Books on Network Security
1
One to five asterisks in front of the some of the books represent our subjective view of their goodness. The titles without asterisks have not been rated. The books are arranged in the reverse order of year of publication.
Recommended:
- [*****] Brian Hatch, James B. Lee, George Kurtz, "
Hacking Linux Exposed," McGraw-Hill, March 2001, 566 pages.
- [*****] Joel Scambray, Stuart McClure, "
Hacking Exposed Windows 2000," McGraw-Hill, August 2001, 500 pages.
- [*****] Russ Housley, Tim Polk, "
Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure," Wiley, March 2001, 352 pages.
- [*****] Daniel J. Barrett, Richard Silverman, "
SSH, The Secure Shell: The Definitive Guide," O'Reilly & Associates, February 2001, 540 pages.
- [*****] Juanita Ellis, Tim Speed, William P. Crowell, "
The Internet Security Guidebook: From Planning to Deployment," Academic Press, February 2001, 375 pages.
- [*****] John E. Canavan, "
The Fundamentals of Network Security," Artech House, February 2001, 350 pages.
- [*****] Jon C. Graff, "
Cryptography and E-Commerce: A Wiley Tech Brief," Wiley, December 2000, 208 pages.
- [*****] Philip Cox, Tom Sheldon, Phillip Cox, "
Windows 2000 Security Handbook," McGraw-Hill, November 2000, 738 pages.
- [*****] Joel Scambray, Stuart McClure, George Kurtz, "
Hacking Exposed," McGraw-Hill, October 2000, 703 pages.
- [*****] Eric Rescorla, "
SSL and TLS: Designing and Building Secure Systems," Addison-Wesley, October 2000, 499 pages.
- [*****] Stephen Northcutt, Donald McLachlan, Judy Novak, "
Network Intrusion Detection: An Analyst's Handbook (2nd Edition)," New Riders Publishing, September 2000, 450 pages.
- [*****] Jan Killmeyer Tudor, "
Information Security Architecture: An Integrated Approach to Security in the Organization," CRC Press, September 2000, 424 pages.
- [*****] E. Eugene Schultz, "
Windows NT/2000 Network Security," New Riders Publishing, August 2000, 375 pages.
- [*****] Michael Howard, "
Designing Secure Web-Based Applications for Microsoft Windows(r) 2000," Microsoft Press, July 2000, 528 pages.
- [*****] Stephen A. Thomas, "
SSL & TLS Essentials: Securing the Web," Wiley, February 2000, 224 pages.
- [****] Mohammed J. Kabir, "
Red Hat Linux(r) Security and Optimization," Hungry Minds, Inc, December 2001, 650 pages.
- [****] Aviel D. Rubin, "
White-Hat Security Arsenal: Tackling the Threats," Addison-Wesley, June 2001, 368 pages.
- [****] Greg Shipley, "
Maximum Security (3rd Edition)," Sams, May 2001, 896 pages.
- [****] Andrew Mason, Mark J. Newcomb, "
Cisco Secure Internet Security Solutions," Cisco Press, May 2001, 528 pages.
- [****] Winn Schwartau, "
Cybershock : Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption," Thunder's Mouth Press, March 2001, 496 pages.
- [****] Mark Cooper, et al, "
Intrusion Signatures and Analysis," New Riders Publishing, January 2001, 350 pages.
- [****] Mike Wenstrom, "
Managing Cisco Network Security," Cisco Press, January 2001, 789 pages.
- [****] Thomas R. Peltier, "
Information Security Risk Analysis," Auerbach Publications, January 2001, 281 pages.
- [****] Stefan Norberg, Deborah Russell, "
Securing Windows NT/2000 Servers for the Internet," O'Reilly & Associates, November 2000, 216 pages.
- [****] Richard Mansfield, "
Hacker Attack," Sybex, September 2000, 320 pages.
- [****] Jeff Crume, "
Inside Internet Security: What Hackers Don't Want You To Know," Addison-Wesley, August 2000, 288 pages.
- [****] Syngress Media, Ryan Russell, Stace Cunningham, "
Hack Proofing Your Network: Internet Tradecraft," Syngress Media Inc, January 2000, 450 pages.
- [****] Stuart McClure, Joel Scambray, George Kurtz, "
Hacking Exposed: Network Security Secrets and Solutions," McGraw-Hill, September 1999, 484 pages.
- [****] Naganand Doraswamy, Dan Harkins, "
Ipsec: The New Security Standard for the Inter- net, Intranets, and Virtual Private Networks," Prentice Hall, August 1999, 216 pages.
- [****] Merike Kaeo, "
Designing Network Security," Cisco Press, June 1999, 426 pages.
- [****] Frederick Thomas Martin, Fredrick Thomas Martin, "
Top Secret Intranet: How U.S. Intelligence Built Intelink - the World's Largest, Most Secure Network," Prentice Hall, November 1998, 380 pages.
- [****] Jalal Feghhi, Peter Williams, Jalil Feghhi, "
Digital Certificates: Applied Internet Security," Addison-Wesley, October 1998, 453 pages.
- [****] Marcus Goncalves, "
Firewalls Complete," McGraw-Hill, February 1998, 632 pages.
2001:
- Thomas D. Tarman, Edward L. Witzke, "
Implementing Security for ATM Networks," Artech House, December 2001, 318 pages.
- Christopher King, Ertem Osmanoglu, Curtis Dalton, "
Security Architecture: Design, Deployment and Operations," McGraw-Hill, July 2001, 481 pages.
- David J. Marchette, "
Computer Intrusion Detection and Network Monitoring : A Statistical Viewpoint," Springer Verlag, July 2001, 360 pages.
- Chris Brenton, Cameron Hunt, "
Active Defense: A Comprehensive Guide to Network Security," Sybex, June 2001, 768 pages.
- Karen Strauss, Tim Sneath, Steven Hambruch, "
Windows 2000 High-Availability Networks 24seven," Sybex, June 2001, 608 pages.
- Eric Maiwald, "
Network Security: A Beginner's Guide," McGraw-Hill, May 2001, 400 pages.
- Arnaud de Borchgrave, Frank J. Cilluffo, Sharon L. Cardash, "
Cyber Threats and Information Security : Meeting the 21st Century Challenge," Center for Strategic & Int'l Studies, May 2001, 56 pages.
- Stephen Cobb, "
Cobbs Guide to PC and Lan Security," iUniverse.com, May 2001, 709 pages.
- Carlton Davis, "
IPSec: Securing VPNs," McGraw-Hill, April 2001, 432 pages.
- Sheila Frankel, "
Demystifying the Ipsec Puzzle," Artech House, April 2001, 273 pages.
- Micky Balladelli, Jan De Clercq, "
Mission-Critical Active Directory: Architecting a Secure and Scalable Infrastructure," Digital Press, March 2001, 512 pages.
- Anup K. Ghosh, "
Delivering Security and Privacy for E-Business," Wiley, February 2001, 240 pages.
- Yusufali F. Musaji, "
Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans," Wiley, February 2001, 552 pages.
- David J. Gunkel, "
Hacking Cyberspace," Westview Press, February 2001, 240 pages.
- Roger Abell, Richard Taha, Inc. Banyan Systems, "
The Active Directory: Administration, Security and Migration," Que, February 2001, 350 pages.
- Microsoft Corporation, "
MCSE Training Kit: Designing Microsoft Windows 2000 Network Security," Microsoft Press, January 2001, 864 pages.
Industry Reports:
2000:
- Warwick Ford, Michael S. Baum, "
Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption (2nd Edition)," Prentice Hall, December 2000, 620 pages.
- Bill Roscoe, et al, "
Modelling and Analysis of Security Protocols," Addison-Wesley, December 2000, 352 pages.
- Bradley Dunsmore, "
Mission Critical Internet Security," Syngress Media Inc, December 2000, 656 pages.
- Kevin Fenzi, Dave Wreski, "
Linux Security HOWTO," iUniverse.com, December 2000, 108 pages.
- Computer Technology Research Corporation,, "
Advanced Security Strategies : Protecting Today's E-Business Environment," , December 2000.
- Chris Rima, et al, "
Test Yourself MCSE Designing Security For Windows 2000," McGraw-Hill, November 2000, 382 pages.
- Michael Chesbro, "
The Complete Guide to E-Security : Using the Internet and E-Mail Without Losing Your Privacy," Paladin Press, November 2000.
- Vesna Hassler, "
Security Fundamentals for E-Commerce," Artech House, November 2000, 416 pages.
- Dr. X, Dr. X, "
The Complete Hacker's Handbook : Everything You Need to Know About Hacking in the Age of the Web," Carlton Books, October 2000, 192 pages.
- Richard A. McMahon, Glen Bicking, Ronald Milione, "
MCSE Windows 2000 Security Design Exam Prep," The Coriolis Group, October 2000, 656 pages.
- Florent Parent, Inc Staff Syngress Media, Oliver Steudler, "
Managing Cisco Network Security," Syngress Media Inc, October 2000, 466 pages.
- Carol Woodbury, Wayne Madden, "
Implementing AS/400 Security, 4th Edition," 29th Street Press, October 2000, 454 pages.
- Gary Govanus, Robert King, "
MCSE: Windows 2000 Network Security Design Exam Notes," Sybex, October 2000, 400 pages.
- Harold Tipton, "
Information Security Management Handbook, Two Volume Set," CRC Press, October 2000.
- Theodore Shrader, Anthony J. Nadalin, Bruce Rich, "
Java & Internet Security," iUniverse.com, October 2000, 208 pages.
- Phillip G. Schein, "
MCSE Windows 2000 Security Design Exam Cram," The Coriolis Group, September 2000, 488 pages.
- Thomas Shinder, et al, "
MCSE Designing Security for Windows 2000 Network Study Guide (Book/CD-ROM package)," McGraw-Hill, September 2000, 699 pages.
- Jamie Jaworski, Paul Perrone, "
Java Security Handbook," Sams, September 2000, 534 pages.
- Jeff Schmidt, et al, "
Microsoft Windows 2000 Security Handbook," Que, August 2000, 1000 pages.
- Internet Security Systems Inc., John Hayday, "
Microsoft Windows(r) 2000 Security Technical Reference," Microsoft Press, August 2000, 608 pages.
- TechRepublic, "
Network Administrator's Security Resource Guide," TechRepublic, August 2000, 270 pages.
- Uyless D. Black, "
Internet Security Protocols: Protecting IP Traffic," Prentice Hall, July 2000, 286 pages.
- Anique A. Qureshi, Joel G. Siegel, Jae K. Shim, "
The International Handbook of Computer Security," Fitzroy Dearborn Publishers, July 2000, 400 pages.
- Tom Douglas, Brian Loader, Thomas Douglas, "
Cybercrime: Security and Surveillance in the Information Age," Routledge, June 2000, 320 pages.
- Donald L. Pipkin, "
Information Security: Protecting the Global Enterprise," Prentice Hall, May 2000, 364 pages.
- David A. Bandel, "
Linux Security Toolkit," Hungry Minds, Inc, May 2000, 442 pages.
- Mostafa Hashem Sherif, Ahmed Sechrouchni, "
Protocols for Secure Electronic Commerce," CRC Press, March 2000, 496 pages.
- Ian McLean, "
Windows 2000 Security Little Black Book: The Hands-On Reference Guide for Establishing a Secure Windows 2000 Network," The Coriolis Group, February 2000, 448 pages.
- John Knittel, Michael Soto, "
Everything You Need to Know About the Dangers of Computer Hacking," Rosen Publishing Group, February 2000, 64 pages.
- Harold F. Tipton, Micki Krause, "
Information Security Management Handbook 2001," CRC Press, January 2000, 626 pages.
- Gary Govanus, Robert King, "
MCSE: Windows 2000 Network Security Design Study Guide Exam 70-220," Sybex, January 2000, 865 pages.
- Roberta Bragg, "
MCSE Windows 2000 Network Security Design: Training Guide Exam 70-220," Que, January 2000, 912 pages.
- Mark S. Merkow, Jim Breithaupt, James Breithaupt, "
The Complete Guide to Internet Security," AMACOM, January 2000, 356 pages.
- Moshe Rozenblit, "
Security for Telecommunications Network Management," IEEE, January 2000, 296 pages.
- Fred Piper, et al, "
Digital Signatures Security and Controls," Information Systems Audit and Control Foundation, January 2000, 156 pages.
1999 and Earlier:
- Marcus Goncalves, Steven Brown, "
Check Point Firewall-1 Administration Guide," McGraw-Hill, September 1999, 464 pages.
- Brian Tung, "
Kerberos: A Network Authentication System," Addison-Wesley, June 1999, 164 pages.
- Gilbert Held, Kent Hundley, "
Cisco Security Architectures," McGraw-Hill, May 1999, 331 pages.
- Kathryn M. Walker, Linda Croswhite Cavanaugh, "
Computer Security Policies and SunScreen Firewalls," Prentice Hall, July 1998, 160 pages.
- Matthew Strebe, Charles Perkins, Michael Moncur, "
Nt Network Security," Sybex, February 1998, 929 pages.
- Lincoln D. Stein, "
Web Security: A Step-by-Step Reference Guide," Addison-Wesley, January 1998, 416 pages.
- Dan Blacharski, Dan Balcharski, "
Network Security in a Mixed Environment," Hungry Minds, Inc, January 1998.
- Micki Krause, et al, "
Handbook of Information Security Management, 1999 Edition," Auerbach Publications, 784 pages.
Back to
Books on Hot Topics in Networking
Back to
Raj Jain's Home Page