Anderson, R.: Security Engineering, John Wiley, 2001 |
Bishop, M.: Computer Security: Art and Science, Addison Wesley, 2002 |
Defense Advanced Research Projects Agency (DARPA), HIGH PERFORMANCE MICROCHIP SUPPLY, www.cra.org/govaffairs/images/2005-02-HPMS_Report_Final.pdf |
Denning, D.E.: Cryptography and Data Security, Addison Wesley, 1983 |
Eckert, C.: IT-Sicherheit, 3.Aufl., Oldenbourg-Verlag, 2004 |
Edward Amoroso. Fundamentals of Computer Security Technology. Prentice Hall PTR, 1994. |
Garfinkel, S.; Spafford, G.: Practical Unix and Internet Security, 3rd ed. O'Reilly, 2004 |
Gollmann, D.: Computer Security, John Wiley & Sons, 1999 |
Howard,M.; LeBlanc,D.: Writing Secure Code, Microsoft Press, 2001 |
Ken Dunham. Mobile Malware Attacks and Defense (Paperback). Syngress, November 2008. |
Marshall D. Abrams, Sushil Jajodia and Harold J. Podell. Information Security: An Integrated Collection of Essays. IEEE Computer Society Press, Los Alamitos, California, USA, 1994. |
Morrie Gasser. Building a Secure Computer System. Van Nostrand Reinhold, 1988, http://www.cs.unomaha.edu/~stanw/gasserbook.pdf |
Peter J. Denning. Computers Under Attack: Intruders, Worms and Viruses. Addison-Wesley Professional, 1990. |
Pfleeger, C.P.: Security in Computing, 4th ed., Prentice Hall, 2007 |
Sean Smith und John Marchesini: The Craft of System Security, Addison-Wesley Longman, Amsterdam |
Sean W. Smith Trusted Computing Platforms: Design and Applications, Springer, Berlin |
Stallings, W.: Cryptography and Network Security, 4th ed. Prentice Hall, 2006 |
U.S. Department of Defense Computer Security Center, Rainbow Series, http://en.wikipedia.org/wiki/Rainbow_Series |
William R. Cheswick, Steven M. Bellovin and Aviel D. Rubin. Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition. Addison-Wesley Professional, 2003. |