

A continuación se presentan dos listas de referencias bibliograficas.
La primera es una lista de referencias básicas recopiladas por diferentes
profesores de seguridad.

La segunda es la lista de referencias que (ISC)2 ir a web de ISC2 presenta en su portal, tomada de la página del International  Infformation Systems Security Certification Consortium, Inc. y complementada por los expositores del diplomado.


Bibliografía básica

Hacking Exposed,  by Joel Scambray, Stuart McClure, George Kurtz, Bruce Schneier, 703 pages 2nd edition (October 11, 2000) , McGraw-Hill Professional Publishing; ISBN: 0072127481 ;  Dimensions (in inches): 1.72 x 9.11 x 7.27
Secrets and Lies : Digital Security in a Networked World by Bruce Schneier, 432 pages 1 edition (August 14, 2000) , John Wiley & Sons; ISBN: 0471253111; Dimensions (in inches): 1.53 x 9.31 x 6.37
Practical Unix and Internet Security by Simson Garfinkel, Gene Spafford, 1004 pages 2nd edition (April 1996) ,O'Reilly & Associates; ISBN: 1565921488 ;  Dimensions (in inches): 2.11 x 9.17 x 7.00
Maximum Linux Security : A Hacker's Guide to Protecting Your Linux Server and Workstation
743 pages Bk&Cd Rom edition (October 1999), Sams; ISBN: 0672316706;  Dimensions (in inches): 1.80 x 9.06 x 7.33
Maximum Security,  Second Edition, 864 pages (September 15, 1998), Sams; ISBN: 0672313413; Dimensions (in inches): 2.19 x 9.07 x 7.36
Cryptography & Network Security: Principles & Practice by William Stallings, 569 pages 2nd edition (July 15, 1998), Prentice Hall; ISBN: 0138690170 ;  Dimensions (in inches): 1.05 x 9.37 x 7.19
Firewalls and Internet Security : Repelling the Wily Hacker (Addison-Wesley Professional Computing  Series) by William R. Cheswick, Steven M. Bellovin, 2nd edition (February 15, 2001), Addison-Wesley Pub Co; ISBN: 020163466
Computer Security Handbook by Arthur E. Hutt (Editor), Seymour Bosworth (Editor), Douglas B. Hoyt (Editor), 3rd edition (September 1995), John Wiley & Sons; ISBN: 0471118540 ;  Dimensions (in inches): 1.99 x 9.94 x 7.01
Mission Critical Internet Security (Mission Critical Series), by Syngress Media (Editor), 656 pages (December 30, 2000) Syngress Media Inc; ISBN: 1928994202 ;  Dimensions (in inches): 1.25 x 9.23 x 7.47
Network Security: Private Communication in a Public World by Charlie Kaufman, Radia Perlman, Mike Speciner, 504 pages 1 edition (March 16, 1995) Prentice Hall; ISBN: 0130614661 ;  Dimensions (in inches): 1.09 x 9.62 x 7.29
UNIX System Security: A Guide for Users and System Administrators by David A. Curry, 279 pages (January 1992) , Unknown; ISBN: 0201606402 ; Dimensions (in inches): 0.64 x 9.27 x 7.51
Network Intrusion Detection, by Stephen Northcutt, Donald McLachlan, Judy Novak, 450 pages, 2nd edition (September 22, 2000)  New Riders Publishing; ISBN: 0735710082 ;  Dimensions (in inches): 0.98 x 8.99 x 7.04
Hack Proofing Your Network: Internet Tradecraft, by Syngress Media (Editor), Ryan Russell, Stace Cunningham, 450 pages 1st edition (January 15, 2000) , Syngress Media Inc; ISBN: 1928994156 ;  Dimensions (in inches): 1.17 x 9.25 x 7.41
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition by Bruce Schneier, 784 pages 2 edition (October 18, 1995), John Wiley & Sons; ISBN: 0471117099 ;  Dimensions (in inches): 1.67 x 9.20 x 7.54
Handbook of Applied Cryptography (CRC Press Series on Discrete Mathematics and Its Applications) by Alfred J. Menezes, Paul C. Van Oorschot (Editor), Scott A. Vanstone (Editor). 816 pages (October 1996), CRC Press; ISBN: 0849385237 ; Dimensions (in inches): 1.85 x 10.29 x 7.31
Cryptography in C and C++, by Michael Welschenbach, 380 pages Bk&Cd-Rom edition (April 2001) APress; ISBN: 189311595X ; Dimensions (in inches): 1.14 x 9.25 x 7.42 
Advanced Topics in Computational Number Theory (Graduate Texts in Mathematics, 193) by Henri Cohen, 550 pages (March 2000) , Springer Verlag; ISBN: 0387987274 ; Dimensions (in inches): 1.26 x 9.55 x 6.40
A Course in Number Theory and Cryptography (Graduate Texts in Mathematics, No 114) by Neal I. Koblitz, 235 pages 2nd edition (September 1994) , Springer Verlag; ISBN: 0387942939 ; Dimensions (in inches): 0.70 x 9.54 x 6.29
Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet by Eoghan Casey, 279 pages 1st edition (March 15, 2000), Academic Pr; ISBN: 012162885X ; Dimensions (in inches): 0.78 x 9.96 x 7.65 


  Bibliografía de (ISC)2 ir a web de ISC2
  • Information Security Management Handbook, Fourth Edition,Micki Krause, CISSP (Editor), Harold F. Tipton, CISSP (Editor), CRC Press - Auerbach Publications, ISBN: 0849398290  (disponible en amazon.com)
  • Computer Security Basics,Deborah Russell, G. T. Gangemi, CISSP, O'Reilly & Associates, ISBN: 0937175714  (disponible en amazon.com)
  • Practical Unix & Internet Security, Simson Garfinkel, CISSP, Gene Spafford, O'Reilly & Associates, ISBN: 1565921488  (disponible en amazon.com)
  • Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition, Bruce Schneier, John Wiley & Sons, ISBN: 0471117099 (disponible en amazon.com)
  • Fighting Computer Crime: A New Framework for Protecting Information,Donn B. Parker, CISSP, John Wiley & Sons, ISBN: 0471163783 (disponible en amazon.com)
  • Information Security Policies Made Easy, Charles C. Wood, CISSP, Baseline Software, ISBN: 1881585069 (disponible en amazon.com)
  • CISSP Examination Textbooks Volume 1: Theory, SRV Professional Publications, www.srvbooks.com
  • CISSP Examination Textbooks Volume 2: Practice, SRV Professional Publications, www.srvbooks.com
  • Corporate Espionage : What It Is, Why It Is Happening in Your Company, What You Must Do About It, Ira Winkler Prima Publishing, ISBN: 0761518096 (disponible en amazon.com)
  • The NCSA Guide to Enterprise Security : Protecting Information Assets, Michel E. Kabay, CISSP, McGraw Hill Text, ISBN: 0070331472 (disponible en amazon.com)
  • Computer Security Handbook, Third Edition,Arthur E. Hutt (Editor), Seymour Bosworth (Editor), Douglas B. Hoyt (Editor) John Wiley & Sons, New York, ISBN 0-471-11854-0 (disponible en amazon.com)
  • Information Warfare and Security, Dorothy Denning, Addison-Wesley, ISBN:0-201-43303-6 (disponible en amazon.com)
  • Internet Besieged, Dorothy Denning, Addison-Wesley, ISBN: 0-201-30820-7 (disponible en amazon.com)
  • Computer Security, Dieter GollmannJohn Wiley & Sons, ISBN: 0-471-97844-2 (disponible en amazon.com)
  • Java Security, Scott Oaks, O'Reilly & Associates,ISBN 1-56592-403-7 (disponible en  amazon.com)
  • Network Intrusion Detection: An Analysis Handbook, Stephen Northcutt, New Riders Publishing, ISBN: 0735708681 (disponible en amazon.com)
  • Encyclopedia of Disaster Recovery, Security & Risk Management,Tari Schreider, Crucible Publishing Works, ISBN: 0966272900 (disponible en amazon.com)
  • Glossary of INFOSEC and INFOSEC Related Terms Corey Schou (Editor)
  • (ISC)² Reference Library (As of March 2000)


The following books are part of the (ISC)² Reference Library.
 

  • Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition, Bruce Schneier, 1996
  • John Wiley and Sons, ISBN 0-471-11709-9
  • CCTV Surveillance, Video Practices and Technology, Herman Kruegle, 1995, Butterworth-Heinemann, ISBN 0-7506-9028-3 (paperback)
  • Commonsense Computer Security, Your Practical Guide to Information Protection, 2nd Edition, Martin Smith, 1993, McGraw-Hill, ISBN 0-07-707805-5
  • Communications Networks, A First Course, 2nd Edition, Jean Walrand, 1998, WCB/ McGraw-Hill, ISBN 0-256-17404-0
  • Computer and Communications Security: Strategies for the 1990's, James Arlin Cooper, 1989, McGraw-Hill, ISBN 0-07-012926-6
  • Computer Crime: A Crime Fighter's Handbook, David Icove, Karl Seger, and William VonStorch, 1995, O'Reilly and Associates, ISBN 1-56592-086-4
  • Computer Ethics, 2nd Edition, Tom Forester and Perry Morrison, 1995, MIT Press, ISBN 9-780262-560733
  • Computer Security Basics, Russell, Deborah and G. T. Gangemi, Sr. Sebastapol, O'Reilly and Associates, 1991, ISBN 0-937175-71
  • Computer Security Handbook, 3rd Edition, Edited By Arthur E. Hutt, Seymour Bosworth, and Douglas B. Hoyt, 1995, John Wiley & Sons, ISBN 0-471-11854-0 (acid-free paper)
  • Computer Viruses: How to Avoid Them, How to Get Rid of Them, and How to Get Help, 2nd Edition, Robert Slade, 1996, Springer-Verlag, ISBN 0-387-94663-2
  • Computers At Risk: Safe Computing In the Information Age, System Security Study Committee, 1991, National Academy Press, ISBN 0-309-04388-3
  • Computers, Ethics, and Society, 2nd Edition, M. David Ermann, Mary B. Williams, and Michele S. Shauf, 1997, Oxford University Press, ISBN 0-19-510756-X
  • Cryptography's Role in Securing the Information Society, Kenneth W. Dam and Herbert S. Lin, Editors, 1996, National Academy Press, ISBN 0-309-05475-3
  • Defending Your Digital Assets Against Hackers, Crackers, Spies, and Thieves, Randall K. Nichols, Daniel J. Ryan, and Julie J.C.H. Ryan, 2000, McGraw Hill, ISBN 0-07-212285-4
  • E-Mail Security: How to Keep Your Electronic Messages Private, Bruce Schneier, 1995, John Wiley & Sons, ISBN 0-471-05318-X
  • Fighting Computer Crime, A New Framework for Protecting Information, Donn B. Parker, 1998,John Wiley & Sons, ISBN 0-471-16378-3
  • Fundamentals of Computer Security Technology, Edward Amoroso, 1994, Prentice Hall, ISBN 0-13-108929-3
  • Glossary of INFOSEC and INFOSEC Related Terms, Volume 1, Compiled by Corey D. Schou, Information Systems Security Organization, Idaho State University, 28 August 1996
  • Glossary of INFOSEC and INFOSEC Related Terms, Volume 2, Compiled by Corey D. Schou, Information Systems Security Organization, Idaho State University, 28 August 1996
  • Hacker Proof: The Ultimate Guide to Network Security, Lars Klarder, 1997, Jamsa Press, ISBN 1-884133-55-X
  • Hacking Exposed: Network Security Secrets and Solutions, Stuart McClure, Joel Scambray, and George Kurtz, 1999, Osborne/McGraw Hill, ISBN 0-07-212127-0
  • Handbook of IS Management, 5th Edition, Robert E. Umbaugh, Editor, 1997, Auerbach, RIA Group, ISBN 0-7913-2890-2
  • Handbook of Information Security Management, Micki Krause, Harold F. Tipton, Editors, 2000, Auerbach, ISBN 0-8493-9829-0
  • Handbook of Information Security Management, Micki Krause, Harold F. Tipton, Editors, 1999, Auerbach, ISBN 1-8493-9974-2
  • Handbook of Information Security Management, Micki Krause, Harold F. Tipton, Editors, 1998, Auerbach, ISBN 0-8493-9974-5
  • Handbook of Information Security Management, Zella G. Ruthberg, Harold F. Tipton, Editors, 1993, Auerbach, ISBN 0-7913-1636-X
  • Handbook of Information Security Management, 1996-97 Yearbook, Micki Krause, Harold F. Tipton, Editors, 1996, Auerbach, ISBN 0-7913-2562-8
  • Handbook of Information Security Management, 1994-95 Yearbook, Zella G. Ruthberg Harold F. Tipton, Editors, 1994, Auerbach, ISBN 0-7913-2073-1
  • Information Integrity: A Structure for Its Definition and Management, Hal B. Becker, 1983, McGraw-Hill, ISBN 0-07-004191-1
  • Information Systems Security: A Practitioner's Reference, Phillip E. Fites and Martin P.J. Kratz. 1996, International Thomson Computer Press, ISBN 1-85032-828-5
  • Information Systems Security Officer's Guide, Establishing and Managing an Information Protection Program, Dr. Gerald L. Kovacich, 1998, Butterworth-Heinemann, ISBN -7506-9896-9
  • Internet Security Professional Reference, Derek Atkins, Paul Buis, Chris Hare, Robert Kelley, Carey Nachenberg, Anthony B. Nelson, Paul Phillips,, Tim Ritchey, William Steen, 1996, New Riders Publishing, ISBN 1-56205-557-7
  • Intrusion Detection, Network Security Beyond the Firewall, Terry Escamilla, 1998, John Wiley & Sons, ISBN 0-471-29000-9
  • JAVAJ Security, Scott Oaks, 1998, O'Reilly & Associates, ISBN 1-56592-403-7
  • Mastering Network Security, Chris Brenton, 1999, Network Press, (SYBEX), ISBN 0-7821-2343-0
  • Maximum Security, A Hacker's Guide to Protecting Your Internet Site and Network, 2nd Edition, Anonymous, 1998, Sams Publishing, ISBN 0-672-31341-3
  • Network Security, Data and Voice Communications, Fred Simonds, 1996, McGraw-Hill, (series on computer communications), ISBN 0-07-057634-3
  • Secure Computing: Threats and Safeguards, Rita C. Summers, 1997, McGraw-Hill, ISBN 0-07-069419-2
  • Security, ID Systems and Locks, The Book on Electronic Access Control, Joel Konicek and Karen Little, 1997, Butterworth-Heinemann, ISBN 0-7506-9932-9
  • Software Engineering Risk Analysis and Management, Robert N. Charette, 1989, Intertext Publications, ISBN 0-07-010661
  • Standard for Auditing Computer Applications, Martin A. Krist, 1999, Auerbach, ISBN 0-8493-9983-1
  • The NCSA Guide to PC and LAN Security, Stephen Cobb, 1996, McGraw-Hill, ISBN 0-07-912168-3
  • Time-Based Security, Practical and Provable Methods to Protect Enterprise and Infrastructure Networks and Nation, Winn Schwartau, 1999, Interpact Press, ISBN 0-9628700-4-8
  • Understanding Data Communications, 4th Edition, Gilbert Held (Revision Editor), 1994, Sams Publishing, ISBN 0-672-30501-1
  • Virtual Private Networks, 2nd Edition, Charlie Scott, Paul Wolfe, and Mike Erwin, 1999, O'Reilly and Associates, ISBN 1-56592-529-7
  • Voice and Data Communications Handbook, Regis J. Bates, Donald W. Gregory, J. Ranade, Series Editor, 1998, McGraw-Hill, ISBN 0-07-006396-6
  • Web Security, Amrit Tiwana, 1999, Butterworth-Heinemann, ISBN 1-55558-210-9
  • Web Security and Commerce, Simson Garfunkel with Gene Spafford, 1997, O'Reilly and Associates, ISBN 1-56592-269-7
  • Web Security Sourcebook, A Complete Guide to Web Security Threats and Solutions, Aviel D. Rubin, Daniel Geer, and Marcus J. Ranum, 1997, John Wiley & Sons, ISBN 0-471-18148-X
  • NIST Special Publication 800-10 Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls, December 1994
  • NIST Special Publication 800-12 An Introduction to Computer Security: The NIST Handbook, October 1995
  • NIST Special Publication 800-14 Generally Accepted Principles and Practices for Securing Information, Technology Systems, September 1996
  • NISTIR 5153 Minimum Security requirements for Multi-User Operating Systems, March 1993
  • Federal Information Processing Standards (FIPS) Pub 41 Computer Security Guidelines for Implementing, the Privacy Act of 1974 May 30, 1975