Anderson, R.: Security Engineering, John Wiley, 2001 |
Bishop, M.: Computer Security: Art and Science, Addison Wesley, 2002 |
Buttyan, L. and Hubaux, J. - P.: Security and Cooperation in Wireless N etworks, Cambridge University Press, 2008 |
Defense Advanced Research Projects Agency ( DARPA ), HIGH PERFORMANCE MICROCHIP SUPPLY , www.cra.org/govaffairs/images/2005 - 02 - HPMS_Report_Final.pd |
Denning, D.E.: Cryptography and Data Security, Addison Wesley, 1983 |
Eckert, C.: IT - Sicherheit, 3.Aufl., Oldenbourg - Verlag, 2004 |
Edward Amoroso. Fundamentals of Computer Security Technology. Prentice Hall PTR, 1994 |
Garfinkel, S.; Spafford, G.: Practical Unix and Internet Security, 3rd ed. O’Reilly, 2004 |
Garfinkel, S.; Spafford, G.: Practical Unix and Internet Security, 3rd ed. O’Reilly, 2004 |
Garvey P.R.: Analytical Methods for Risk Management: A Systems Engineering Perspective, ser. Statistics: a Series of Textbooks and Monographs. Boca Raton, FL, USA: Chapman and Hall/CRC, 2009 |
Gollmann, D.: Computer Security, John Wiley & Sons, 1999 |
Howard,M.; LeBlanc,D.: Writing Sec ure Code, Microsoft Press, 2001 |
Ken Dunham. Mobile Malware Attacks and Defense (Paperback). Syngress, November 2008 |
Marshall D. Abrams, Sushil Jajodia and Harold J. Podell. Information Security: An Integrated Collection of Essays. IEEE Computer Society Press, Los Alamitos, California, USA, 1994 |
Morrie Gasser. Building a Secure Computer System. Van Nostrand Reinhold, 1988, http://www.cs.unomaha.edu/~stanw/gasserbook.pdf |
Peter J. Denning. Computers Und er Attack: Intruders, Worms and Viruses. Addison - Wesley Professional, 1990 |
Pfleeger, C.P.: Security in Computing, 4th ed., Prentice Hall, 2007 |
Sean Smith und John Marchesini: The Craft of System Security , Addison - Wesley Longman, Amsterdam |
Sean W. Smith Tru sted Computing Platforms: Design and Applications , Springer, Berlin |
Stallings, W.: Cryptography and Network Security, 4th ed. Prentice Hall, 2006 |
Tansu Alpcan and Tamer Başar.: Network Security: A Decision and Game Theoretic Approach, Cambridge University Press, 2011 |
U.S. Department of Defense Computer Security Center, Rainbow Series, http://en.wikipedia.org/wiki/Rainbow_Series |
William R. Cheswick, Steven M. Bellovin and Aviel D. Rubin. Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition. Addison - We sley Professional, 2003. |