Table of Contents
Cybersecurity
Biometrics
Security Engineering
Digital Forensics
Risk
Trust
Professional Certifications
Programming
Mathematics for Cryptography
Cryptography
History of Cryptology
Alice and Bob in Cipherspace
How to Share a Secret
Privacy
Data Privacy
Security Science
Additional Web Resources
Cybersecurity ==========================
Encyclopedia of Cryptography and Security
Henk C.A. van Tilborg and Sushil Jajodia (Editors)
Springer, 2011, ISBN 978-1-4419-5906-5
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4419-5906-5
http://dx.doi.org/10.1007/978-1-4419-5906-5
What Is Computer Science? An Information Security Perspective
Daniel Page and Nigel Smart
Springer, 2014, ISBN 978-3-319-04042-4
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-04042-4
http://dx.doi.org/10.1007/978-3-319-04042-4
Applied Information Security: A Hands-on Approach
David Basin, Patrick Schaller, and Michael Schlapfer
Springer, 2011, ISBN 978-3-642-24474-2
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-24474-2
http://dx.doi.org/10.1007/978-3-642-24474-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128013083
http://www.sciencedirect.com/science/book/9780128013083
Designing and Building A Security Operations Center
David Nathans
Elsevier, 2015, ISBN 978-0-12-800899-7
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128008997
http://www.sciencedirect.com/science/book/9780128008997
Cyber Security and IT Infrastructure Protection
John R. Vacca (Editor)
Elsevier, 2014, ISBN 978-0-12-416681-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124166813
http://www.sciencedirect.com/science/book/9780124166813
Detecting and Combating Malicious Email
Julie JCH Ryan and Cade Kamachi
Elsevier, 2015, ISBN 978-0-12-800110-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128001103
http://www.sciencedirect.com/science/book/9780128001103
Cyber Crime and Cyber Terrorism Investigators Handbook
Babak Akhgar, Andrew Staniforth, and Francesca Bosco (Editors)
Elsevier, 2014, ISBN 978-0-12-800743-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128007433
http://www.sciencedirect.com/science/book/9780128007433
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597491686
http://www.sciencedirect.com/science/book/9781597491686
Simple Steps to Data Encryption: A Practical Guide to Secure
Computing
Peter Loshin
Elsevier, 2013, ISBN 978-0-12-411483-8
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124114838
http://www.sciencedirect.com/science/book/9780124114838
Cyberterrorism: Understanding, Assessment, and Response
Thomas M. Chen, Lee Jarvis, and Stuart Macdonald (Editors)
Springer, 2014, ISBN 978-1-4939-0962-9
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4939-0962-9
http://dx.doi.org/10.1007/978-1-4939-0962-9
Introduction to Cyber-Warfare: A Multidisciplinary Approach
Paolo Shakarian, Jana Shakarian, and Andrew Ruef
Elsevier, 2013, ISBN 978-0-12-407814-7
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124078147
http://www.sciencedirect.com/science/book/9780124078147
The Basics of Cyber Warfare: Understanding the Fundamentals of
Cyber Warfare in Theory and Practice
Steve Winterfeld and Jason Andress
Elsevier, 2013, ISBN 978-0-12-404737-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124047372
http://www.sciencedirect.com/science/book/9780124047372
Mark Stamp
Wiley, 2011, ISBN 9781118027974
http://dx.doi.org.databases.poly.edu/10.1002/9781118027974
http://dx.doi.org/10.1002/9781118027974
Newton Lee
Springer, 2013, ISBN 978-1-4614-7205-6
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-7205-6
http://dx.doi.org/10.1007/978-1-4614-7205-6
Handbook of Computational Approaches to Counterterrorism
V.S. Subrahmanian (Editor)
Springer, 2013, ISBN 978-1-4614-5311-6
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-5311-6
http://dx.doi.org/10.1007/978-1-4614-5311-6
Human Aspects of Information Security, Privacy, and Trust, First
International Conference, HAS 2013
Louis Marinos and Ioannis Askoxylakis (Editors)
Springer, 2013, ISBN 978-3-642-39345-7
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-39345-7
http://dx.doi.org/10.1007/978-3-642-39345-7
From One Winning Career to the Next: Transitioning Public Sector
Leadership and Security Expertise to the Business Bottom Line
J. David Quilter
Elsevier, 2013, ISBN 978-0-12-411594-1
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124115941
http://www.sciencedirect.com/science/book/9780124115941
Applied Cyber Security and the Smart Grid: Implementing
Security Controls into the Modern Power Infrastructure
Eric D. Knapp and Raj Samani
Elsevier, 2013, ISBN 978-1-59749-998-9
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499989
http://www.sciencedirect.com/science/book/9781597499989
Physical-Layer Security: From Information Theory to Security
Engineering
Matthieu Block and Joao Barros
Cambridge University Press, 2011, ISBN 9780511977985
http://dx.doi.org.databases.poly.edu/10.1017/CBO9780511977985
http://dx.doi.org/10.1017/CBO9780511977985
Applied Cyber-Physical Systems
Sang C. Suh, U. John Tanik, John N. Carbone, and Abdullah Eroglu
(Editors)
Springer, 2014, ISBN 978-1-4614-7336-7
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-7336-7
http://dx.doi.org/10.1007/978-1-4614-7336-7
Handbook on Securing Cyber-Physical Critical Infrastructure:
Foundations and Challenges
Sajal K. das, Krishna Kant, and Nan Zhang
Elsevier, 2012, ISBN 978-0-12-415815-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124158153
http://www.sciencedirect.com/science/book/9780124158153
Analyzing and Defending Against Web-Based Malware
Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, and
Insup Lee
ACM Computing Surveys, Volume 45, Number 4 (August 2013)
http://dx.doi.org.databases.poly.edu/10.1145/2501654.2501663
http://dx.doi.org/10.1145/2501654.2501663
Botnets: A survey
Pages 378-403
http://www.sciencedirect.com/science/book/9780124071919
Intelligent Systems for Security Informatics
Christopher Yang, Wenji Mao, Xiaolong Zheng, and Hui Wang
Elsevier, 2013, ISBN 978-0-12-404702-0
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124047020
http://www.sciencedirect.com/science/book/9780124047020
Advanced Persistent Threat: Understanding the Danger and
How to Protect Your Organization
Eric Cole
Elsevier, 2013, ISBN 978-1-59749-949-1
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499491
http://www.sciencedirect.com/science/book/9781597499491
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Will Gragido, Daniel Molina, John Pirc, and Nick Selby
Elsevier, 2013, ISBN 978-1-59749-740-4
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597497404
http://www.sciencedirect.com/science/book/9781597497404
The Economics of Information Security and Privacy
Rainer Bohme (Editor)
Springer, 2013, ISBN 978-3-642-39498-0
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-39498-0
http://dx.doi.org/10.1007/978-3-642-39498-0
Economics of Information Security and Privacy III
Bruce Schneier (Editor)
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-36373-3
http://dx.doi.org/10.1007/978-3-642-36373-3
Information Hiding: First International Workshop
Ross Anderson (Editor)
Springer, 1996, ISBN 978-3-540-49589-5, LNCS 1174
http://dx.doi.org.databases.poly.edu/10.1007/3-540-61996-8
http://dx.doi.org/10.1007/3-540-61996-8
Information Hiding in Speech Signals for Secure Communication
Wu Zhijun
Elsevier, 2015, ISBN 978-0-12-801328-1
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128013281
http://www.sciencedirect.com/science/book/9780128013281
Wireless Mobile Internet Security, Second Edition
Man Young Rhee
Wiley, 2013, ISBN 9781118512920
http://dx.doi.org.databases.poly.edu/10.1002/9781118512920
http://dx.doi.org/10.1002/9781118512920
Trustworthy Execution on Mobile Devices
Amit Vasudevan, Jonathan M. McCune, and James Newsome
Springer, 2014, ISBN 978-1-4614-8190-4
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-8190-4
http://dx.doi.org/10.1007/978-1-4614-8190-4
Identifying back doors, attack points, and surveillance mechanisms in
iOS devices
Jonathan Zdziarski
Pages 3-19
Digital Investigation, Volume 11, Number 1 (March 2014)
http://dx.doi.org.databases.poly.edu/10.1016/j.diin.2014.01.001
http://dx.doi.org/10.1016/j.diin.2014.01.001
Signal Processing Approaches to Secure Physical Layer
Communications in Multi-Antenna Wireless Systems
Y.-W. Peter Hong, Pang-Chang Lan, and C.-C. Jay Kuo
Springer, 2014, ISBN 978-981-4560-14-6
http://dx.doi.org.databases.poly.edu/10.1007/978-981-4560-14-6
http://dx.doi.org/10.1007/978-981-4560-14-6
Security for Wireless Sensor Networks using Identity-Based
Cryptography
Harsh Kupwade Patil and Stephen A. Szygenda
CRC Press, 2013, ISBN 978-1-4398-6902-4
http://dx.doi.org.databases.poly.edu/10.1201/b13080
http://dx.doi.org/10.1201/b13080
Chapter 1 Introduction to UTM (Unified Threat Management)
http://dx.doi.org.databases.poly.edu/10.1016/B978-1-59-7497473.00001-6
http://dx.doi.org/10.1016/B978-1-59-749747-3.00001-6
UTM Security with Fortinet: Mastering FortiOS
Kenneth Tam, Martin H. Hoz Salvador, Ken McAlpine, Rick Basile,
Bruce Matsugu, and Josh More
Elsevier, 2013, ISBN 978-1-59749-747-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597497473#ancpt010
http://www.sciencedirect.com/science/book/9781597497473#ancpt01
0
Spyware and Adware
John Aycock
http://www.sciencedirect.com/science/book/9781597499583
Windows Server 2012 Security from End to Edge and Beyond:
Architecting, Designing, Planning, and Deploying
Windows Server 2012 Security Solutions
Thomas W. Shinder, Yuri Diogenes, and Debra Littlejohn Shinder
Elsevier, 2013, ISBN 978-1-59749-980-4
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499804
http://www.sciencedirect.com/science/book/9781597499804
http://dx.doi.org.databases.poly.edu/10.1016/B978-1-59749-9804.09985-4
http://dx.doi.org/10.1016/B978-1-59749-980-4.09985-4
Investigating Computer-Related Crime, Second Edition
Peter Stephenson and Keith Gilbert
CRC Press, 2013, ISBN 978-1-4200-0370-3
http://dx.doi.org.databases.poly.edu/10.1201/b14664
http://dx.doi.org/10.1201/b14664
Cybercrimes: A Multidisciplinary Analysis
Sumit Ghosh and Elliot Turrini
Springer, 2010, ISBN 978-3-642-13547-7
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-13547-7
http://dx.doi.org/10.1007/978-3-642-13547-7
Guest editorial: security requirements engineering:
past, present, future
Eric Dubois and Haralambos Mouratidis
Pages 1-5
Special Issue on RE09: Security Requirements Engineering
Requirements Engineering, Volume 15, Number 1 (March 2010)
http://dx.doi.org.databases.poly.edu/10.1007/s00766-009-0094-8
http://dx.doi.org/10.1007/s00766-009-0094-8
6. Information Security Applications Based on Biomolecular Systems
Guinevere Strack, Heather R. Lukarift, Glenn R. Johnson,
and Evgeny Katz
Pages 103-116
http://dx.doi.org.databases.poly.edu/10.1002/9783527645480.ch6
http://dx.doi.org/10.1002/9783527645480.ch6
Biomolecular Information Processing: From Logic Systems to
Smart Sensors and Actuators
Evgeny Katz (Editor)
Wiley, 2012, ISBN 9783527645480
http://dx.doi.org.databases.poly.edu/10.1002/9783527645480
http://dx.doi.org/10.1002/9783527645480
Cyber Security Policy Guidebook
Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs,
Jeffrey Schmidt, and Joseph Weiss
Wiley, 2012, ISBN 9781118241530
http://dx.doi.org.databases.poly.edu/10.1002/9781118241530
http://dx.doi.org/10.1002/9781118241530
Cryptographic Protocol: Security Analysis Based on Trusted Freshness
Ling Dong and Kefei Chen
Springer, 2012, ISBN 978-3-642-24073-7
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-24073-7
http://dx.doi.org/10.1007/978-3-642-24073-7
Engineering Secure Two-Party Computation Protocols: Design,
Optimization, and Applications of Efficient Secure Function Evaluation
Thomas Schneider
Springer, 2012, ISBN 978-3-642-30042-4
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-30042-4
http://dx.doi.org/10.1007/978-3-642-30042-4
Secure Multi-Party Non-Repudiation Protocols and Applications
Jose A. Onieva, Javier Lopez, and Jianying Zhou
Springer, 2009, ISBN 978-0-387-75630-1
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-75630-1
http://dx.doi.org/10.1007/978-0-387-75630-1
Advances in Intelligence and Security Informatics
Wenji Mao and Fei-Yue Wang
Elsevier, 2012, ISBN 978-0-12 397200-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
123972002
http://www.sciencedirect.com/science/book/9780123972002
Balanced Secure Scan: Partial Scan Approach for Secret Information
Protection
Michiko Inoue, Tomokazu Yoneda, Mineo Hasegawa,
and Hideo Fujiwara
Pages 99-108
Journal of Electronic Testing, Volume 27, Number 2 (April 2011)
http://dx.doi.org.databases.poly.edu/10.1007/s10836-011-5204-0
http://dx.doi.org/10.1007/s10836-011-5204-0
Building an Information Security Awareness Program:
Defending Against Social Engineering and Technical Threats
Bill Gardner and Valerie Thomas
Elsevier, 2014, ISBN 978-0-12-419967-5
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124199675
http://www.sciencedirect.com/science/book/9780124199675
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499514
http://www.sciencedirect.com/science/book/9781597499514
Client-Side Attacks and Defense
Robert Shimonski and Sean-Philip Oriyano
Elsevier, 2012, ISBN 978-1-59749-590-5
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597495905
http://www.sciencedirect.com/science/book/9781597495905
The Hackers Guide to OS X: Exploiting OS X from the Root Up
Rob Bathurst, Russ Rogers, and Alijohn Ghassemlouei
Elsevier, 2013, ISBN 978-1-59749-950-7
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499507
http://www.sciencedirect.com/science/book/9781597499507
Thors Microsoft Security Bible: A Collection of
Practical Security Techniques
Timothy Thor Mullen
Elsevier, 2011, ISBN 978-1-59749-572-1
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597495721
http://www.sciencedirect.com/science/book/9781597495721
Embedded Systems Security: Practical Methods for
Safe and Secure Software and Systems Development
David Kleidermacher and Mike Kleidermacher
Elsevier, 2012, ISBN 978-0-12-386886-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
123868862
http://www.sciencedirect.com/science/book/9780123868862
Security Basics for Computer Architects
Ruby B. Lee
Morgan & Claypool, 2013, ISBN 9781627051569
http://dx.doi.org.databases.poly.edu/10.2200/S00512ED1V01Y201305
CAC025
http://dx.doi.org/10.2200/S00512ED1V01Y201305CAC025
Introduction to Hardware Security and Trust
Mohammad Tehranipoor and Cliff Wang (Editors)
Springer, 2012, ISBN 9781-4419-8080-9
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4419-8080-9
http://dx.doi.org/10.1007/978-1-4419-8080-9
Integrated Circuit Authentication: Hardware Trojans
and Counterfeit Detection
Mohammad Tehranipoor, Hassan Salmani, and Xuehui Zhang
Springer, 2014, ISBN 978-3-319-00816-5
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-00816-5
http://dx.doi.org/10.1007/978-3-319-00816-5
A Survey of Security Issues in Hardware Virtualization
Gabor Pek, Levente Buttyan, and Boldizsar Bencsath
ACM Computing Surveys, Volume 45, Number 3 (June 2013)
http://dx.doi.org.databases.poly.edu/10.1145/2480741.2480757
http://dx.doi.org/10.1145/2480741.2480757
Physical Unclonable Functions in Theory and Practice
Christoph Bohm and Maximilian Hofer
Springer, 2013, ISBN 978-1-4614-5040-5
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-5040-5
http://dx.doi.org/10.1007/978-1-4614-5040-5
Secure Smart Embedded Devices, Platforms and Applications
Konstantinos Markantonakis and Keith Mayes (Editors)
Springer, 2014, ISBN 978-1-4614-7915-4
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-7915-4
http://dx.doi.org/10.1007/978-1-4614-7915-4
Advanced DPA Theory and Practice: Towards the Security
Limits of Secure Embedded Circuits
Eric Peeters
Springer, 2013, ISBN 978-1-4614-6783-0
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-6783-0
http://dx.doi.org/10.1007/978-1-4614-6783-0
Game Theory Meets Network Security and Privacy
Mohammad Hossein Manshael, Quanyan Zhu, Tansu Alpcan,
Tamer Basar, and Jan-Pierre Hubaux
ACM Computer Surveys, Volume 45, Number 3 (June 2013)
http://dx.doi.org.databases.poly.edu/10.1145/2480741.2480742
http://dx.doi.org/10.1145/2480741.2480742
Security and Game Theory: Algorithms, Deployed Systems,
Lessons Learned
Milind Tambe
Cambridge University Press, 2012, ISBN 9780511973031
http://dx.doi.org.databases.poly.edu/10.1017/CBO9780511973031
http://dx.doi.org/10.1017/CBO9780511973031
Insider Threat: Protecting the Enterprise from Sabotage,
Spying, and Theft
Eric Cole and Sandra Ring
Internet of Things
IBM Video:
http://www.ibm.com/smarterplanet/us/en/overview/article/iot_video.
html
That Internet of Things Thing
Kevin Ashton (June 22, 2009)
http://www.rfidjournal.com/article/view/4986
Internet of Things: Hype or Reality?
Anders Gustafsson (January 14, 2013)
http://allthingsd.com/20130114/internet-of-things-hype-or-reality/
The Internet of Things Has Arrived And So Have Massive Security
Issues
Andrew Rose (January 11, 2013)
http://www.wired.com/opinion/2013/01/securing-the-internet-ofthings/
IoT Hub:
http://www.internet-of-things.eu/
Wikipedia:
http://en.wikipedia.org/wiki/Internet_of_Things
Computer Networks,
Volume 57, Number 10 (July 2013)
Pages 2266-2279
http://dx.doi.org.databases.poly.edu/10.1016/j.comnet.2012.12.018
http://dx.doi.org/10.1016/j.comnet.2012.12.018
Security and Privacy in Cloud Computing: A Survey
Mahesh U. Shankarwar and Ambika V. Pawar
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-12012-6_1
http://dx.doi.org/10.1007/978-3-319-12012-6_1
Proceedings of the 3rd International Conference on
Frontiers of Intelligent Computing:
Theory and Applications (FICTA) 2014, Volume 2
Suresh Chandra Satapathy, Bhabendra Narayan Biswal,
Siba K. Ugata, and J.K. Mandal (Editors)
Springer, 2015, ISBN 978-3-319-12012-6
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-12012-6
http://dx.doi.org/10.1007/978-3-319-12012-6
Information Assurance and Security Education and Training:
WISE 8, WISE 7, and WISE 6 Revised Selected Papers
Ronald C. Dodge Jr. and Lynn Futcher (Editors)
Springer, 2013, ISBN 978-3-642-39377-8
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-39377-8
http://dx.doi.org/10.1007/978-3-642-39377-8
Rethinking computing insanity, practice and research
Gene Spafford (December 15, 2008)
http://www.cerias.purdue.edu/site/blog/post/rethinking_computing_i
nsanity_practice_and_research/
Perfect Password: Selection, Protection, Authentication
Mark Burnett and Dave Kleiman
Top of Shelf
Top of Section
=======================================
Biometrics ============================
Encyclopedia of Biometrics
Stan Z. Lee (Editor)
Springer, 2009, ISBN 978-0-387-73003-5
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-73003-5
http://dx.doi.org/10.1007/978-0-387-73003-5
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4419-5906-5
http://dx.doi.org/10.1007/978-1-4419-5906-5
Introduction to Biometrics
Anil K. Jain, Arun A. Ross, and Karthik Nandakumar
Springer, 2011, ISBN 978-0-387-77325-4
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-77326-1
http://dx.doi.org/10.1007/978-0-387-77326-1
Biometrics in the New World: The Cloud, Mobile Technology
and Pervasive Identity
Julian Ashbourn
Springer, 2014, ISBN 978-3-319-04159-9
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-04159-9
http://dx.doi.org/10.1007/978-3-319-04159-9
Guide to Biometrics for Large-Scale Systems: Technological,
Operational, and User-Related Factors
Julian Ashbourn
Springer, 2011, ISBN 978-0-85729-467-8
http://dx.doi.org.databases.poly.edu/10.1007/978-0-85729-467-8
http://dx.doi.org/10.1007/978-0-85729-467-8
Touchless Palmprint Recognition Systems
Angelo Genovese, Vincenzo Piuri, and Fabio Scotti
Springer, 2014, ISBN 978-3-319-10365-5
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-10365-5
http://dx.doi.org/10.1007/978-3-319-10365-5
Implementation and evaluation of a remote authentication
system using touchless palmprint recognition
Haruki Ota, Shoichiro Aoyama, Ryu Watanabe, Koichi Ito,
http://dx.doi.org.databases.poly.edu/10.1007/978-0-85729-994-9_13
http://dx.doi.org/10.1007/978-0-85729-994-9_13
Computer Analysis of Human Behavior
Albert Ali Salah and Theo Gevers (Editors)
Springer, 2011, ISBN 978-0-85729-994-9
http://dx.doi.org.databases.poly.edu/10.1007/978-0-85729-994-9
http://dx.doi.org/10.1007/978-0-85729-994-9
Enhancing Information Security and Privacy by
Combining Biometrics with Cryptography
Sanjay G. Kanade, Dijana Petrovska-Delacretaz,
and Bernadette Dorizzi
Morgan & Claypool, 2012, ISBN 9781608458486
http://dx.doi.org.databases.poly.edu/10.2200/S00417ED1V01Y201205
SPT003
http://dx.doi.org/10.2200/S00417ED1V01Y201205SPT003
Security and Privacy in Biometrics
Patrizio Campisi (Editor)
Springer, 2013, ISBN 978-1-4471-5230-9
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4471-5230-9
http://dx.doi.org/10.1007/978-1-4471-5230-9
Top of Shelf
Top of Section
=======================================
http://dx.doi.org/10.1145/2659899
Communications of the ACM, Volume 57, Number 10 (October 2014)
Top of Shelf
Top of Section
=======================================
Digital Forensics ========================
Digital Forensics
Simson L. Garfinkel
American Scientist, Volume 100, Number 5 (September-October 2013)
http://www.americanscientist.org/issues/feature/2013/5/digitalforensics
Python Forensics: A Workbench for Inventing and Sharing
Digital Forensic Technology
Chet Hosmer
Elsevier, 2014, ISBN 978-0-12-418676-7
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124186767
http://www.sciencedirect.com/science/book/9780124186767
Unified Communications Forensics: Anatomy of Common UC Attacks
Nicholas Grant & Joseph W Shaw II
Elsevier, 2014, ISBN 978-1-59749-992-7
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499927
http://www.sciencedirect.com/science/book/9781597499927
Investigating Internet Crimes: An Introduction to
Solving Crimes in Cyberspace
Todd G. Shipley and Art Bowker
Elsevier, 2014, ISBN 978-0-12-407817-8
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124078178
http://www.sciencedirect.com/science/book/9780124078178
Cloud Storage Forensics
Darren Quick, Ben Martini, and Kim-Kwang Raymond Choo
Elsevier, 2014, ISBN 978-0-12-419970-5
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124199705
http://www.sciencedirect.com/science/book/9780124199705
CyberForensics: Understanding Information Security Investigations
Jennifer Bayuk (Editor)
Springer, 2010, ISBN 978-1-60761-772-3
http://dx.doi.org.databases.poly.edu/10.1007/978-1-60761-772-3
http://dx.doi.org/10.1007/978-1-60761-772-3
Placing the Suspect Behind the Keyboard: Using Digital Forensics
and Investigative Techniques to Identify Cybercrime Suspects
Brett Shavers
Elsevier, 2013, ISBN 978-1-59749-985-9
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499859
http://www.sciencedirect.com/science/book/9781597499859
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597496438
http://www.sciencedirect.com/science/book/9781597496438
10 Digital evolution: history, challenges and future
directions for the digital and multimedia sciences section
David W. Baker et al.
Pages 252-291
http://dx.doi.org.databases.poly.edu/10.1002/9781118373880.ch10
http://dx.doi.org/10.1002/9781118373880.ch10
http://dx.doi.org/10.1007/978-1-4419-5803-7
Linux Malware Incident Response: A Practitioners Guide to
Forensic Collection and Examination of Volatile Data
Cameron H. Malin, Foghan Casey, and James A. Aquilina
Elsevier, 2013, ISBN 978-0-12-409507-6
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124095076
http://www.sciencedirect.com/science/book/9780124095076
Malware Forensic Field Guide for Windows Systems
Cameron Malin, Eoghan Casey, and James Aquilina
Elsevier, 2012, ISBN 978-1-59749-472-4
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597494724
http://www.sciencedirect.com/science/book/9781597494724
Windows Registry Forensics: Advanced Digital Forensic Analysis
of the Windows Registry
Harlan Carvey
Elsevier, 2011, ISBN 978-1-59749-580-6
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597495806
http://www.sciencedirect.com/science/book/9781597495806
Android Malware
Xuxian Jiang and Yajin Zhou
Springer, 2013, ISBN 978-1-4614-7394-7
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-7394-7
http://dx.doi.org/10.1007/978-1-4614-7394-7
Automatic Malware Analysis: An Emulator Based Approach
http://www.sciencedirect.com/science/book/9781597496599
Logging and Log Management: The Authoritative Guide to
Understanding the Concepts Surrounding Logging and Log
Management
Anton A. Chuvakin, Kevin J. Schmidt, and Christopher Phillips
Elsevier, 2013, ISBN 978-1-59749-635-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597496353
http://www.sciencedirect.com/science/book/9781597496353
Virtualization and Forensics: A Digital Forensic Investigators Guide to
Virtual Environments
Diane Barrett and Gregory Kipper
Elsevier, 2010, ISBN 978-1-59749-557-8
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597495578
http://www.sciencedirect.com/science/book/9781597495578
Top of Shelf
Top of Section
=======================================
Risk
=================================
http://dx.doi.org.databases.poly.edu/10.1007/978-3-658-01115-4
http://dx.doi.org/10.1007/978-3-658-01115-4
Measuring and Managing Information Risk: A FAIR Approach
Jack Freund and Jack Jones
Elsevier, 2015, ISBN 978-0-12-420231-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124202313
http://www.sciencedirect.com/science/book/9780124202313
Risk Management Framework:
A Lab-Based Approach to Securing Information Systems
James Broad
Elsevier, 2013, ISBN 978-1-59749-995-8
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499958
http://www.sciencedirect.com/science/book/9781597499958
FISMA and the Risk Management Framework:
The New Practice of Federal Cyber Security
Stephen D. Gantz and Daniel R. Philpott
Elsevier, 2013, ISBN 978-1-59749-641-4
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597496414
http://www.sciencedirect.com/science/book/9781597496414
FISMA Compliance Handbook
Laura P. Taylor
Elsevier, 2013, ISBN 978-0-12-405871-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124058712
http://www.sciencedirect.com/science/book/9780124058712
Top of Shelf
Top of Section
=======================================
Trust =================================
Trust, Computing, and Society
Richard H.R. Harper (Editor)
Cambridge University Press, 2014, ISBN 9781139828567
http://dx.doi.org/10.1017/CBO9781139828567
Top of Shelf
Top of Section
=======================================
Professional Certifications ================
CISSP (Certified Information Systems Security Professional)
Certification
https://www.isc2.org/cissp/default.aspx
Wikipedia:
http://en.wikipedia.org/wiki/Certified_Information_Systems_Security_
Professional
CSSLP (Certified Secure Software Lifecycle Professional) Certification
https://www.isc2.org/csslp/Default.aspx
Certification Programs
https://www.isc2.org/credentials/default.aspx
International Information Systems Security Certification Consortium
https://www.isc2.org/
Wikipedia: http://en.wikipedia.org/wiki/(ISC)%C2%B2
Eleventh Hour CISSP Study Guide, Second Edition
Eric Conrad, Seth Misenar, and Joshua Feldman
Elsevier, 2014, ISBN 978-0-12-417142-8
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124171428
http://www.sciencedirect.com/science/book/9780124171428
Top of Shelf
Top of Section
=======================================
Programming ==========================
Foundations of Security: What Every Programmer Needs to Know
Neil Daswani, Christoph Kern, and Anita Kesavan
Springer, 2007, ISBN 978-1-4302-0377-3
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4302-0377-3
http://dx.doi.org/10.1007/978-1-4302-0377-3
Violent Python: A Cookbook for Hackers, Forensic Analysts,
Penetration Testers and Security Engineers
TJ. OConnor
Elsevier, 2013, ISBN 978-1-59749-957-6
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499576
http://www.sciencedirect.com/science/book/9781597499576
Gray Hat Python: Python Programming for Hackers and Reverse
Engineers
Justin Seitz
No Starch Press, 2009, ISBN 9781593271923
**** Login to books24X7 digital library
**** and search on the ISBN number above
************************************
24 Deadly Sins of Software Security: Programming Flaws
and How to Fix Them
Michael Howard and David LeBlanc
McGraw-Hill, 2010, ISBN 9780071626750
http://www.accessengineeringlibrary.com.databases.poly.edu/browse/
24-deadly-sins-of-software-security-programming-flaws-and-how-tofix-them
http://www.accessengineeringlibrary.com/browse/24-deadly-sins-ofsoftware-security-programming-flaws-and-how-to-fix-them
Cryptography in C and C++
Michael Welschenbach
Springer, 2005, ISBN 978-1-4302-0026-0
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4302-0026-0
http://dx.doi.org/10.1007/978-1-4302-0026-0
Coding for Penetration Testers: Building Better Tools
Jason Andress and Ryan Linn
Elsevier, 2012, ISBN 978-1-59749-729-9
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597497299
http://www.sciencedirect.com/science/book/9781597497299
Web Application Obfuscation
Mario Heiderich, Eduardo Alberto Vela Nava,
Gareth Heyes, and David Lindsay
Elsevier, 2011, ISN 978-1-59749-604-9
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597496049
http://www.sciencedirect.com/science/book/9781597496049
Introduction to Reliable and Secure Distributed Programming,
Second Edition
Christian Cachin, Rachid Guerraoui, and Luis Rodrigues
Springer, 2011, ISBN 978-3-642-15260-3
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-15260-3
http://dx.doi.org/10.1007/978-3-642-15260-3
Advanced API Security: Securing APIs with OAuth 2.0,
Top of Shelf
Top of Section
=======================================
Mathematics for Cryptography ============
Mathematics of Public Key Cryptography
Steven D. Galbraith
Cambridge University Press, 2012, ISBN 9781139013926
http://dx.doi.org.databases.poly.edu/10.1017/CBO9781139012843
http://dx.doi.org/10.1017/CBO9781139012843
Functional Encryption: A New Vision for Public-Key Cryptography
Dan Boneh, Amit Sahai, and Brent Waters
Communications of the ACM,
http://dx.doi.org/10.1007/978-3-8348-1990-1
Codes: An Introduction to Information Communication
and Cryptography
N.L. Biggs
Springer, 2008, ISBN 978-1-84800-273-9
http://dx.doi.org.databases.poly.edu/10.1007/978-1-84800-273-9
http://dx.doi.org/10.1007/978-1-84800-273-9
Codes and Turbo Codes
Claude Berrou
Springer, 2010, ISBN 978-2-8178-0039-4
http://dx.doi.org.databases.poly.edu/10.1007/978-2-8178-0039-4
http://dx.doi.org/10.1007/978-2-8178-0039-4
A Students Guide to Coding and Information Theory
Stefan M. Moser and Po-Ning Chen
Cambridge University Press, 2012, ISBN 9781139059534
http://dx.doi.org.databases.poly.edu/10.1017/CBO9781139059534
http://ebooks.cambridge.org/ebook.jsf?bid=CBO9781139059534
Rubiks for Cryptographers
Pages 733-739
Christophe Petit and Jean-Jacques Quisquater
http://www.ams.org/notices/201306/rnoti-p733.pdf
Notices of the AMS, Volume 60, Number 6 (June/July 2013)
http://www.ams.org/notices/201306/
A Mathematical Theory of Communication
C. E. Shannon
Pages 379-423
The Bell System Technical Journal, Volume 27, Number 3 (July 1948)
http://www.alcatel-lucent.com/bstj/vol27-1948/articles/bstj27-3379.pdf
Top of Shelf
Top of Section
=======================================
Cryptography ==========================
Encyclopedia of Cryptography and Security
Henk C.A. van Tilborg and Sushil Jajodia (Editors)
Springer, 2011, ISBN 978-1-4419-5906-5
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4419-5906-5
http://dx.doi.org/10.1007/978-1-4419-5906-5
Cryptography
Wikipedia:
http://en.wikipedia.org/wiki/Cryptography
http://dx.doi.org/10.1017/CBO9780511721656
Algebraic Cryptanalysis
Gregory V. Bard
Springer, 2009, ISBN 978-0-387-88757-9
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-88757-9
http://dx.doi.org/10.1007/978-0-387-88757-9
Identity-Based Encryption
Sanjit Chatterjee and Palash Sarkar
Springer, 2011, ISBN 978-1-4419-9383-0
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4419-9383-0
http://dx.doi.org/10.1007/978-1-4419-9383-0
Adaptive Cryptographic Access Control
Anne V.D.M. Kayem, Selim G. Akl, and Patrick Martin
Springer, 2010, ISBN 978-1-4419-6655-1
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4419-6655-1
http://dx.doi.org/10.1007/978-1-4419-6655-1
Practical Signcryption
Alexander W. Dent and Yuliang Zheng (Editors)
Springer, 2010, ISBN 978-3-540-89411-7
http://dx.doi.org.databases.poly.edu/10.1007/978-3-540-89411-7
http://dx.doi.org/10.1007/978-3-540-89411-7
Cryptography: all-out attacks or how to attack cryptography
without intensive cryptanalysis
Pages 207-237
Jean-Baptiste Bedrune, Eric Filiol, and Frederic Raynal
Journal in Computer Virology, Volume 6, Number 3 (August 2010)
http://dx.doi.org.databases.poly.edu/10.1007/s11416-008-0117-x
http://dx.doi.org/10.1007/s11416-008-0117-x
Top of Shelf
Top of Section
=======================================
Top of Shelf
Top of Section
=======================================
http://www.youtube.com/watch?v=X2W8YEppLbI&feature=list_other
&playnext=1&list=SPC73BF951C580030A
A Fully Homomorphic Scheme
Ph.D. Dissertation, Department of Computer Science, Stanford
University (September 2009)
Craig Gentry
http://crypto.stanford.edu/craig/
Fully Homomorphic Encryption Using Ideal Lattices
Proceedings of the 41st Annual ACM Symposium on Theory of
Computing
(STOC 2009)
Craig Gentry Pages 169-178
http://dx.doi.org.databases.poly.edu/10.1145/1536414.1536440
http://dx.doi.org/10.1145/1536414.1536440
Implementing Gentrys Fully-Homomorphic Encryption Scheme
Craig Gentry and Shai Halevi
Pages 129-148
http://www.springerlink.com.databases.poly.edu/content/961007012q
743401/
http://www.springerlink.com/content/961007012q743401/
Advances in Cryptology EUROCRYPT 2011
Kenneth G. Paterson (Editor)
Springer, 2011, ISBN 978-3-642-20464-7, LNCS 6632
http://www.springerlink.com.databases.poly.edu/content/978-3-64220464-7/contents/
http://www.springerlink.com/content/978-3-642-20464-7/contents/
Probabilistic Encryption & How To Play Mental Poker
Keeping Secret All Partial Information
http://dx.doi.org/10.1007/978-3-642-13190-5_2
Advances in Cryptology EUROCRYPT 2010
Henri Gilbert (Editor)
Springer, 2010, ISBN 978-3-642-13190-5, LNCS 6110
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-13190-5
http://dx.doi.org/10.1007/978-3-642-13190-5
Fully Homomorphic Encryption with Relatively
Small Key and Ciphertext Sizes
Nigel P. Smart and Frederick Vercauteren
Pages 420-443
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-13013-7_25
http://dx.doi.org/10.1007/978-3-642-13013-7_25
Public Key Cryptography PKC 2010
Phong Q. Nguyen and David Pointcheval (Editors)
Springer, 2010, ISBN 978-3-642-13012-0, LNCS 6056
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-13013-7
http://dx.doi.org/10.1007/978-3-642-13013-7
Home Page of Nigel Smart
(Contains an online version of his book
Cryptography, An Introduction: Third Edition)
http://www.cs.bris.ac.uk/~nigel/
Computing Blindfolded: New Developments in Fully
Homomorphic Encryption
Vinod Vaikuntanathan
http://www.cs.toronto.edu/~vinodv/FHE-focs-survey.pdf
Homepage of Vinod Vaikuntanathan
http://www.cs.toronto.edu/~vinodv/
Homomorphic Encryption Tutorial (Crypto 2011)
Shai Halevi, IBM Research
http://www.youtube.com/watch?v=jIWOR2bGC7c
http://www.youtube.com/watch?v=huLGjBpj3Os
Part 1
Part 2
Part 1
Part 2
Top of Shelf
Top of Section
=======================================
Algorithms Unplugged
B. Vocking et al. (Editors)
Springer, 2011, ISBN 978-3-642-15328-0
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-15328-0
http://dx.doi.org/10.1007/978-3-642-15328-0
Top of Shelf
Top of Section
=======================================
Privacy ===============================
How Should We Think about Privacy?
Jaron Lanier
Pages 64-71
Scientific American, Volume 309, Number 5 (November 2013)
http://dx.doi.org.databases.poly.edu/10.1038/scientificamerican111364
http://dx.doi.org/10.1038/scientificamerican1113-64
Home page of Jaron Lanier
http://www.jaronlanier.com/
Wikipedia:
http://en.wikipedia.org/wiki/Jaron_Lanier
APF 2014
Bart Prenel and Demosthenes Ikonomou (Editors)
Springer, 2014, ISBN 978-3-319-06749-0, LNCS 8450
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-06749-0
http://dx.doi.org/10.1007/978-3-319-06749-0
Privacy, Big Data, and the Public Good: Frameworks for Engagement
Julia lane, Victoria Stodden, Stefan Bender, and Helen Neissenbaum
(Editors)
Cambridge University Press, 2014, ISBN 9781107590205
http://dx.doi.org.databases.poly.edu/10.1017/CBO9781107590205
http://dx.doi.org/10.1017/CBO9781107590205
Facebook Nation: Total Information Awareness
Newton Lee
Springer, 2013, ISBN 978-1-4614-5308-6
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-5308-6
http://dx.doi.org/10.1007/978-1-4614-5308-6
The Basics of Digital Privacy: Simple Tools to Protect Your
Personal Information and Your Identity Online
Denny Cherry
Elsevier, 2014, ISBN 978-0-12-800011-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128000113
http://www.sciencedirect.com/science/book/9780128000113
Unauthorized Access: The Crisis in Online Privacy and Security
Robert H. Sloan and Richard Warner
CRC Press, 2014, ISBN 978-1-4398-3014-7
http://dx.doi.org.databases.poly.edu/10.1201/b15148
http://dx.doi.org/10.1201/b15148
Electronic Identity
Norberto Nuno Gomes de Andrade, Lisha Chen-Wilson,
David Argles, Gary Wills, and Michele Schiano di Zenise
Springer, 2014, ISBN 978-1-4471-6449-4
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4471-6449-4
http://dx.doi.org/10.1007/978-1-4471-6449-4
Emerging Pervasive Information and Communication Technologies
(PICT): Ethical Challenges, Opportunities and Safeguards
Kenneth D. Pimple (Editor)
Springer, 2014, ISBN 978-94-007-6833-8
http://dx.doi.org.databases.poly.edu/10.1007/978-94-007-6833-8
http://dx.doi.org/10.1007/978-94-007-6833-8
Anonymization
Rolf H. Weber and Ulrike I. Heinrich
Springer, 2012, ISBN 978-1-4471-4066-5
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4471-4066-5
http://dx.doi.org/10.1007/978-1-4471-4066-5
Practical Anonymity: Hiding in Plain Sight Online
Peter Loshin
Elsevier, 2013, ISBN 978-0-12-410404-4
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124104044
http://www.sciencedirect.com/science/book/9780124104044
On Anonymity in an Electronic Society: A Survey of
Anonymous Communication Systems
Matthew Edman and Bulent Yener
ACM Computing Surveys, Volume 42, Number 1 (December 2009)
http://dx.doi.org.databases.poly.edu/10.1145/1592451.1592456
http://dx.doi.org/10.1145/1592451.1592456
SmartData: Privacy Meets Evolutionary Robotics
Inman Harvey, Ann Cavoukian, George Tomko, Don Borett,
Hon Kwan, and Dimitrios Hatzinalos (Editors)
Springer, 2013, ISBN 978-1-4614-6409-9
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-6409-9
http://dx.doi.org/10.1007/978-1-4614-6409-9
Security and Privacy for Augmented Reality Systems
Franciska Roesner, Tadayoshi Kohno, and David Molnar
Communications of the ACO, Volume 57, Number 4 (April 2014)
http://dx.doi.org.databases.poly.edu/10.1145/2580723.2580730
http://dx.doi.org/10.1145/2580723.2580730
Chapter 13 Privacy for Reporters of Human Rights Abuses:
Identity and Anonymity in Mobile Networks
Leonardo Martucci and Simone Fischer-Hubner
Pages 181-199
http://dx.doi.org.databases.poly.edu/10.1007/978-94-007-1384-0_13
http://dx.doi.org/10.1007/978-94-007-1384-0_13
Mobile Technologies for Conflict Management: Online
Dispute Resolution, Governance, Participation
Marta Poblet (Editor)
Springer, 2011, ISBN 978-94-007-1384-0
http://dx.doi.org.databases.poly.edu/10.1007/978-94-007-1384-0
http://dx.doi.org/10.1007/978-94-007-1384-0
Privacy in Social Networks
Elena Zheleva, Evimaria Terzi, and Lise Getoor
Morgan & Claypool, 2012, ISBN 9781608458639
http://dx.doi.org.databases.poly.edu/10.2200/S00408ED1V01Y201203
DMK004
http://dx.doi.org/10.2200/S00408ED1V01Y201203DMK004
Privacy Online: Perspectives on Privacy and Self-Disclosure
in the Social Web
Sabine Trepte and Leonard Reinecke (Editors)
Springer, 2011, ISBN 978-3-642-21521-6
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-21521-6
http://dx.doi.org/10.1007/978-3-642-21521-6
Special Issue on Digital Privacy: theory, policies and technologies
Travis D. Breaux, Annie I. Anton, Stefanos Gritzalis, and John
Mylopoulos
Requirements Engineering, Volume 16, Number 1 (March 2011)
http://link.springer.com.databases.poly.edu/journal/766/16/1/
http://link.springer.com/journal/766/16/1/
Privacy and Identity Management for Life
Jan Camemisch, Simone Fischer-Hubner, and Kai Rannenberg (Editors)
Springer, 2011, ISBN 978-3-642-20317-6
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-20317-6
http://dx.doi.org/10.1007/978-3-642-20317-6
Special Issue on Trust and Privacy in Electronic Commerce
Peter Herrmann and Mozhgan Tavakolifard
Electronic Commerce Research,
Volume 10, Numbers 3-4 (December 2010)
http://link.springer.com.databases.poly.edu/journal/10660/10/3/
http://link.springer.com/journal/10660/10/3/
Quo vadis, data privacy?
Johannes Gehrke
Blavatnik Awards for Young Scientists 2011
Annals of the New York Academy of Sciences,
Volume 1260, Number 1 (July 2012)
http://dx.doi.org.databases.poly.edu/10.1111/j.17496632.2012.06630.x
http://dx.doi.org/10.1111/j.1749-6632.2012.06630.x
Privacy and Technologies of Identity: A Cross-Disciplinary
Conversation
Katherine J. Strandburg and Daniela Stan Raicu
Springer, 2006, ISBN 978-0-387-28222-0
http://dx.doi.org.databases.poly.edu/10.1007/0-387-28222-X
http://dx.doi.org/10.1007/0-387-28222-X
Deeplinks Blog posts about Biometrics
https://www.eff.org/deeplinks/biometrics
Deeplinks Topics
https://www.eff.org/deeplinks/archives
Electronic Frontier Foundation
https://www.eff.org/
Top of Shelf
Top of Section
=======================================
Data Privacy ===========================
Data privacy
Vicenc Torra and Guillermo Navarro-Arribas
Wiley Interdisciplinary Reviews: Data Mining and Knowledge
Discovery,
Volume 4, Number 4 (July/August 2014) Pages 269-340
http://dx.doi.org.databases.poly.edu/10.1002/widm.1129
http://dx.doi.org/10.1002/widm.1129
Chapter 2 A General Survey of Privacy-Preserving Data Mining:
Models and Algorithms
Charu C. Aggarwal and Philip S. Yu
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-70992-5_2
http://dx.doi.org/10.1007/978-0-387-70992-5_2
Privacy-Preserving Data Mining: Models and Algorithms
Charu C. Aggarwal and Philip S. Yu (Editors)
Springer, 2008, ISBN 978-0-387-70992-5
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-70992-5
http://dx.doi.org/10.1007/978-0-387-70992-5
Home Page of Charu C. Aggarwal
http://charuaggarwal.net/
Privacy-Preserving Data Mining
Jaideep Vaidya, Chris Clifton, and Michael Zhu
Springer, 2006, ISBN 978-0-387-29489-6
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-29489-6
http://dx.doi.org/10.1007/978-0-387-29489-6
Statistical Confidentiality: Principles and Practice
George T. Duncan, Mark Elliot, Juan-Jose Salazar-Gonzalez
Springer, 2011, ISBN 978-1-4419-7802-8
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4419-7802-8
http://dx.doi.org/10.1007/978-1-4419-7802-8
Elements of Statistical Disclosure Control
Leon Willenborg and Ton de Waal
Springer, 2001, ISBN 978-1-4613-0121-9
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4613-0121-9
http://dx.doi.org/10.1007/978-1-4613-0121-9
Chapter 5 Disclosure Control Methods and
Information Loss for Microdata
Josep Domingo-Ferrer and Vicenc Torra
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.91.1046
Confidentiality, Disclosure, and Data Access: Theory and Practical
Applications for Statistical Agencies
P. Doyle, J. Lane, J. Theeuwes, and L. Zayatz (Editors)
Elsevier, 2001, ISBN 978-0444507617
Information Fusion in the Context of Data Privacy
Pages 235-244
Guillermo Navarro-Arribas and Vicenc Torra (editors)
Information Fusion, Volume 13, Number 4 (October 2012)
http://www.sciencedirect.com.databases.poly.edu/science/article/pii/S
1566253512000024
http://www.sciencedirect.com/science/article/pii/S1566253512000024
The Dining Cryptographers Problem:
Unconditional Sender and Recipient Untraceability
David Chaum
Pages 65-75
Journal of Cryptology, Volume 1, Number 1 (January 1988)
http://dx.doi.org.databases.poly.edu/10.1007/BF00206326
http://dx.doi.org/10.1007/BF00206326
Dining cryptographers problem
Wikipedia:
http://en.wikipedia.org/wiki/Dining_cryptographers_problem
Untraceable Electronic Mail, Return Addresses,
and Digital Pseudonyms
David L. Chaum
Pages 84-90
Communications of the ACM, Volume 24, Number 2 (February 1981)
http://dx.doi.org.databases.poly.edu/10.1145/358549.358563
http://dx.doi.org/10.1145/358549.358563
David Chaum
Wikipedia:
http://en.wikipedia.org/wiki/David_Chaum
Differential Privacy
Cynthia Dwork
Pages 1-12
http://dx.doi.org.databases.poly.edu/10.1007/11787006_1
http://dx.doi.org/10.1007/11787006_1
Automata, Languages and Programming:
33rd International Colloquium, ICALP 2006; Proceedings, Part II
Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener
(Editors)
Springer, 2006, ISBN 978-3-540-35908-1, LNCS 4052
http://dx.doi.org.databases.poly.edu/10.1007/11787006
http://dx.doi.org/10.1007/11787006
Cynthia Dwork
Wikipedia:
http://en.wikipedia.org/wiki/Cynthia_Dwork
DBLP:
http://www.informatik.unitrier.de/~ley/pers/hd/d/Dwork:Cynthia
Privacy Challenges in RFID
Gildas Avoine
Pages 1-8
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-28879-1_1
http://dx.doi.org/10.1007/978-3-642-28879-1_1
Data Privacy Management and Autonomous Spontaneus Security:
DPM 2011 and SETOP 2011, Revised Selected Papers
Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas,
Nora Cuppens-Boulahia, and Sabrina de Capitani di Vimercati (Editors)
Springer, 2012, ISBN 978-3-642-28879-1, LNCS 7122
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-28879-1
http://dx.doi.org/10.1007/978-3-642-28879-1
Advanced Research in Data Privacy
Guillermo Navarro-Arribas and Vicenc Torra (Editors)
Springer, 2015, ISBN 978-3-319-09885-2
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-09885-2
http://dx.doi.org/10.1007/978-3-319-09885-2
Top of Shelf
Top of Section
=======================================
Security Science ========================
Security Science: The Theory and Practice of Security
Clifton L Smith and David J Brooks
Elsevier, 2013, ISBN 978-0-12-394436-8
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
123944368
http://www.sciencedirect.com/science/book/9780123944368
http://dx.doi.org/10.1007/978-3-319-11227-5
Electronic Access Control
Thomas Norman
Elsevier, 2012, ISBN 978-0-12-382028-0
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
123820280
http://www.sciencedirect.com/science/book/9780123820280
Applied Crime Analysis: A Social Science Approach to
Understanding Crime, Criminals, and Victims
Wayne Petherick
Elsevier, 2015, ISBN 978-0-323-29460-7
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
323294607
http://www.sciencedirect.com/science/book/9780323294607
Misleading DNA Evidence: Reasons for Miscarriages of Justice
Peter Gill
Elsevier, 2014, ISBN 978-0-12-417214-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124172142
http://www.sciencedirect.com/science/book/9780124172142
Security Careers: Skills, Compensation, and Career Paths; Third Edition
Stephen W. Walker and James E. Fushee
Elsevier, 2014, ISBN 978-0-12-800104-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128001042
http://www.sciencedirect.com/science/book/9780128001042
Risk Analysis and the Security Survey, Fourth Edition
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
123820129
http://www.sciencedirect.com/science/book/9780123820129
Security Consulting, Fourth Edition
Charles A. Sennewald
Elsevier, 2013, ISBN 978-0-12-398500-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
123985002
http://www.sciencedirect.com/science/book/9780123985002
From the Files of a Security Expert Witness
Charles A. Sennewald
Elsevier, 2014, ISBN 978-0-12-411625-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124116252
http://www.sciencedirect.com/science/book/9780124116252
Effective Physical Security, Fourth Edition
Lawrence J. Fennelly
Elsevier, 2013, ISBN 978-0-12-415892-4
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124158924
http://www.sciencedirect.com/science/book/9780124158924
CCTV: From Lights to Pixels, Third Edition
Vlado Damjanovski
Elsevier, 2014, ISBN 978-0-12-404557-6
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124045576
http://www.sciencedirect.com/science/book/9780124045576
Top of Shelf
Top of Section
=======================================
Additional Web Resources ===============
Blog of Gene Spafford
https://www.cerias.purdue.edu/site/blog/author/spaf/
Krebs on Security in-depth security news and investigation
http://krebsonsecurity.com/
Schneier on Security a blog covering security and security
technology
http://www.schneier.com/
Questions & Answers Cryptography @ Stack Exchange
http://crypto.stackexchange.com/
Cryptology ePrint Archive
http://eprint.iacr.org/
Top of Shelf
Top of Section
=======================================