 |
Network Security, Private Communication in a Public
World,
Charlie Kaufman, Radia Perlman, Mike Speciner,
Ed. Prentice Hall, 1995 |
 |
Practical Unix and Internet Security,
by Simson Garfinkel, Gene Spafford,
2nd edition, 1996, O'Reilly & Associates |
 |
Hacking Exposed,
by Joel Scambray, Stuart McClure, George Kurtz, Bruce
Schneier, 7
2nd edition, 2000 , McGraw-Hill |
 |
Applied Cryptography, Protocols, Algorithms and Source
Code in C,
Bruce Schneier,
Ed. John Wiley & Sons, 1996 |
 |
Cryptography and Network Security, Principles and
Practice,
William Stallings,
Ed. Prentice Hall, 2da. edición, 1999 |
 |
Cryptography in C and C++,
by Michael Welschenbach,
APress, 2001 |
 |
Network Intrusion Detection,
by Stephen Northcutt, Donald McLachlan, Judy Novak, 450
pages,
2nd edition, 2000, New Riders Publishing; |
 |
Hack Proofing Your Network: Internet Tradecraft,
by Syngress Media (Editor), Ryan Russell, Stace
Cunningham,
1st edition, 2000 , Syngress Media |
 |
Firewalls and Internet Security : Repelling the Wily
Hacker
by William R. Cheswick, Steven M. Bellovin,
2nd edition, 2001, Addison-Wesley Pub Co |
 |
Computer Security Handbook
by Arthur E. Hutt, Seymour Bosworth, Douglas B. Hoyt
3rd edition, 1995, John Wiley & Sons |
 |
Cuckoo's Egg: Tracking a Spy Through the Maze of
Computer Espionage
by Clifford Stoll
Pocket Books;, October 2000 |
 |
Inside Network Perimeter Security: The Definitive
Guide to Firewalls,
Virtual Private Networks (VPNs), Routers, and Intrusion
Detection Systems
by Stephen Northcutt, Karen Fredrick, Scott Winters,
Lenny Zeltser,
Ronald W Ritcheyby
New Riders Publishing; 1st edition (June 28, 2002) |
 |
The Protocols (TCP/IP Illustrated, Volume 1)
by W. Richard Stevens,
Addison-Wesley Pub Co, 1st edition (January 1994) |
 |
C How to Program,
H. M. Deitel / P. J. Deitel,
Ed. Prentice Hall, 3rd Bk&cdr edition, 2000 |