¿Cuál
es la bibliografía que se utiliza para este
diplomado?
A
continuación se presentan dos listas de referencias
bibliograficas.
La primera es una lista de referencias básicas recopiladas
por diferentes
profesores de seguridad.
La segunda es la lista de referencias que (ISC)2 presenta
en su portal, tomada de la página del International Infformation
Systems Security Certification Consortium, Inc. y complementada
por los expositores del diplomado.
Bibliografía básica
|
Hacking Exposed, by Joel Scambray, Stuart McClure, George
Kurtz, Bruce Schneier, 703 pages 2nd edition (October 11, 2000) ,
McGraw-Hill Professional Publishing; ISBN: 0072127481 ; Dimensions
(in inches): 1.72 x 9.11 x 7.27 |
|
Secrets and Lies : Digital
Security in a Networked World by Bruce Schneier, 432 pages 1 edition
(August 14, 2000) , John Wiley & Sons;
ISBN: 0471253111; Dimensions (in inches): 1.53 x 9.31 x 6.37 |
|
Practical Unix and Internet
Security by Simson Garfinkel, Gene Spafford, 1004 pages 2nd edition
(April 1996) ,O'Reilly &
Associates; ISBN: 1565921488 ; Dimensions (in inches): 2.11 x 9.17
x 7.00 |
|
Maximum Linux Security : A Hacker's Guide to Protecting Your Linux
Server and Workstation
743 pages Bk&Cd Rom edition (October
1999), Sams; ISBN: 0672316706; Dimensions (in inches): 1.80 x 9.06
x 7.33 |
|
Maximum Security, Second
Edition, 864 pages (September 15, 1998), Sams; ISBN: 0672313413; Dimensions
(in inches): 2.19 x 9.07 x
7.36 |
|
Cryptography & Network Security: Principles & Practice by
William Stallings, 569 pages 2nd edition (July 15, 1998), Prentice Hall;
ISBN: 0138690170 ; Dimensions (in inches): 1.05 x 9.37 x
7.19 |
|
Firewalls and Internet Security
: Repelling the Wily Hacker (Addison-Wesley Professional Computing Series)
by William R. Cheswick, Steven M. Bellovin, 2nd edition (February 15,
2001),
Addison-Wesley Pub Co; ISBN: 020163466 |
|
Computer Security Handbook
by Arthur E. Hutt (Editor), Seymour Bosworth (Editor), Douglas B. Hoyt
(Editor), 3rd edition (September
1995), John Wiley & Sons; ISBN: 0471118540 ; Dimensions (in
inches): 1.99 x 9.94 x 7.01 |
|
Mission Critical Internet
Security (Mission Critical Series), by Syngress Media (Editor), 656
pages (December 30, 2000) Syngress Media
Inc; ISBN: 1928994202 ; Dimensions (in inches): 1.25 x 9.23 x
7.47 |
|
Network Security: Private
Communication in a Public World by Charlie Kaufman, Radia Perlman,
Mike Speciner, 504 pages 1 edition (March 16,
1995) Prentice Hall; ISBN: 0130614661 ; Dimensions (in inches):
1.09 x 9.62 x 7.29 |
|
UNIX System Security: A Guide for Users and System Administrators by
David A. Curry, 279 pages (January 1992) , Unknown; ISBN: 0201606402 ;
Dimensions (in inches): 0.64 x 9.27 x 7.51 |
|
Network Intrusion Detection,
by Stephen Northcutt, Donald McLachlan, Judy Novak, 450 pages, 2nd
edition (September 22, 2000) New Riders
Publishing; ISBN: 0735710082 ; Dimensions (in inches): 0.98 x 8.99
x 7.04 |
|
Hack Proofing Your Network:
Internet Tradecraft, by Syngress Media (Editor), Ryan Russell, Stace
Cunningham, 450 pages 1st edition (January
15, 2000) , Syngress Media Inc; ISBN: 1928994156 ; Dimensions (in
inches): 1.17 x 9.25 x 7.41 |
|
Applied Cryptography: Protocols,
Algorithms, and Source Code in C, 2nd Edition by Bruce Schneier, 784
pages 2 edition (October 18, 1995),
John Wiley & Sons; ISBN: 0471117099 ; Dimensions (in inches):
1.67 x 9.20 x 7.54 |
|
Handbook of Applied Cryptography (CRC Press Series on Discrete
Mathematics and Its Applications) by Alfred J. Menezes, Paul C. Van
Oorschot (Editor), Scott A. Vanstone (Editor). 816 pages (October 1996),
CRC Press; ISBN: 0849385237 ; Dimensions (in inches): 1.85 x 10.29 x
7.31 |
|
Cryptography in C and C++,
by Michael Welschenbach, 380 pages Bk&Cd-Rom edition (April 2001)
APress; ISBN: 189311595X ; Dimensions (in inches): 1.14 x 9.25 x 7.42 |
|
Advanced Topics in Computational Number Theory (Graduate Texts in
Mathematics, 193) by Henri Cohen, 550 pages (March 2000) , Springer
Verlag; ISBN: 0387987274 ; Dimensions (in inches): 1.26 x 9.55 x
6.40 |
|
A Course in Number Theory and Cryptography (Graduate Texts in
Mathematics, No 114) by Neal I. Koblitz, 235 pages 2nd edition
(September 1994) , Springer Verlag; ISBN: 0387942939 ; Dimensions (in
inches): 0.70 x 9.54 x 6.29 |
|
Digital Evidence and Computer
Crime: Forensic Science, Computers, and the Internet by Eoghan Casey,
279 pages 1st edition (March 15,
2000), Academic Pr; ISBN: 012162885X ; Dimensions (in inches): 0.78 x
9.96 x 7.65 |
Bibliografía
de (ISC)2
- Information
Security Management Handbook, Fourth Edition,Micki Krause,
CISSP (Editor), Harold F. Tipton, CISSP (Editor), CRC Press
- Auerbach Publications, ISBN: 0849398290 (disponible
en amazon.com)
- Computer
Security Basics,Deborah Russell, G. T. Gangemi, CISSP, O'Reilly & Associates,
ISBN: 0937175714 (disponible
en amazon.com)
- Practical
Unix & Internet Security, Simson Garfinkel, CISSP, Gene
Spafford, O'Reilly & Associates, ISBN: 1565921488 (disponible
en amazon.com)
- Applied
Cryptography: Protocols, Algorithms, and Source Code in C,
Second Edition, Bruce Schneier, John Wiley & Sons, ISBN:
0471117099 (disponible
en amazon.com)
- Fighting
Computer Crime: A New Framework for Protecting Information,Donn
B. Parker, CISSP, John Wiley & Sons, ISBN: 0471163783
(disponible
en amazon.com)
- Information
Security Policies Made Easy, Charles C. Wood, CISSP, Baseline
Software, ISBN: 1881585069 (disponible
en amazon.com)
- CISSP
Examination Textbooks Volume 1: Theory, SRV Professional
Publications, www.srvbooks.com
- CISSP
Examination Textbooks Volume 2: Practice, SRV Professional
Publications, www.srvbooks.com
- Corporate
Espionage : What It Is, Why It Is Happening in Your Company,
What You Must Do About It, Ira Winkler Prima Publishing,
ISBN: 0761518096 (disponible
en amazon.com)
- The NCSA
Guide to Enterprise Security : Protecting Information Assets,
Michel E. Kabay, CISSP, McGraw Hill Text, ISBN: 0070331472
(disponible
en amazon.com)
- Computer
Security Handbook, Third Edition,Arthur E. Hutt (Editor),
Seymour Bosworth (Editor), Douglas B. Hoyt (Editor) John
Wiley & Sons, New York, ISBN 0-471-11854-0 (disponible
en amazon.com)
- Information
Warfare and Security, Dorothy Denning, Addison-Wesley, ISBN:0-201-43303-6
(disponible
en amazon.com)
- Internet
Besieged, Dorothy Denning, Addison-Wesley, ISBN: 0-201-30820-7
(disponible
en amazon.com)
- Computer
Security, Dieter GollmannJohn Wiley & Sons, ISBN: 0-471-97844-2
(disponible
en amazon.com)
- Java
Security, Scott Oaks, O'Reilly & Associates,ISBN 1-56592-403-7
(disponible en amazon.com)
- Network
Intrusion Detection: An Analysis Handbook, Stephen Northcutt,
New Riders Publishing, ISBN: 0735708681 (disponible
en amazon.com)
- Encyclopedia
of Disaster Recovery, Security & Risk Management,Tari
Schreider, Crucible Publishing Works, ISBN: 0966272900 (disponible
en amazon.com)
- Glossary
of INFOSEC and INFOSEC Related Terms Corey Schou (Editor)
- (ISC)² Reference
Library (As of March 2000)
The following books are part of the
(ISC)² Reference Library.
- Applied
Cryptography: Protocols, Algorithms, and Source Code in C,
2nd Edition, Bruce Schneier, 1996
- John
Wiley and Sons, ISBN 0-471-11709-9
- CCTV
Surveillance, Video Practices and Technology, Herman Kruegle,
1995, Butterworth-Heinemann, ISBN 0-7506-9028-3 (paperback)
- Commonsense
Computer Security, Your Practical Guide to Information Protection,
2nd Edition, Martin Smith, 1993, McGraw-Hill, ISBN 0-07-707805-5
- Communications
Networks, A First Course, 2nd Edition, Jean Walrand, 1998,
WCB/ McGraw-Hill, ISBN 0-256-17404-0
- Computer
and Communications Security: Strategies for the 1990's, James
Arlin Cooper, 1989, McGraw-Hill, ISBN 0-07-012926-6
- Computer
Crime: A Crime Fighter's Handbook, David Icove, Karl Seger,
and William VonStorch, 1995, O'Reilly and Associates, ISBN
1-56592-086-4
- Computer
Ethics, 2nd Edition, Tom Forester and Perry Morrison, 1995,
MIT Press, ISBN 9-780262-560733
- Computer
Security Basics, Russell, Deborah and G. T. Gangemi, Sr.
Sebastapol, O'Reilly and Associates, 1991, ISBN 0-937175-71
- Computer
Security Handbook, 3rd Edition, Edited By Arthur E. Hutt,
Seymour Bosworth, and Douglas B. Hoyt, 1995, John Wiley & Sons,
ISBN 0-471-11854-0 (acid-free paper)
- Computer
Viruses: How to Avoid Them, How to Get Rid of Them, and How
to Get Help, 2nd Edition, Robert Slade, 1996, Springer-Verlag,
ISBN 0-387-94663-2
- Computers
At Risk: Safe Computing In the Information Age, System Security
Study Committee, 1991, National Academy Press, ISBN 0-309-04388-3
- Computers,
Ethics, and Society, 2nd Edition, M. David Ermann, Mary B.
Williams, and Michele S. Shauf, 1997, Oxford University Press,
ISBN 0-19-510756-X
- Cryptography's
Role in Securing the Information Society, Kenneth W. Dam
and Herbert S. Lin, Editors, 1996, National Academy Press,
ISBN 0-309-05475-3
- Defending
Your Digital Assets Against Hackers, Crackers, Spies, and
Thieves, Randall K. Nichols, Daniel J. Ryan, and Julie J.C.H.
Ryan, 2000, McGraw Hill, ISBN 0-07-212285-4
- E-Mail
Security: How to Keep Your Electronic Messages Private, Bruce
Schneier, 1995, John Wiley & Sons, ISBN 0-471-05318-X
- Fighting
Computer Crime, A New Framework for Protecting Information,
Donn B. Parker, 1998,John Wiley & Sons, ISBN 0-471-16378-3
- Fundamentals
of Computer Security Technology, Edward Amoroso, 1994, Prentice
Hall, ISBN 0-13-108929-3
- Glossary
of INFOSEC and INFOSEC Related Terms, Volume 1, Compiled
by Corey D. Schou, Information Systems Security Organization,
Idaho State University, 28 August 1996
- Glossary
of INFOSEC and INFOSEC Related Terms, Volume 2, Compiled
by Corey D. Schou, Information Systems Security Organization,
Idaho State University, 28 August 1996
- Hacker
Proof: The Ultimate Guide to Network Security, Lars Klarder,
1997, Jamsa Press, ISBN 1-884133-55-X
- Hacking
Exposed: Network Security Secrets and Solutions, Stuart McClure,
Joel Scambray, and George Kurtz, 1999, Osborne/McGraw Hill,
ISBN 0-07-212127-0
- Handbook
of IS Management, 5th Edition, Robert E. Umbaugh, Editor,
1997, Auerbach, RIA Group, ISBN 0-7913-2890-2
- Handbook
of Information Security Management, Micki Krause, Harold
F. Tipton, Editors, 2000, Auerbach, ISBN 0-8493-9829-0
- Handbook
of Information Security Management, Micki Krause, Harold
F. Tipton, Editors, 1999, Auerbach, ISBN 1-8493-9974-2
- Handbook
of Information Security Management, Micki Krause, Harold
F. Tipton, Editors, 1998, Auerbach, ISBN 0-8493-9974-5
- Handbook
of Information Security Management, Zella G. Ruthberg, Harold
F. Tipton, Editors, 1993, Auerbach, ISBN 0-7913-1636-X
- Handbook
of Information Security Management, 1996-97 Yearbook, Micki
Krause, Harold F. Tipton, Editors, 1996, Auerbach, ISBN 0-7913-2562-8
- Handbook
of Information Security Management, 1994-95 Yearbook, Zella
G. Ruthberg Harold F. Tipton, Editors, 1994, Auerbach, ISBN
0-7913-2073-1
- Information
Integrity: A Structure for Its Definition and Management,
Hal B. Becker, 1983, McGraw-Hill, ISBN 0-07-004191-1
- Information
Systems Security: A Practitioner's Reference, Phillip E.
Fites and Martin P.J. Kratz. 1996, International Thomson
Computer Press, ISBN 1-85032-828-5
- Information
Systems Security Officer's Guide, Establishing and Managing
an Information Protection Program, Dr. Gerald L. Kovacich,
1998, Butterworth-Heinemann, ISBN -7506-9896-9
- Internet
Security Professional Reference, Derek Atkins, Paul Buis,
Chris Hare, Robert Kelley, Carey Nachenberg, Anthony B. Nelson,
Paul Phillips,, Tim Ritchey, William Steen, 1996, New Riders
Publishing, ISBN 1-56205-557-7
- Intrusion
Detection, Network Security Beyond the Firewall, Terry Escamilla,
1998, John Wiley & Sons, ISBN 0-471-29000-9
- JAVAJ
Security, Scott Oaks, 1998, O'Reilly & Associates, ISBN
1-56592-403-7
- Mastering
Network Security, Chris Brenton, 1999, Network Press, (SYBEX),
ISBN 0-7821-2343-0
- Maximum
Security, A Hacker's Guide to Protecting Your Internet Site
and Network, 2nd Edition, Anonymous, 1998, Sams Publishing,
ISBN 0-672-31341-3
- Network
Security, Data and Voice Communications, Fred Simonds, 1996,
McGraw-Hill, (series on computer communications), ISBN 0-07-057634-3
- Secure
Computing: Threats and Safeguards, Rita C. Summers, 1997,
McGraw-Hill, ISBN 0-07-069419-2
- Security,
ID Systems and Locks, The Book on Electronic Access Control,
Joel Konicek and Karen Little, 1997, Butterworth-Heinemann,
ISBN 0-7506-9932-9
- Software
Engineering Risk Analysis and Management, Robert N. Charette,
1989, Intertext Publications, ISBN 0-07-010661
- Standard
for Auditing Computer Applications, Martin A. Krist, 1999,
Auerbach, ISBN 0-8493-9983-1
- The NCSA
Guide to PC and LAN Security, Stephen Cobb, 1996, McGraw-Hill,
ISBN 0-07-912168-3
- Time-Based
Security, Practical and Provable Methods to Protect Enterprise
and Infrastructure Networks and Nation, Winn Schwartau, 1999,
Interpact Press, ISBN 0-9628700-4-8
- Understanding
Data Communications, 4th Edition, Gilbert Held (Revision
Editor), 1994, Sams Publishing, ISBN 0-672-30501-1
- Virtual
Private Networks, 2nd Edition, Charlie Scott, Paul Wolfe,
and Mike Erwin, 1999, O'Reilly and Associates, ISBN 1-56592-529-7
- Voice
and Data Communications Handbook, Regis J. Bates, Donald
W. Gregory, J. Ranade, Series Editor, 1998, McGraw-Hill,
ISBN 0-07-006396-6
- Web Security,
Amrit Tiwana, 1999, Butterworth-Heinemann, ISBN 1-55558-210-9
- Web Security
and Commerce, Simson Garfunkel with Gene Spafford, 1997,
O'Reilly and Associates, ISBN 1-56592-269-7
- Web
Security Sourcebook, A Complete Guide to Web Security Threats
and
Solutions, Aviel D. Rubin, Daniel Geer, and Marcus J. Ranum,
1997, John Wiley & Sons, ISBN 0-471-18148-X
- NIST
Special Publication 800-10 Keeping Your Site Comfortably
Secure: An Introduction to Internet Firewalls, December 1994
- NIST
Special Publication 800-12 An Introduction to Computer Security:
The NIST Handbook, October 1995
- NIST
Special Publication 800-14 Generally Accepted Principles
and Practices for Securing Information, Technology Systems,
September 1996
- NISTIR
5153 Minimum Security requirements for Multi-User Operating
Systems, March 1993
- Federal
Information Processing Standards (FIPS) Pub 41 Computer Security
Guidelines for Implementing, the Privacy Act of 1974 May
30, 1975
|