Anda di halaman 1dari 92

Cybersecurity, Cryptography, and Privacy

This section of the library was updated on 11-25-14.


This work is licensed under the Creative Commons AttributionNonCommercial-NoDerivs 3.0 Unported License (available at
http://creativecommons.org/licenses/by-nc-nd/3.0/).
This work is free for personal and classroom use; you may not use this
work for commercial purposes. Your fair use and other rights are in no
way affected by the above.
Professor Joseph Vaisman
Department of Computer Science and Engineering, NYU-Poly
jvaisman@competitive-learning.org

Table of Contents
Cybersecurity
Biometrics
Security Engineering
Digital Forensics
Risk
Trust
Professional Certifications

Programming
Mathematics for Cryptography
Cryptography
History of Cryptology
Alice and Bob in Cipherspace
How to Share a Secret
Privacy
Data Privacy
Security Science
Additional Web Resources

Cybersecurity ==========================
Encyclopedia of Cryptography and Security
Henk C.A. van Tilborg and Sushil Jajodia (Editors)
Springer, 2011, ISBN 978-1-4419-5906-5
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4419-5906-5
http://dx.doi.org/10.1007/978-1-4419-5906-5
What Is Computer Science? An Information Security Perspective
Daniel Page and Nigel Smart
Springer, 2014, ISBN 978-3-319-04042-4
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-04042-4
http://dx.doi.org/10.1007/978-3-319-04042-4
Applied Information Security: A Hands-on Approach
David Basin, Patrick Schaller, and Michael Schlapfer
Springer, 2011, ISBN 978-3-642-24474-2
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-24474-2
http://dx.doi.org/10.1007/978-3-642-24474-2

Job Reconnaissance: Using Hacking Skills to Win the Job Hunt


Game
Josh More
Elsevier, 2014, ISBN 978-0-12-416601-1
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124166011
http://www.sciencedirect.com/science/book/9780124166011

The Basics of Information Security: Understanding the Fundamentals


of InfoSec in Theory and Practice, Second Edition
Jason Andress
Elsevier, 2014, ISBN 978-0-12-800744-0
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128007440
http://www.sciencedirect.com/science/book/9780128007440
Introduction to Information Security: A Strategic-based Approach
Timothy J. Shimeall and Jonathan M. Spring
Elsevier, 2014, ISBN 978-1-59749-969-9
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499699
http://www.sciencedirect.com/science/book/9781597499699
Computer and Information Security Handbook, Second Edition
John R. Vacca
Elsevier, 2013, ISBN 978-0-12-394397-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
123943972
http://www.sciencedirect.com/science/book/9780123943972
Managing Information Security, Second Edition
John R. Vacca (Editor)
Elsevier, 2014, ISBN 978-0-12-416688-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124166882
http://www.sciencedirect.com/science/book/9780124166882
Cyber Reconnaissance, Surveillance and Defense
Robert Shimonski
Elsevier, 2015, ISBN 978-0-12-801308-3

http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128013083
http://www.sciencedirect.com/science/book/9780128013083
Designing and Building A Security Operations Center
David Nathans
Elsevier, 2015, ISBN 978-0-12-800899-7
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128008997
http://www.sciencedirect.com/science/book/9780128008997
Cyber Security and IT Infrastructure Protection
John R. Vacca (Editor)
Elsevier, 2014, ISBN 978-0-12-416681-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124166813
http://www.sciencedirect.com/science/book/9780124166813
Detecting and Combating Malicious Email
Julie JCH Ryan and Cade Kamachi
Elsevier, 2015, ISBN 978-0-12-800110-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128001103
http://www.sciencedirect.com/science/book/9780128001103
Cyber Crime and Cyber Terrorism Investigators Handbook
Babak Akhgar, Andrew Staniforth, and Francesca Bosco (Editors)
Elsevier, 2014, ISBN 978-0-12-800743-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128007433
http://www.sciencedirect.com/science/book/9780128007433

Targeted Cyber Attacks: Multi-staged Attacks Driven by


Exploits and Malware
Aditya K. Sood and Richard Enbody
Elsevier, 2014, ISBN 978-0-12-800604-7
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128006047
http://www.sciencedirect.com/science/book/9780128006047

Emerging Trends in ICT Security


Babak Akhgar and Hamid R. Arabnia (Editors)
Elsevier, 2014, ISBN 978-0-12-411474-6
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124114746
http://www.sciencedirect.com/science/book/9780124114746
The Psychology of Security
Ryan West
Pages 34-40
Communications of the ACM, Volume 51, Number 4 (April 2008)
http://dx.doi.org.databases.poly.edu/10.1145/1330311.1330320
http://dx.doi.org/10.1145/1330311.1330320
How to Cheat at Managing Information Security
Mark Osborne
Elsevier, 2006, ISBN 978-1-59749-110-5
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597491105
http://www.sciencedirect.com/science/book/9781597491105
Zen and the Art of Information Security
Ira Winkler
Elsevier, 2007, ISBN 978-1-59749-168-6

http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597491686
http://www.sciencedirect.com/science/book/9781597491686
Simple Steps to Data Encryption: A Practical Guide to Secure
Computing
Peter Loshin
Elsevier, 2013, ISBN 978-0-12-411483-8
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124114838
http://www.sciencedirect.com/science/book/9780124114838
Cyberterrorism: Understanding, Assessment, and Response
Thomas M. Chen, Lee Jarvis, and Stuart Macdonald (Editors)
Springer, 2014, ISBN 978-1-4939-0962-9
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4939-0962-9
http://dx.doi.org/10.1007/978-1-4939-0962-9
Introduction to Cyber-Warfare: A Multidisciplinary Approach
Paolo Shakarian, Jana Shakarian, and Andrew Ruef
Elsevier, 2013, ISBN 978-0-12-407814-7
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124078147
http://www.sciencedirect.com/science/book/9780124078147
The Basics of Cyber Warfare: Understanding the Fundamentals of
Cyber Warfare in Theory and Practice
Steve Winterfeld and Jason Andress
Elsevier, 2013, ISBN 978-0-12-404737-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124047372
http://www.sciencedirect.com/science/book/9780124047372

Cyber Warfare: Techniques, Tactics and Tools for Security


Practitioners, Second Edition
Jason Andress and Steve Winterfeld
Elsevier, 2014, ISBN 978-0-12-416672-1
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124166721
http://www.sciencedirect.com/science/book/9780124166721
Intelligent Methods for Cyber Warfare
Ronald R. Yager, Marek Z. Reformat, and Naf Alajlan (Editors)
Springer, 2015, ISBN 978-3-319-08624-8
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-08624-8
http://dx.doi.org/10.1007/978-3-319-08624-8
Cyber Warfare and the Laws of War
Heather Harrison Dinniss
Cambridge University Press, 2013, ISBN 9780511894527
http://dx.doi.org.databases.poly.edu/10.1017/CBO9780511894527
http://dx.doi.org/10.1017/CBO9780511894527
Towards Fundamental Science of Cyber Security
Alexander Kott
Pages 1-13
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-7597-2_1
http://dx.doi.org/10.1007/978-1-4614-7597-2_1
Network Science and Cybersecurity
Robinson E. Pino (Editor)
Springer, 2014, ISBN 978-1-4614-7597-2
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-7597-2
http://dx.doi.org/10.1007/978-1-4614-7597-2
Information Security: Principles and Practice, Second Edition

Mark Stamp
Wiley, 2011, ISBN 9781118027974
http://dx.doi.org.databases.poly.edu/10.1002/9781118027974
http://dx.doi.org/10.1002/9781118027974

Elements of Computer Security


David Salomon
Springer, 2010, ISBN 978-0-85729-006-9
http://dx.doi.org.databases.poly.edu/10.1007/978-0-85729-006-9
http://dx.doi.org/10.1007/978-0-85729-006-9
Network and System Security, Second Edition
John R. Vacca (Editor)
Elsevier, 2014, ISBN 089-0-12-416689-9
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124166899
http://www.sciencedirect.com/science/book/9780124166899
Dynamic Secrets in Communication Security
Sheng Xiao, Weibo Gong, and Don Towsley
Springer, 2014, ISBN 978-1-4614-7831-7
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-7831-7
http://dx.doi.org/10.1007/978-1-4614-7831-7
Homeland Security: The Essentials
Jane A. Bullock, George D. Haddow, and Damon P. Coppola
Elsevier, 2013, ISBN 978-0-12-415803-0
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124158030
http://www.sciencedirect.com/science/book/9780124158030
Counterterrorism and Cybersecurity: Total Information Awareness

Newton Lee
Springer, 2013, ISBN 978-1-4614-7205-6
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-7205-6
http://dx.doi.org/10.1007/978-1-4614-7205-6
Handbook of Computational Approaches to Counterterrorism
V.S. Subrahmanian (Editor)
Springer, 2013, ISBN 978-1-4614-5311-6
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-5311-6
http://dx.doi.org/10.1007/978-1-4614-5311-6
Human Aspects of Information Security, Privacy, and Trust, First
International Conference, HAS 2013
Louis Marinos and Ioannis Askoxylakis (Editors)
Springer, 2013, ISBN 978-3-642-39345-7
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-39345-7
http://dx.doi.org/10.1007/978-3-642-39345-7
From One Winning Career to the Next: Transitioning Public Sector
Leadership and Security Expertise to the Business Bottom Line
J. David Quilter
Elsevier, 2013, ISBN 978-0-12-411594-1
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124115941
http://www.sciencedirect.com/science/book/9780124115941
Applied Cyber Security and the Smart Grid: Implementing
Security Controls into the Modern Power Infrastructure
Eric D. Knapp and Raj Samani
Elsevier, 2013, ISBN 978-1-59749-998-9
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499989

http://www.sciencedirect.com/science/book/9781597499989
Physical-Layer Security: From Information Theory to Security
Engineering
Matthieu Block and Joao Barros
Cambridge University Press, 2011, ISBN 9780511977985
http://dx.doi.org.databases.poly.edu/10.1017/CBO9780511977985
http://dx.doi.org/10.1017/CBO9780511977985
Applied Cyber-Physical Systems
Sang C. Suh, U. John Tanik, John N. Carbone, and Abdullah Eroglu
(Editors)
Springer, 2014, ISBN 978-1-4614-7336-7
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-7336-7
http://dx.doi.org/10.1007/978-1-4614-7336-7
Handbook on Securing Cyber-Physical Critical Infrastructure:
Foundations and Challenges
Sajal K. das, Krishna Kant, and Nan Zhang
Elsevier, 2012, ISBN 978-0-12-415815-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124158153
http://www.sciencedirect.com/science/book/9780124158153
Analyzing and Defending Against Web-Based Malware
Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, and
Insup Lee
ACM Computing Surveys, Volume 45, Number 4 (August 2013)
http://dx.doi.org.databases.poly.edu/10.1145/2501654.2501663
http://dx.doi.org/10.1145/2501654.2501663

Botnets: A survey

Pages 378-403

Sergio S.C. Silva, Rodrigo M.P. Silva, Raquel C.G. Pinto,


and Ronaldo M. Salles
Computer Networks, Volume 57, Number 2 (February 2013)
http://dx.doi.org.databases.poly.edu/10.1016/j.comnet.2012.07.021
http://dx.doi.org/10.1016/j.comnet.2012.07.021
Botnets
Heli Tiirman-Klaar, Jan Gassen, Elmar Gerhards-Padilla,
and Peter Martini
Springer, 2013, ISBN 978-1-4471-5216-3
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4471-5216-3
http://dx.doi.org/10.1007/978-1-4471-5216-3
Mobile Authentication: Problems and Solutions
Markus Jacobson
Springer, 2013, ISBN 978-1-4614-4878-5
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-4878-5
http://dx.doi.org/10.1007/978-1-4614-4878-5
Data Protection from Insider Threats
Elisa Bertino
Morgan & Claypool, 2012, ISBN 9781608457694
http://dx.doi.org.databases.poly.edu/10.2200/S00431ED1V01Y201207
DTM028
http://dx.doi.org/10.2200/S00431ED1V01Y201207DTM028
Strategic Intelligence Management: National Security
Imperatives and Information and Communication Technologies
Babak Akhgar and Simeon Yates (Editors)
Elsevier, 2013, ISBN 978-0-12-407191-9
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124071919

http://www.sciencedirect.com/science/book/9780124071919
Intelligent Systems for Security Informatics
Christopher Yang, Wenji Mao, Xiaolong Zheng, and Hui Wang
Elsevier, 2013, ISBN 978-0-12-404702-0
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124047020
http://www.sciencedirect.com/science/book/9780124047020
Advanced Persistent Threat: Understanding the Danger and
How to Protect Your Organization
Eric Cole
Elsevier, 2013, ISBN 978-1-59749-949-1
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499491
http://www.sciencedirect.com/science/book/9781597499491
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Will Gragido, Daniel Molina, John Pirc, and Nick Selby
Elsevier, 2013, ISBN 978-1-59749-740-4
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597497404
http://www.sciencedirect.com/science/book/9781597497404
The Economics of Information Security and Privacy
Rainer Bohme (Editor)
Springer, 2013, ISBN 978-3-642-39498-0
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-39498-0
http://dx.doi.org/10.1007/978-3-642-39498-0
Economics of Information Security and Privacy III
Bruce Schneier (Editor)

Springer, 2013, ISBN 978-1-4614-1981-5


http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-1981-5
http://dx.doi.org/10.1007/978-1-4614-1981-5
Economics of Information Security and Privacy
Tyler Moore, David J. Pym, and Christos Ioannidis (Editors)
Springer, 2010, ISBN 978-1-4419-6967-5
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4419-6967-5
http://dx.doi.org/10.1007/978-1-4419-6967-5
Federated Identity Primer
Derrick Rountree
Elsevier, 2013, ISBN 978-0-12-4071896
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124071896
http://www.sciencedirect.com/science/book/9780124071896

Data Hiding: Exposing Concealed Data in Multimedia,


Operating Systems, Mobile Devices and Network Protocols
Michael Raggo and Chet Hosmer
Elsevier, 2013, ISBN 978-1-59749-743-5
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597497435
http://www.sciencedirect.com/science/book/9781597497435
Disappearing Cryptography Information Hiding: Steganography &
Watermarking, Third Edition
Peter Wayner
Elsevier, 2009, ISBN 978-0-12-374479-1
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
123744791
http://www.sciencedirect.com/science/book/9780123744791

Chapter 2 An Overview of Steganography


Gary C. Kessler and Chet Hosmer
Advances in Computers, Volume 83
Elsevier, 2011, ISBN 978-0-12-385510-7
http://dx.doi.org.databases.poly.edu/10.1016/B978-0-12-3855107.00002-3
http://dx.doi.org/10.1016/B978-0-12-385510-7.00002-3
Digital image steganography: Survey and analysis of current methods
Abbas Cheddad, Joan Condelll, Kevin Curran, and Paul Mc Kevitt
Signal Processing, Volume 90, Number 3 (2010) Pages 727-752
http://dx.doi.org.databases.poly.edu/10.1016/j.sigpro.2009.08.010
http://dx.doi.org/10.1016/j.sigpro.2009.08.010
Trends in Steganography
Elzbieta Zielinska, Wojciech Mazurczyk, and Krzysztof Szczypiorski
Communications of the ACM, Volume 57, Number 3 (March 2014)
Pages 86-95
http://dx.doi.org.databases.poly.edu/10.1145/2566590.2566610
http://dx.doi.org/10.1145/2566590.2566610
Information Hiding: Steganography and Watermarking Attacks and
Countermeasures
Neil F. Johnson, Zoran Duric, and Sushil Jajodia
Springer, 2001, ISBN 978-1-4615-4375-6
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4615-4375-6
http://dx.doi.org/10.1007/978-1-4615-4375-6
Information Hiding: 14th International Conference, IH 2012
Matthias Kirchner and Dipak Ghosal (Editor)
Springer, 2013, ISBN 978-3-642-36373-3, LNCS 7692

http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-36373-3
http://dx.doi.org/10.1007/978-3-642-36373-3
Information Hiding: First International Workshop
Ross Anderson (Editor)
Springer, 1996, ISBN 978-3-540-49589-5, LNCS 1174
http://dx.doi.org.databases.poly.edu/10.1007/3-540-61996-8
http://dx.doi.org/10.1007/3-540-61996-8
Information Hiding in Speech Signals for Secure Communication
Wu Zhijun
Elsevier, 2015, ISBN 978-0-12-801328-1
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128013281
http://www.sciencedirect.com/science/book/9780128013281
Wireless Mobile Internet Security, Second Edition
Man Young Rhee
Wiley, 2013, ISBN 9781118512920
http://dx.doi.org.databases.poly.edu/10.1002/9781118512920
http://dx.doi.org/10.1002/9781118512920
Trustworthy Execution on Mobile Devices
Amit Vasudevan, Jonathan M. McCune, and James Newsome
Springer, 2014, ISBN 978-1-4614-8190-4
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-8190-4
http://dx.doi.org/10.1007/978-1-4614-8190-4
Identifying back doors, attack points, and surveillance mechanisms in
iOS devices
Jonathan Zdziarski
Pages 3-19
Digital Investigation, Volume 11, Number 1 (March 2014)

http://dx.doi.org.databases.poly.edu/10.1016/j.diin.2014.01.001
http://dx.doi.org/10.1016/j.diin.2014.01.001
Signal Processing Approaches to Secure Physical Layer
Communications in Multi-Antenna Wireless Systems
Y.-W. Peter Hong, Pang-Chang Lan, and C.-C. Jay Kuo
Springer, 2014, ISBN 978-981-4560-14-6
http://dx.doi.org.databases.poly.edu/10.1007/978-981-4560-14-6
http://dx.doi.org/10.1007/978-981-4560-14-6
Security for Wireless Sensor Networks using Identity-Based
Cryptography
Harsh Kupwade Patil and Stephen A. Szygenda
CRC Press, 2013, ISBN 978-1-4398-6902-4
http://dx.doi.org.databases.poly.edu/10.1201/b13080
http://dx.doi.org/10.1201/b13080
Chapter 1 Introduction to UTM (Unified Threat Management)
http://dx.doi.org.databases.poly.edu/10.1016/B978-1-59-7497473.00001-6
http://dx.doi.org/10.1016/B978-1-59-749747-3.00001-6
UTM Security with Fortinet: Mastering FortiOS
Kenneth Tam, Martin H. Hoz Salvador, Ken McAlpine, Rick Basile,
Bruce Matsugu, and Josh More
Elsevier, 2013, ISBN 978-1-59749-747-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597497473#ancpt010
http://www.sciencedirect.com/science/book/9781597497473#ancpt01
0
Spyware and Adware
John Aycock

Springer, 2011, ISBN 978-0-387-77741-2


http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-77741-2
http://dx.doi.org/10.1007/978-0-387-77741-2
Identifying Malicious Code Through Reverse Engineering
Abhishek Singh (Editor)
Springer, 2009, ISBN 978-0-387-89468-3
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-89468-3
http://dx.doi.org/10.1007/978-0-387-89468-3
The Death of the Internet
Markus Jacobsson (Editor)
Wiley, 2012, ISBN 9781118312551
http://dx.doi.org.databases.poly.edu/10.1002/9781118312551
http://dx.doi.org/10.1002/9781118312551
Applied Network Security Monitoring: Collection, Detection, and
Analysis
Chris sanders and Jason Smith
Elsevier, 2014, ISBN 978-0-12-417208-1
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124172081
http://www.sciencedirect.com/science/book/9780124172081
Network Intrusion Detection and Prevention: Concepts and
Techniques
Ali A. Ghorbani, Wei Lu, and Mahbod Tavallaee
Springer, 2010, ISBN 978-0-387-88771-5
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-88771-5
http://dx.doi.org/10.1007/978-0-387-88771-5

Network Intrusion Analysis: Methodologies, Tools, and Techniques for


Incident Analysis and Response
Joe Fichera and Steven Bolt
Elsevier, 2013, ISBN 978-1-59749-962-0
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499620
http://www.sciencedirect.com/science/book/9781597499620
Network Hardening: An Automated Approach to Improving
Network Security
Lingyu Wang, Massimiliano Albanese, and Sushil Jajodia
Springer, 2014, ISBN 978-3-319-04612-9
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-04612-9
http://dx.doi.org/10.1007/978-3-319-04612-9
Cloud Security: A Gathering Storm
Mihir Nanavati, Patrick Colp, Bill Aiello, and Andrew Warfield
Communications of the CAN, Volume 57, Number 5 (May 2014) Pages
70-79
http://dx.doi.org.databases.poly.edu/10.1145/2593686
http://dx.doi.org/10.1145/2593686
CSA Guide to Cloud Computing: Implementing Cloud
Privacy and Security
Raj Samani, Brian Honan, and Jim Reavis
Elsevier, 2015, ISBN 978-0-12-420125-5
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124201255
http://www.sciencedirect.com/science/book/9780124201255
Securing the Cloud: Cloud Computer Security Techniques and Tactics
Vic (J.R.) Winkler

Elsevier, 2011, ISBN 978-1-59749-592-9


http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597495929
http://www.sciencedirect.com/science/book/9781597495929
Privacy and Security for Cloud Computing
Siani Pearson and George Yee (Editors)
Springer, 2013, ISBN 978-1-4471-4189-1
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4471-4189-1
http://dx.doi.org/10.1007/978-1-4471-4189-1
Building the Infrastructure for Cloud Security: A Solutions View
Raghu Yeluri and Enrique Castro-Leon
Springer, 2014, ISBN 978-1-4302-6146-9
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4302-6146-9
http://dx.doi.org/10.1007/978-1-4302-6146-9
Collaboration with Cloud Computing: Security, Social Media, and
Unified Communication
Ric Messier
Elsevier, 2014, ISBN 978-0-12-417040-7
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124170407
http://www.sciencedirect.com/science/book/9780124170407
Secure Cloud Computing
Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal,
Vipin Swarup, and Cliff Wang (Editors)
Springer, 2014, ISBN 978-1-4614-9278-8
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-9278-8
http://dx.doi.org/10.1007/978-1-4614-9278-8

High Performance Cloud Auditing and Applications


Keesook J. Han, Baek-Young Choi, and Sejun Song (Editors)
Springer, 2014, ISBN 978-1-4614-3296-8
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-3296-8
http://dx.doi.org/10.1007/978-1-4614-3296-8
Security for Cloud Storage Systems
Kan Yang and Xiaohua Jia
Springer, 2014, ISBN 978-1-4614-7873-7
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-7873-7
http://dx.doi.org/10.1007/978-1-4614-7873-7
SQL Injection Attacks and Defense, Second edition
Justin Clarke
Elsevier, 2012, ISBN 978-1-59749-963-7
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499637
http://www.sciencedirect.com/science/book/9781597499637
Securing SQL Server, Second Edition
Denny Cherry
Elsevier, 2012, ISBN 978-1-59749-947-7
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499477
http://www.sciencedirect.com/science/book/9781597499477
Windows 2012 Server Network Security: Securing Your Windows
Network Systems and Infrastructure
Derrick Rountree
Elsevier, 2013, ISBN 978-1-59749-958-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499583

http://www.sciencedirect.com/science/book/9781597499583
Windows Server 2012 Security from End to Edge and Beyond:
Architecting, Designing, Planning, and Deploying
Windows Server 2012 Security Solutions
Thomas W. Shinder, Yuri Diogenes, and Debra Littlejohn Shinder
Elsevier, 2013, ISBN 978-1-59749-980-4
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499804
http://www.sciencedirect.com/science/book/9781597499804
http://dx.doi.org.databases.poly.edu/10.1016/B978-1-59749-9804.09985-4
http://dx.doi.org/10.1016/B978-1-59749-980-4.09985-4
Investigating Computer-Related Crime, Second Edition
Peter Stephenson and Keith Gilbert
CRC Press, 2013, ISBN 978-1-4200-0370-3
http://dx.doi.org.databases.poly.edu/10.1201/b14664
http://dx.doi.org/10.1201/b14664
Cybercrimes: A Multidisciplinary Analysis
Sumit Ghosh and Elliot Turrini
Springer, 2010, ISBN 978-3-642-13547-7
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-13547-7
http://dx.doi.org/10.1007/978-3-642-13547-7
Guest editorial: security requirements engineering:
past, present, future
Eric Dubois and Haralambos Mouratidis
Pages 1-5
Special Issue on RE09: Security Requirements Engineering
Requirements Engineering, Volume 15, Number 1 (March 2010)
http://dx.doi.org.databases.poly.edu/10.1007/s00766-009-0094-8

http://dx.doi.org/10.1007/s00766-009-0094-8
6. Information Security Applications Based on Biomolecular Systems
Guinevere Strack, Heather R. Lukarift, Glenn R. Johnson,
and Evgeny Katz
Pages 103-116
http://dx.doi.org.databases.poly.edu/10.1002/9783527645480.ch6
http://dx.doi.org/10.1002/9783527645480.ch6
Biomolecular Information Processing: From Logic Systems to
Smart Sensors and Actuators
Evgeny Katz (Editor)
Wiley, 2012, ISBN 9783527645480
http://dx.doi.org.databases.poly.edu/10.1002/9783527645480
http://dx.doi.org/10.1002/9783527645480
Cyber Security Policy Guidebook
Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs,
Jeffrey Schmidt, and Joseph Weiss
Wiley, 2012, ISBN 9781118241530
http://dx.doi.org.databases.poly.edu/10.1002/9781118241530
http://dx.doi.org/10.1002/9781118241530
Cryptographic Protocol: Security Analysis Based on Trusted Freshness
Ling Dong and Kefei Chen
Springer, 2012, ISBN 978-3-642-24073-7
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-24073-7
http://dx.doi.org/10.1007/978-3-642-24073-7
Engineering Secure Two-Party Computation Protocols: Design,
Optimization, and Applications of Efficient Secure Function Evaluation
Thomas Schneider
Springer, 2012, ISBN 978-3-642-30042-4
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-30042-4

http://dx.doi.org/10.1007/978-3-642-30042-4
Secure Multi-Party Non-Repudiation Protocols and Applications
Jose A. Onieva, Javier Lopez, and Jianying Zhou
Springer, 2009, ISBN 978-0-387-75630-1
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-75630-1
http://dx.doi.org/10.1007/978-0-387-75630-1
Advances in Intelligence and Security Informatics
Wenji Mao and Fei-Yue Wang
Elsevier, 2012, ISBN 978-0-12 397200-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
123972002
http://www.sciencedirect.com/science/book/9780123972002
Balanced Secure Scan: Partial Scan Approach for Secret Information
Protection
Michiko Inoue, Tomokazu Yoneda, Mineo Hasegawa,
and Hideo Fujiwara
Pages 99-108
Journal of Electronic Testing, Volume 27, Number 2 (April 2011)
http://dx.doi.org.databases.poly.edu/10.1007/s10836-011-5204-0
http://dx.doi.org/10.1007/s10836-011-5204-0
Building an Information Security Awareness Program:
Defending Against Social Engineering and Technical Threats
Bill Gardner and Valerie Thomas
Elsevier, 2014, ISBN 978-0-12-419967-5
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124199675
http://www.sciencedirect.com/science/book/9780124199675

Social Engineering Penetration Testing: Executing Social Engineering


Pen Tests, Assessments and Defense
Gavin Watson, Andrew Mason, and Richard Ackroyd
Elsevier, 2014, ISBN 978-0-12-420124-8
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124201248
http://www.sciencedirect.com/science/book/9780124201248
The Basics of Hacking and Penetration Testing: Ethical Hacking
and Penetration Testing Made Easy, Second Edition
Patrick Engebretson
Elsevier, 2013, ISBN 978-0-12-411644-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124116443
http://www.sciencedirect.com/science/book/9780124116443
Professional Penetration Testing: Creating and Learning
in a Hacking Lab, Second Edition
Thomas Wilhelm
Elsevier, 2013, ISBN 978-1-59749-993-4
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499934
http://www.sciencedirect.com/science/book/9781597499934
Hacking and Penetration Testing with Low Power Devices
Philip Polstra
Elsevier, 2015, ISBN 978-0-12-800751-8
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128007518
http://www.sciencedirect.com/science/book/9780128007518
Hacking with Kali: Practical Penetration Testing Techniques

James Broad and Andrew Binder


Elsevier, 2014, ISBN 978-0-12-407749-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124077492
http://www.sciencedirect.com/science/book/9780124077492
Wireless Reconnaissance in Penetration Testing
Matthew Neely, Alex Hamerstone, and Chris Sanyk
Elsevier, 2013, ISBN 978-1-59749-731-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597497312
http://www.sciencedirect.com/science/book/9781597497312
Low Tech Hacking
Jack Wiles, Terry Gudaitis, Jennifer Jabbusch,
Russ Rogers, and Sean Lowther
Elsevier, 2012, ISBN 978-1-59749-665-0
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597496650
http://www.sciencedirect.com/science/book/9781597496650
The Basics of Web Hacking: Tools and Techniques to Attack the Web
Josh Pauli
Elsevier, 2013, ISBN 978-0-12-416600-4
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124166004
http://www.sciencedirect.com/science/book/9780124166004
Hacking Web Apps: Detecting and Preventing Web Applications
Security Problems
Mike Shema
Elsevier, 2012, ISBN 978-1-59749-951-4

http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499514
http://www.sciencedirect.com/science/book/9781597499514
Client-Side Attacks and Defense
Robert Shimonski and Sean-Philip Oriyano
Elsevier, 2012, ISBN 978-1-59749-590-5
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597495905
http://www.sciencedirect.com/science/book/9781597495905
The Hackers Guide to OS X: Exploiting OS X from the Root Up
Rob Bathurst, Russ Rogers, and Alijohn Ghassemlouei
Elsevier, 2013, ISBN 978-1-59749-950-7
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499507
http://www.sciencedirect.com/science/book/9781597499507
Thors Microsoft Security Bible: A Collection of
Practical Security Techniques
Timothy Thor Mullen
Elsevier, 2011, ISBN 978-1-59749-572-1
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597495721
http://www.sciencedirect.com/science/book/9781597495721
Embedded Systems Security: Practical Methods for
Safe and Secure Software and Systems Development
David Kleidermacher and Mike Kleidermacher
Elsevier, 2012, ISBN 978-0-12-386886-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
123868862

http://www.sciencedirect.com/science/book/9780123868862
Security Basics for Computer Architects
Ruby B. Lee
Morgan & Claypool, 2013, ISBN 9781627051569
http://dx.doi.org.databases.poly.edu/10.2200/S00512ED1V01Y201305
CAC025
http://dx.doi.org/10.2200/S00512ED1V01Y201305CAC025
Introduction to Hardware Security and Trust
Mohammad Tehranipoor and Cliff Wang (Editors)
Springer, 2012, ISBN 9781-4419-8080-9
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4419-8080-9
http://dx.doi.org/10.1007/978-1-4419-8080-9
Integrated Circuit Authentication: Hardware Trojans
and Counterfeit Detection
Mohammad Tehranipoor, Hassan Salmani, and Xuehui Zhang
Springer, 2014, ISBN 978-3-319-00816-5
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-00816-5
http://dx.doi.org/10.1007/978-3-319-00816-5
A Survey of Security Issues in Hardware Virtualization
Gabor Pek, Levente Buttyan, and Boldizsar Bencsath
ACM Computing Surveys, Volume 45, Number 3 (June 2013)
http://dx.doi.org.databases.poly.edu/10.1145/2480741.2480757
http://dx.doi.org/10.1145/2480741.2480757
Physical Unclonable Functions in Theory and Practice
Christoph Bohm and Maximilian Hofer
Springer, 2013, ISBN 978-1-4614-5040-5
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-5040-5

http://dx.doi.org/10.1007/978-1-4614-5040-5
Secure Smart Embedded Devices, Platforms and Applications
Konstantinos Markantonakis and Keith Mayes (Editors)
Springer, 2014, ISBN 978-1-4614-7915-4
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-7915-4
http://dx.doi.org/10.1007/978-1-4614-7915-4
Advanced DPA Theory and Practice: Towards the Security
Limits of Secure Embedded Circuits
Eric Peeters
Springer, 2013, ISBN 978-1-4614-6783-0
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-6783-0
http://dx.doi.org/10.1007/978-1-4614-6783-0
Game Theory Meets Network Security and Privacy
Mohammad Hossein Manshael, Quanyan Zhu, Tansu Alpcan,
Tamer Basar, and Jan-Pierre Hubaux
ACM Computer Surveys, Volume 45, Number 3 (June 2013)
http://dx.doi.org.databases.poly.edu/10.1145/2480741.2480742
http://dx.doi.org/10.1145/2480741.2480742
Security and Game Theory: Algorithms, Deployed Systems,
Lessons Learned
Milind Tambe
Cambridge University Press, 2012, ISBN 9780511973031
http://dx.doi.org.databases.poly.edu/10.1017/CBO9780511973031
http://dx.doi.org/10.1017/CBO9780511973031
Insider Threat: Protecting the Enterprise from Sabotage,
Spying, and Theft
Eric Cole and Sandra Ring

Elsevier, 2006, ISBN 978-1-59749-048-1


http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597490481
http://www.sciencedirect.com/science/book/9781597490481

Internet of Things
IBM Video:
http://www.ibm.com/smarterplanet/us/en/overview/article/iot_video.
html
That Internet of Things Thing
Kevin Ashton (June 22, 2009)
http://www.rfidjournal.com/article/view/4986
Internet of Things: Hype or Reality?
Anders Gustafsson (January 14, 2013)
http://allthingsd.com/20130114/internet-of-things-hype-or-reality/
The Internet of Things Has Arrived And So Have Massive Security
Issues
Andrew Rose (January 11, 2013)
http://www.wired.com/opinion/2013/01/securing-the-internet-ofthings/
IoT Hub:
http://www.internet-of-things.eu/
Wikipedia:
http://en.wikipedia.org/wiki/Internet_of_Things

Imagineering an Internet of Anything


Irena Bojanova, George Hurlburt, and Jeffrey Voas
IEEE Computer, Volume 47, Number 6 (June 2014)
http://dx.doi.org.databases.poly.edu/10.1109/MC.2014.150
http://dx.doi.org/10.1109/MC.2014.150
On the features and challenges of security
and privacy in distributed internet of things
Rodrigo Roman, Jianying Zhou, and Javier Lopez

Computer Networks,
Volume 57, Number 10 (July 2013)
Pages 2266-2279
http://dx.doi.org.databases.poly.edu/10.1016/j.comnet.2012.12.018
http://dx.doi.org/10.1016/j.comnet.2012.12.018
Security and Privacy in Cloud Computing: A Survey
Mahesh U. Shankarwar and Ambika V. Pawar
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-12012-6_1
http://dx.doi.org/10.1007/978-3-319-12012-6_1
Proceedings of the 3rd International Conference on
Frontiers of Intelligent Computing:
Theory and Applications (FICTA) 2014, Volume 2
Suresh Chandra Satapathy, Bhabendra Narayan Biswal,
Siba K. Ugata, and J.K. Mandal (Editors)
Springer, 2015, ISBN 978-3-319-12012-6
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-12012-6
http://dx.doi.org/10.1007/978-3-319-12012-6
Information Assurance and Security Education and Training:
WISE 8, WISE 7, and WISE 6 Revised Selected Papers
Ronald C. Dodge Jr. and Lynn Futcher (Editors)
Springer, 2013, ISBN 978-3-642-39377-8
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-39377-8
http://dx.doi.org/10.1007/978-3-642-39377-8
Rethinking computing insanity, practice and research
Gene Spafford (December 15, 2008)
http://www.cerias.purdue.edu/site/blog/post/rethinking_computing_i
nsanity_practice_and_research/
Perfect Password: Selection, Protection, Authentication
Mark Burnett and Dave Kleiman

Elsevier, 2005, ISBN 978-1-59749-041-2


http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597490412
http://www.sciencedirect.com/science/book/9781597490412
Online Security for the Business Traveler
Deborah Gonzalez
Elsevier, 2014, ISBN 978-0-12-800069-4
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128000694
http://www.sciencedirect.com/science/book/9780128000694

Top of Shelf
Top of Section
=======================================
Biometrics ============================
Encyclopedia of Biometrics
Stan Z. Lee (Editor)
Springer, 2009, ISBN 978-0-387-73003-5
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-73003-5
http://dx.doi.org/10.1007/978-0-387-73003-5

Encyclopedia of Cryptography and Security


Henk C.A. van Tilborg and Sushil Jajodia (Editors)
Springer, 2011, ISBN 978-1-4419-5906-5

http://dx.doi.org.databases.poly.edu/10.1007/978-1-4419-5906-5
http://dx.doi.org/10.1007/978-1-4419-5906-5
Introduction to Biometrics
Anil K. Jain, Arun A. Ross, and Karthik Nandakumar
Springer, 2011, ISBN 978-0-387-77325-4
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-77326-1
http://dx.doi.org/10.1007/978-0-387-77326-1
Biometrics in the New World: The Cloud, Mobile Technology
and Pervasive Identity
Julian Ashbourn
Springer, 2014, ISBN 978-3-319-04159-9
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-04159-9
http://dx.doi.org/10.1007/978-3-319-04159-9
Guide to Biometrics for Large-Scale Systems: Technological,
Operational, and User-Related Factors
Julian Ashbourn
Springer, 2011, ISBN 978-0-85729-467-8
http://dx.doi.org.databases.poly.edu/10.1007/978-0-85729-467-8
http://dx.doi.org/10.1007/978-0-85729-467-8
Touchless Palmprint Recognition Systems
Angelo Genovese, Vincenzo Piuri, and Fabio Scotti
Springer, 2014, ISBN 978-3-319-10365-5
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-10365-5
http://dx.doi.org/10.1007/978-3-319-10365-5
Implementation and evaluation of a remote authentication
system using touchless palmprint recognition
Haruki Ota, Shoichiro Aoyama, Ryu Watanabe, Koichi Ito,

Yutaka Miyake, and Takafumi Aoki


Multimedia Systems, Volume 19, Number 2 (2013) Pages 117-129
http://dx.doi.org.databases.poly.edu/10.1007/s00530-012-0283-z
http://dx.doi.org/10.1007/s00530-012-0283-z
Iris Biometrics: From Segmentation to Template Security
Christian Rathgeb, Andreas Uhl, and Peter Wild
Springer, 2013, ISBN 978-1-4614-5571-4
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-5571-4
http://dx.doi.org/10.1007/978-1-4614-5571-4
Iris Biometric Model for Network Access
Franjieh El Khoury
CRC Press, 2013, ISBN 978-1-4665-0214-7
http://dx.doi.org.databases.poly.edu/10.1201/b14817
http://dx.doi.org/10.1201/b14817
A Survey of Ear Biometrics
Ayman Abaza, Arun Ross, Christina Hebert,
Mary Ann F. Harrison, and Mark S. Nixon
ACM Computing Surveys, Volume 45, Number 2 (February 2013)
http://dx.doi.org.databases.poly.edu/10.1145/2431211.2431221
http://dx.doi.org/10.1145/2431211.2431221
Multibiometrics for Human Identification
Bir Bhanu and Venu Govindraju (Editors)
Cambridge University Press, 2011, ISBN 9780511921056
http://dx.doi.org.databases.poly.edu/10.1017/CBO9780511921056
http://dx.doi.org/10.1017/CBO9780511921056
Chapter 13 Behavioral, Cognitive and Virtual Biometrics
Roman V. Yampolskiy
Pages 347-385

http://dx.doi.org.databases.poly.edu/10.1007/978-0-85729-994-9_13
http://dx.doi.org/10.1007/978-0-85729-994-9_13
Computer Analysis of Human Behavior
Albert Ali Salah and Theo Gevers (Editors)
Springer, 2011, ISBN 978-0-85729-994-9
http://dx.doi.org.databases.poly.edu/10.1007/978-0-85729-994-9
http://dx.doi.org/10.1007/978-0-85729-994-9
Enhancing Information Security and Privacy by
Combining Biometrics with Cryptography
Sanjay G. Kanade, Dijana Petrovska-Delacretaz,
and Bernadette Dorizzi
Morgan & Claypool, 2012, ISBN 9781608458486
http://dx.doi.org.databases.poly.edu/10.2200/S00417ED1V01Y201205
SPT003
http://dx.doi.org/10.2200/S00417ED1V01Y201205SPT003
Security and Privacy in Biometrics
Patrizio Campisi (Editor)
Springer, 2013, ISBN 978-1-4471-5230-9
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4471-5230-9
http://dx.doi.org/10.1007/978-1-4471-5230-9

Top of Shelf
Top of Section
=======================================

Security Engineering ====================


Engineering Information Security: The Application of Systems
Engineering Concepts to Achieve Information Assurance
Stuart Jacobs
Wiley, 2011, ISBN 978-0-470-94791-3
http://dx.doi.org.databases.poly.edu/10.1002/9780470947913
http://dx.doi.org/10.1002/9780470947913
Chapter 1 - System Security Engineering for Information Systems
Logan O. Mailloux, Michael R. Grimaila, John M. Colombi,
Douglas D. Hodson, and Gearld Baumgartner
http://dx.doi.org.databases.poly.edu/10.1016/B978-0-12-4114746.00001-3
http://dx.doi.org/10.1016/B978-0-12-411474-6.00001-3

Emerging Trends in ICT Security


Babak Akhgar and Hamid R. Arabnia (Editors)
Elsevier, 2014, ISBN 978-0-12-411474-6
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124114746
http://www.sciencedirect.com/science/book/9780124114746
Chapter 3 - Advances in Model-Driven Security
Levi Lucio, Qin Zhang, Phu H. Nguyen, Moussa Amrani,
Jacques Klein, Hans Vangheluwe, and Yves Le Traon
http://dx.doi.org.databases.poly.edu/10.1016/B978-0-12-8001622.00003-8
http://dx.doi.org/10.1016/B978-0-12-800162-2.00003-8

Advances in Computers, Volume Ninety Three


Atif Memon (Editor)

Elsevier, 2014, ISBN 978-0-12-800162-2


Virtualization: Issues, Security Threats, and Solutions
Michael Pearce, Sherali Zeadally, and Ray Hunt
ACM Computing Surveys, Volume 45, Number 2 (February 2013)
http://dx.doi.org.databases.poly.edu/10.1145/2431211.2431216
http://dx.doi.org/10.1145/2431211.2431216
Security Engineering for Service-Oriented Architectures
Michael Hafner and Ruth Breu
Springer, 2009, ISBN 978-3-540-79539-1
http://dx.doi.org.databases.poly.edu/10.1007/978-3-540-79539-1
http://dx.doi.org/10.1007/978-3-540-79539-1
Security Engineering with Patterns: Origins,
Theoretical Model, and New Applications
Markus Schumacher
Springer, 2003, ISBN 978-3-540-45180-8
http://dx.doi.org.databases.poly.edu/10.1007/b11930
http://dx.doi.org/10.1007/b11930
Certificate Transparency
Ben Laurie
http://dx.doi.org.databases.poly.edu/10.1145/2659897
http://dx.doi.org/10.1145/2659897
Security Collapse in the HTTPS Market
Axel Arnbak, Hadi Asghari, Michel Van Eeten, and Nico van Eijk
http://dx.doi.org.databases.poly.edu/10.1145/2660574
http://dx.doi.org/10.1145/2660574
Why Is It Taking So Long to Secure Internet Routing?
Sharon Goldberg
http://dx.doi.org.databases.poly.edu/10.1145/2659899

http://dx.doi.org/10.1145/2659899
Communications of the ACM, Volume 57, Number 10 (October 2014)

Top of Shelf
Top of Section
=======================================
Digital Forensics ========================
Digital Forensics
Simson L. Garfinkel
American Scientist, Volume 100, Number 5 (September-October 2013)
http://www.americanscientist.org/issues/feature/2013/5/digitalforensics
Python Forensics: A Workbench for Inventing and Sharing
Digital Forensic Technology
Chet Hosmer
Elsevier, 2014, ISBN 978-0-12-418676-7
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124186767
http://www.sciencedirect.com/science/book/9780124186767
Unified Communications Forensics: Anatomy of Common UC Attacks
Nicholas Grant & Joseph W Shaw II
Elsevier, 2014, ISBN 978-1-59749-992-7
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499927

http://www.sciencedirect.com/science/book/9781597499927
Investigating Internet Crimes: An Introduction to
Solving Crimes in Cyberspace
Todd G. Shipley and Art Bowker
Elsevier, 2014, ISBN 978-0-12-407817-8
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124078178
http://www.sciencedirect.com/science/book/9780124078178
Cloud Storage Forensics
Darren Quick, Ben Martini, and Kim-Kwang Raymond Choo
Elsevier, 2014, ISBN 978-0-12-419970-5
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124199705
http://www.sciencedirect.com/science/book/9780124199705
CyberForensics: Understanding Information Security Investigations
Jennifer Bayuk (Editor)
Springer, 2010, ISBN 978-1-60761-772-3
http://dx.doi.org.databases.poly.edu/10.1007/978-1-60761-772-3
http://dx.doi.org/10.1007/978-1-60761-772-3
Placing the Suspect Behind the Keyboard: Using Digital Forensics
and Investigative Techniques to Identify Cybercrime Suspects
Brett Shavers
Elsevier, 2013, ISBN 978-1-59749-985-9
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499859
http://www.sciencedirect.com/science/book/9781597499859

Computer Incident Response and Forensics Team Management:


Conducting a Successful Incident Response
Leighton R. Johnson III
Elsevier, 2014, ISBN 978-1-59749-996-5
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499965
http://www.sciencedirect.com/science/book/9781597499965
X-Ways Forensics Practitioners Guide
Brett Shavers and Eric Zimmerman
Elsevier, 2014, ISBN 978-0-12-411605-4
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124116054
http://www.sciencedirect.com/science/book/9780124116054
Digital Image Forensics: There is More to a Picture than Meets the Eye
Husrev Taha Sencar and Nasir Memon (Editors)
Springer, 2013, ISBN 978-1-4614-0757-7
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-0757-7
http://dx.doi.org/10.1007/978-1-4614-0757-7
Investigative Computer Forensics: The Practical Guide for Lawyers,
Accountants, Investigators, and Business Executives
Erik Laykin
Wiley, 2013, ISBN 9781118572115
http://dx.doi.org.databases.poly.edu/10.1002/9781118572115
http://dx.doi.org/10.1002/9781118572115
Digital Forensics for Legal Professionals: Understanding
Digital Evidence From the Warrant to the Courtroom
Larry E. Daniel and Lars E. Daniel
Elsevier, 2012, ISBN 978-1-59749-643-8

http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597496438
http://www.sciencedirect.com/science/book/9781597496438
10 Digital evolution: history, challenges and future
directions for the digital and multimedia sciences section
David W. Baker et al.
Pages 252-291
http://dx.doi.org.databases.poly.edu/10.1002/9781118373880.ch10
http://dx.doi.org/10.1002/9781118373880.ch10

Forensic Science: Current Issues, Future Directions


Douglas H. Ubelaker (Editor)
Wiley, 2013, ISBN 9781118373880
http://dx.doi.org.databases.poly.edu/10.1002/9781118373880
http://dx.doi.org/10.1002/9781118373880
Digital forensic research: current state of the art
Sriram Raghavan
Pages 91-114
CSI Transactions on ICT, Volume 1, Number 1 (March 2013)
http://dx.doi.org.databases.poly.edu/10.1007/s40012-012-0008-7
http://dx.doi.org/10.1007/s40012-012-0008-7
A framework for unified digital evidence management
in security convergence
Kyung-Soo Lim and Changhoon Lee
Electronic Commerce Research (2013)
http://dx.doi.org.databases.poly.edu/10.1007/s10660-013-9119-y
http://dx.doi.org/10.1007/s10660-013-9119-y
Digital Forensics Processing and Procedures: Meeting the
Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practices
Requirements
David Watson

Elsevier, 2013, ISBN 978-1-59749-8


http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597497428
http://www.sciencedirect.com/science/book/9781597497428
Advances in Digital Forensics VIII: 8th IFIP WG 11.9
International Conference 2012
Gilbert Peterson and Sujeet Shenoi (Editors)
Springer, 2012, ISBN 978-3-642-33962-2
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-33962-2
http://dx.doi.org/10.1007/978-3-642-33962-2
Advances in Digital Forensics VII: 7th IFIP WG 11.9
International Conference 2011
Gilbert Peterson and Sujeet Shenoi (Editors)
Springer, 2011, ISBN 978-3-642-24212-0
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-24212-0
http://dx.doi.org/10.1007/978-3-642-24212-0
Advances in Digital Forensics VI: Sixth IFIP WG 11.9
International Conference 2010
Kam-Pui Chow and Sujeet Shenoi (Editors)
Springer, 2010, ISBN 978-3-642-15506-2
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-15506-2
http://dx.doi.org/10.1007/978-3-642-15506-2
Advances in Digital Forensics V: Fifth IFIP WG 11.9
International Conference 2009
Gilbert Peterson and Sujeet Shenoi (Editors)
Springer, 2009, ISBN 978-3-642-04155-6
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-04155-6
http://dx.doi.org/10.1007/978-3-642-04155-6

Advances in Digital Forensics iV


Indrajit Ray and Sujeet Shenoi (Editors)
Springer, 2008, ISBN 978-0-387-84927-0
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-84927-0
http://dx.doi.org/10.1007/978-0-387-84927-0
Digital Forensics and Cyber Crime: Third International
ICST Conference, ICDF2C 2011
Pavel Gladyshev and Marcus K. Rogers (Editors)
Springer, 2012, ISBN 978-3-642-35515-8
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-35515-8
http://dx.doi.org/10.1007/978-3-642-35515-8
Digital Forensics and Cyber Crime: Second International
ICST Conference, ICDF2C 2010
Ibrahim Baggili (Editor)
Springer, 2011, ISBN 978-3-642-19513-6
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-19513-6
http://dx.doi.org/10.1007/978-3-642-19513-6
Digital Forensics and Cyber Crime: First International
ICST Conference, ICDF2C 2009
Sanjay Goel (Editor)
Springer, 2010, ISBN 978-3-642-11534-9
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-11534-9
http://dx.doi.org/10.1007/978-3-642-11534-9
Open Source Software for Digital Forensics
Ewa Huebner and Stefano Zanero (Editors)
Springer, 2010, ISBN 978-1-4419-5803-7
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4419-5803-7

http://dx.doi.org/10.1007/978-1-4419-5803-7
Linux Malware Incident Response: A Practitioners Guide to
Forensic Collection and Examination of Volatile Data
Cameron H. Malin, Foghan Casey, and James A. Aquilina
Elsevier, 2013, ISBN 978-0-12-409507-6
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124095076
http://www.sciencedirect.com/science/book/9780124095076
Malware Forensic Field Guide for Windows Systems
Cameron Malin, Eoghan Casey, and James Aquilina
Elsevier, 2012, ISBN 978-1-59749-472-4
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597494724
http://www.sciencedirect.com/science/book/9781597494724
Windows Registry Forensics: Advanced Digital Forensic Analysis
of the Windows Registry
Harlan Carvey
Elsevier, 2011, ISBN 978-1-59749-580-6
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597495806
http://www.sciencedirect.com/science/book/9781597495806
Android Malware
Xuxian Jiang and Yajin Zhou
Springer, 2013, ISBN 978-1-4614-7394-7
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-7394-7
http://dx.doi.org/10.1007/978-1-4614-7394-7
Automatic Malware Analysis: An Emulator Based Approach

Heng Yin and Dawn Song


Springer, 2013, ISBN 978-1-4614-5523-3
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-5523-3
http://dx.doi.org/10.1007/978-1-4614-5523-3
PBX Security and Forensics: A Practical Approach
Iosif I. Androulidakis
Springer, 2013, ISBN 978-1-4614-1656-2
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-1656-2
http://dx.doi.org/10.1007/978-1-4614-1656-2
A critical review of 7 years of Mobile Device Forensics
Konstantia Barmpatsalou, Dimitrios Damopoulas, Georgios
Kambourakis,
and Vasilios Katos
Pages 323-349
Digital Investigation, Volume 10, Number 4 (December 2013)
http://dx.doi.org.databases.poly.edu/10.1016/j.diin.2013.10.003
http://dx.doi.org/10.1016/j.diin.2013.10.003
Identifying back doors, attack points, and surveillance mechanisms in
iOS devices
Jonathan Zdziarski
Pages 3-19
Digital Investigation, Volume 11, Number 1 (March 2014)
http://dx.doi.org.databases.poly.edu/10.1016/j.diin.2014.01.001
http://dx.doi.org/10.1016/j.diin.2014.01.001
iPhone and iOS Forensics: Investigation, Analysis and Mobile
Security for Apple iPhone, iPad, and iOS Devices
Andrew Hoog and Katie Strzempka
Elsevier, 2011, ISBN 978-1-59749-659-9
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597496599

http://www.sciencedirect.com/science/book/9781597496599
Logging and Log Management: The Authoritative Guide to
Understanding the Concepts Surrounding Logging and Log
Management
Anton A. Chuvakin, Kevin J. Schmidt, and Christopher Phillips
Elsevier, 2013, ISBN 978-1-59749-635-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597496353
http://www.sciencedirect.com/science/book/9781597496353
Virtualization and Forensics: A Digital Forensic Investigators Guide to
Virtual Environments
Diane Barrett and Gregory Kipper
Elsevier, 2010, ISBN 978-1-59749-557-8
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597495578
http://www.sciencedirect.com/science/book/9781597495578

Secrets Stolen, Fortunes Lost


Christopher Burgess and Richard Power
Elsevier, 2008, ISBN 978-1-59749-255-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597492553
http://www.sciencedirect.com/science/book/9781597492553
Inside the SPAM Cartel: Trade Secrets from the Dark Side
Stu Sjouwerman and Jeffrey Posluns
Elsevier, 2004, ISBN 978-1-932266-86-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
932266863
http://www.sciencedirect.com/science/book/9781932266863

Top of Shelf
Top of Section
=======================================

Risk

=================================

Managing Risk and Information Security: Protect to Enable


Malcolm Harkins
Springer, 2013, ISBN 978-1-4302-5114-9
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4302-5114-9
http://dx.doi.org/10.1007/978-1-4302-5114-9
Information Security Risk Assessment Toolkit: Practical
Assessments through Data Collection and Data Analysis
Mark Ryan M. Talabis and Jason L. Martin
Elsevier, 2013, ISBN 978-1-59749-735-0
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597497350
http://www.sciencedirect.com/science/book/9781597497350
IT Security Risk Management:
Perceived IT Security Risks in the Context of Cloud Computing
Tobias Ackermann
Springer, 2013, ISBN 978-3-658-01115-4

http://dx.doi.org.databases.poly.edu/10.1007/978-3-658-01115-4
http://dx.doi.org/10.1007/978-3-658-01115-4
Measuring and Managing Information Risk: A FAIR Approach
Jack Freund and Jack Jones
Elsevier, 2015, ISBN 978-0-12-420231-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124202313
http://www.sciencedirect.com/science/book/9780124202313
Risk Management Framework:
A Lab-Based Approach to Securing Information Systems
James Broad
Elsevier, 2013, ISBN 978-1-59749-995-8
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499958
http://www.sciencedirect.com/science/book/9781597499958
FISMA and the Risk Management Framework:
The New Practice of Federal Cyber Security
Stephen D. Gantz and Daniel R. Philpott
Elsevier, 2013, ISBN 978-1-59749-641-4
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597496414
http://www.sciencedirect.com/science/book/9781597496414
FISMA Compliance Handbook
Laura P. Taylor
Elsevier, 2013, ISBN 978-0-12-405871-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124058712
http://www.sciencedirect.com/science/book/9780124058712

Social Media Security: Leveraging Social Networking While


Mitigating Risk
Michael Cross
Elsevier, 2014, ISBN 978-1-59749-986-6
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499866
http://www.sciencedirect.com/science/book/9781597499866
Managing Online Risk: Apps, Mobile, and Social Media Security
Deborah Gonzalez
Elsevier, 2015, ISBN 978-0-12-20055-5
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124200555
http://www.sciencedirect.com/science/book/9780124200555
The Science and Technology of Counterterrorism:
Measuring Physical and Electronic Security Risk
Carl S. Young
Elsevier, 2015, ISBN 978-0-12-420056-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124200562
http://www.sciencedirect.com/science/book/9780124200562

Top of Shelf
Top of Section
=======================================

Trust =================================
Trust, Computing, and Society
Richard H.R. Harper (Editor)
Cambridge University Press, 2014, ISBN 9781139828567
http://dx.doi.org/10.1017/CBO9781139828567

Trust: The Evolutionary Game of Mind and Society


Toshio Yamagishi
Springer, 2011, ISBN 978-1-431-53936-0
http://dx.doi.org/10.1007/978-4-431-53936-0
Towards a Theory of Trust in Networks of Humans and Computers
Virgil Gligor and Jeannette M. Wing
CMU-CyLab-110016 (September 8, 2011)
CyLab, Carnegie Mellon University
http://repository.cmu.edu/cylab/88/
A Survey of Trust in Social Networks
Wanita Sherchan, Surya Nepal, and Cecile Paris
ACM Computing Surveys, Volume 45, Number 4 (August 2013)
http://dx.doi.org/10.1145/2501654.2501661
Chapter 1 Introduction: Embedded Trust
http://dx.doi.org/10.1007/0-306-47645-2_1
Social Networks and Trust
Vincent Buskens
Springer, 2002, ISBN 978-0-306-47645-7
http://dx.doi.org/10.1007/b109038

Top of Shelf
Top of Section
=======================================
Professional Certifications ================
CISSP (Certified Information Systems Security Professional)
Certification
https://www.isc2.org/cissp/default.aspx
Wikipedia:
http://en.wikipedia.org/wiki/Certified_Information_Systems_Security_
Professional
CSSLP (Certified Secure Software Lifecycle Professional) Certification
https://www.isc2.org/csslp/Default.aspx
Certification Programs
https://www.isc2.org/credentials/default.aspx
International Information Systems Security Certification Consortium
https://www.isc2.org/
Wikipedia: http://en.wikipedia.org/wiki/(ISC)%C2%B2
Eleventh Hour CISSP Study Guide, Second Edition
Eric Conrad, Seth Misenar, and Joshua Feldman
Elsevier, 2014, ISBN 978-0-12-417142-8
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124171428
http://www.sciencedirect.com/science/book/9780124171428

CISSP Practice Exams, Second Edition


Shon Harris
McGraw-Hill, 2013, ISBN 9780071792349
**** Login to books24X7 digital library
**** and search on the ISBN number above
************************************
CISSP Allin-One Exam Guide, Sixth Edition
Shon Harris
McGraw-Hill, 2013, ISBN 9780071781749
**** Login to books24X7 digital library
**** and search on the ISBN number above
************************************
CSSLP Certification Allin-One Exam Guide
Wm. Arthur Conklin and Dan Shoemaker
McGraw-Hill, 2013, ISBN 9780071760263
**** Login to books24X7 digital library
**** and search on the ISBN number above
************************************

Top of Shelf
Top of Section
=======================================

Programming ==========================
Foundations of Security: What Every Programmer Needs to Know
Neil Daswani, Christoph Kern, and Anita Kesavan
Springer, 2007, ISBN 978-1-4302-0377-3
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4302-0377-3
http://dx.doi.org/10.1007/978-1-4302-0377-3
Violent Python: A Cookbook for Hackers, Forensic Analysts,
Penetration Testers and Security Engineers
TJ. OConnor
Elsevier, 2013, ISBN 978-1-59749-957-6
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499576
http://www.sciencedirect.com/science/book/9781597499576
Gray Hat Python: Python Programming for Hackers and Reverse
Engineers
Justin Seitz
No Starch Press, 2009, ISBN 9781593271923
**** Login to books24X7 digital library
**** and search on the ISBN number above
************************************
24 Deadly Sins of Software Security: Programming Flaws
and How to Fix Them
Michael Howard and David LeBlanc
McGraw-Hill, 2010, ISBN 9780071626750
http://www.accessengineeringlibrary.com.databases.poly.edu/browse/
24-deadly-sins-of-software-security-programming-flaws-and-how-tofix-them

http://www.accessengineeringlibrary.com/browse/24-deadly-sins-ofsoftware-security-programming-flaws-and-how-to-fix-them
Cryptography in C and C++
Michael Welschenbach
Springer, 2005, ISBN 978-1-4302-0026-0
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4302-0026-0
http://dx.doi.org/10.1007/978-1-4302-0026-0
Coding for Penetration Testers: Building Better Tools
Jason Andress and Ryan Linn
Elsevier, 2012, ISBN 978-1-59749-729-9
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597497299
http://www.sciencedirect.com/science/book/9781597497299
Web Application Obfuscation
Mario Heiderich, Eduardo Alberto Vela Nava,
Gareth Heyes, and David Lindsay
Elsevier, 2011, ISN 978-1-59749-604-9
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597496049
http://www.sciencedirect.com/science/book/9781597496049
Introduction to Reliable and Secure Distributed Programming,
Second Edition
Christian Cachin, Rachid Guerraoui, and Luis Rodrigues
Springer, 2011, ISBN 978-3-642-15260-3
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-15260-3
http://dx.doi.org/10.1007/978-3-642-15260-3
Advanced API Security: Securing APIs with OAuth 2.0,

OpenID Connect, JWS, and JWE


Prabath Siriwardena
Springer, 2014, ISBN 978-1-4302-6817-8
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4302-6817-8
http://dx.doi.org/10.1007/978-1-4302-6817-8
Securing the Tangled Web: Preventing script injection
vulnerabilities through software design
Christopher Kern
Pages 38-47
Communications of the ACM, Volume 57, Number 9 (September 2014)
http://dx.doi.org.databases.poly.edu/10.1145/2643134
http://dx.doi.org/10.1145/2643134

Top of Shelf
Top of Section
=======================================
Mathematics for Cryptography ============
Mathematics of Public Key Cryptography
Steven D. Galbraith
Cambridge University Press, 2012, ISBN 9781139013926
http://dx.doi.org.databases.poly.edu/10.1017/CBO9781139012843
http://dx.doi.org/10.1017/CBO9781139012843
Functional Encryption: A New Vision for Public-Key Cryptography
Dan Boneh, Amit Sahai, and Brent Waters
Communications of the ACM,

Volume 55, Number 11 (November 2012)


Pages 56-64
http://dl.acm.org.databases.poly.edu/citation.cfm?id=2366333
http://dl.acm.org/citation.cfm?id=2366333
Concepts and Calculation in Cryptography
Dan Grundy
PhD Thesis, University of Kent (March 2008)
http://www.cs.kent.ac.uk/people/staff/eab2/crypto/thesis.web.pdf
Cryptography and Formal Methods Website, University of Kent
http://www.cs.kent.ac.uk/people/staff/eab2/crypto/
Elementary Number Theory: Primes, Congruences, and Secrets
William Stein (2011)
http://wstein.org/ent/
Elementary Number Theory, Cryptography and Codes
Maria Welleda Baldoni, Giro Giliberto,
and Giulia Maria Piacentini Cattaneo
Springer, 2009, ISBN 978-3-540-69200-3
http://dx.doi.org.databases.poly.edu/10.1007/978-3-540-69200-3
http://dx.doi.org/10.1007/978-3-540-69200-3
Primality Testing and Integer Factorization in Public-Key Cryptography
Song Y. Yan
Springer, 2009, ISBN 978-0-387-77268-4
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-77268-4
http://dx.doi.org/10.1007/978-0-387-77268-4
Black-Box Models of Computation in Cryptology
Tibor Jager
Springer, 2012, ISBN 978-3-8348-1990-1
http://dx.doi.org.databases.poly.edu/10.1007/978-3-8348-1990-1

http://dx.doi.org/10.1007/978-3-8348-1990-1
Codes: An Introduction to Information Communication
and Cryptography
N.L. Biggs
Springer, 2008, ISBN 978-1-84800-273-9
http://dx.doi.org.databases.poly.edu/10.1007/978-1-84800-273-9
http://dx.doi.org/10.1007/978-1-84800-273-9
Codes and Turbo Codes
Claude Berrou
Springer, 2010, ISBN 978-2-8178-0039-4
http://dx.doi.org.databases.poly.edu/10.1007/978-2-8178-0039-4
http://dx.doi.org/10.1007/978-2-8178-0039-4
A Students Guide to Coding and Information Theory
Stefan M. Moser and Po-Ning Chen
Cambridge University Press, 2012, ISBN 9781139059534
http://dx.doi.org.databases.poly.edu/10.1017/CBO9781139059534
http://ebooks.cambridge.org/ebook.jsf?bid=CBO9781139059534
Rubiks for Cryptographers
Pages 733-739
Christophe Petit and Jean-Jacques Quisquater
http://www.ams.org/notices/201306/rnoti-p733.pdf
Notices of the AMS, Volume 60, Number 6 (June/July 2013)
http://www.ams.org/notices/201306/
A Mathematical Theory of Communication
C. E. Shannon
Pages 379-423
The Bell System Technical Journal, Volume 27, Number 3 (July 1948)
http://www.alcatel-lucent.com/bstj/vol27-1948/articles/bstj27-3379.pdf

Communication Theory of Secrecy Systems


C. E. Shannon
The Bell System Technical Journal,
Volume 28, Number 4 (October 1949)
Pages 656-715
http://www.alcatel-lucent.com/bstj/vol28-1949/articles/bstj28-4656.pdf
Cryptography in Constant Parallel Time
Benny Applebaum
Springer, 2014, ISBN 978-3-642-17367-7
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-17367-7
http://dx.doi.org/10.1007/978-3-642-17367-7

Top of Shelf
Top of Section
=======================================
Cryptography ==========================
Encyclopedia of Cryptography and Security
Henk C.A. van Tilborg and Sushil Jajodia (Editors)
Springer, 2011, ISBN 978-1-4419-5906-5
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4419-5906-5
http://dx.doi.org/10.1007/978-1-4419-5906-5

Cryptography

Wikipedia:

http://en.wikipedia.org/wiki/Cryptography

A Cryptography Primer: Secrets and Promises


Philip N. Klein
Cambridge University Press, 2014, ISBN 9781139084772
http://dx.doi.org.databases.poly.edu/10.1017/CBO9781139084772
http://dx.doi.org/10.1017/CBO9781139084772
Modern Cryptography Primer: Theoretical Foundations and Practical
Applications
Czeslaw Koscielny, Miroslaw Kurkowski, and Marian Srebrny
Springer, 2013, ISBN 978-3-642-41386-5
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-41386-5
http://dx.doi.org/10.1007/978-3-642-41386-5
Cryptography and Secure Communication
Richard E. Blahut
Cambridge University Press, 2014, ISBN 9781139013673
http://dx.doi.org.databases.poly.edu/10.1017/CBO9781139013673
http://dx.doi.org/10.1017/CBO9781139013673
Visual Cryptography for Image Processing and Security: Theory,
Methods, and Applications
Feng Liu and Wei Qi Yan
Springer, 2014, ISBN 978-3-319-09644-5
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-09644-5
http://dx.doi.org/10.1007/978-3-319-09644-5
The Growth of Cryptography
Ronald Rivest, Erna Viterbi Professor of Electrical Engineering and
Computer Science, Massachusetts Institute of Technology
http://www.youtube.com/watch?v=D4HcvehEU9c

TURING CENTENNIAL CELEBRATION


Princeton University (May 10-12, 2012)
http://www.princeton.edu/turing/index.xml
Public Key Cryptography: Applications and Attacks
Lynn Margaret Batten
Wiley, 2013, ISBN 9781118482261
http://dx.doi.org.databases.poly.edu/10.1002/9781118482261
http://dx.doi.org/10.1002/9781118482261
Introduction to Cryptography with Maple
Jose Luis Gomes Pardo
Springer, 2013, ISBN 978-3-642-32166-5
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-32166-5
http://dx.doi.org/10.1007/978-3-642-32166-5
Understanding Cryptography: A Textbook for Students and
Practitioners
Christof Paar and Jan Pelzl
Springer, 2010, ISBN 978-3-642-04101-3
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-04101-3
http://dx.doi.org/10.1007/978-3-642-04101-3
A Classical Introduction to Cryptography
Serge Vaudeney
Springer, 2006, ISBN 978-0-387-25880-5
http://dx.doi.org.databases.poly.edu/10.1007/b136373
http://dx.doi.org/10.1007/b136373
A Classical Introduction to Cryptography Exercise Book
Thomas Baigneres, Pascal Junod, Yi Lu, Jean Monnerat, and Serge
Vaudenay

Springer, 2006, ISBN 978-0-387-28835-2


http://dx.doi.org.databases.poly.edu/10.1007/0-387-28835-X
http://dx.doi.org/10.1007/0-387-28835-X
Introduction to Cryptography: Principles and Applications
Hans Delfs and Helmut Knebl
Springer, 2007, ISBN 978-3-540-49244-3
http://dx.doi.org.databases.poly.edu/10.1007/3-540-49244-5
http://dx.doi.org/10.1007/3-540-49244-5
Decrypted Secrets: Methods and Maxims of Cryptology
Friedrich Bauer
Springer, 2007, ISBN 978-3-540-48121-8
http://dx.doi.org.databases.poly.edu/10.1007/978-3-540-48121-8
http://dx.doi.org/10.1007/978-3-540-48121-8
An Introduction to Mathematical Cryptography, Second Edition
Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman
Springer, 2014, ISBN 978-1-4939-1711-2
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4939-1711-2
http://dx.doi.org/10.1007/978-1-4939-1711-2
Foundations of Cryptography: Basic Tools
Oded Goldreich
Cambridge University Press, 2001, ISBN 9780511546891
http://dx.doi.org.databases.poly.edu/10.1017/CBO9780511546891
http://dx.doi.org/10.1017/CBO9780511546891
Foundations of Cryptography II: Basic Applications
Oded Goldreich
Cambridge University Press, 2004, ISBN 9780511721656
http://dx.doi.org.databases.poly.edu/10.1017/CBO9780511721656

http://dx.doi.org/10.1017/CBO9780511721656
Algebraic Cryptanalysis
Gregory V. Bard
Springer, 2009, ISBN 978-0-387-88757-9
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-88757-9
http://dx.doi.org/10.1007/978-0-387-88757-9
Identity-Based Encryption
Sanjit Chatterjee and Palash Sarkar
Springer, 2011, ISBN 978-1-4419-9383-0
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4419-9383-0
http://dx.doi.org/10.1007/978-1-4419-9383-0
Adaptive Cryptographic Access Control
Anne V.D.M. Kayem, Selim G. Akl, and Patrick Martin
Springer, 2010, ISBN 978-1-4419-6655-1
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4419-6655-1
http://dx.doi.org/10.1007/978-1-4419-6655-1
Practical Signcryption
Alexander W. Dent and Yuliang Zheng (Editors)
Springer, 2010, ISBN 978-3-540-89411-7
http://dx.doi.org.databases.poly.edu/10.1007/978-3-540-89411-7
http://dx.doi.org/10.1007/978-3-540-89411-7
Cryptography: all-out attacks or how to attack cryptography
without intensive cryptanalysis
Pages 207-237
Jean-Baptiste Bedrune, Eric Filiol, and Frederic Raynal
Journal in Computer Virology, Volume 6, Number 3 (August 2010)
http://dx.doi.org.databases.poly.edu/10.1007/s11416-008-0117-x
http://dx.doi.org/10.1007/s11416-008-0117-x

Brute Force: Cracking the Data Encryption Standard


Matt Curtin
Springer, 2005, ISBN 978-0-387-27160-6
http://dx.doi.org.databases.poly.edu/10.1007/b138699
http://dx.doi.org/10.1007/b138699
Cryptanalytic Attacks on RSA
Song Y. Yan
Springer, 2010, ISBN 978-0-387-48742-7
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-48742-7
http://dx.doi.org/10.1007/978-0-387-48742-7
Quantum Attacks on Public-Key Cryptosystems
Song Y. Yan
Springer, 2013, ISBN 978-1-4419-7722-9
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4419-7722-9
http://dx.doi.org/10.1007/978-1-4419-7722-9
Stream Ciphers
Andreas Klein
Springer, 2013, ISBN 978-1-4471-5079-4
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4471-5079-4
http://dx.doi.org/10.1007/978-1-4471-5079-4
The Block Cipher Companion
Lars R. Knudsen and Matthew J.B. Robshaw
Springer, 2011, ISBN 978-3-642-17342-4
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-17342-4
http://dx.doi.org/10.1007/978-3-642-17342-4
Cryptography for Network Security: Failures,

Successes and Challenges


Bart Preneel
Pages 36-54
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-14706-7_4
http://dx.doi.org/10.1007/978-3-642-14706-7_4
From NLP (Natural Language Processing) to MLP (Machine Language
Processing)
Peter Teufl, Udo Payer, and Guenter Lackner
Pages 256-269
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-14706-7_20
http://dx.doi.org/10.1007/978-3-642-14706-7_20

Computer Network Security: MMM-ACNS 2010


Igor Kotenko and Victor Skormin (Editors)
Springer, 2010, ISBN 98703-642-14706-7, LNCS 6258
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-14706-7
http://dx.doi.org/10.1007/978-3-642-14706-7
Fault Analysis in Cryptography
Marc Joye and Michael Tunstall (Editors)
Springer, 2012, ISBN 978-3-642-29656-7
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-29656-7
http://dx.doi.org/10.1007/978-3-642-29656-7
Handbook of Applied Cryptography
Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone
CRC Press, 1996 (Fifth Printing, August 2001, ISBN 0-8493-8523-7
http://cacr.uwaterloo.ca/hac/
Website of Alfred Menezes
http://www.math.uwaterloo.ca/~ajmeneze/
Analysis and Design of Cryptographic Hash Functions
PhD Thesis, 1993 book in progress
Bart Preneel
http://homes.esat.kuleuven.be/~preneel/phd_preneel_feb1993.pdf

Bart Preneels Home Page


http://homes.esat.kuleuven.be/~preneel/
Merkle-Damgard Revisited: How to Construct a Hash Function
Jean-Sebastien Coron, Yevgeniy Dodis,
Cecile Malinaud, and Prashant Puniya
Advancess in Cryptology Crypto 2005
Pages 430-448
Springer, 2005, ISBN 978-3-540-31870-5, LNCS 3621
http://dx.doi.org.databases.poly.edu/10.1007/11535218_26
http://dx.doi.org/10.1007/11535218_26
The Computational Lens Pauli Lectures, ETH Zurich
The P vs. NP Problem: Efficient Computation, Internet Security,
and the Limits to Human Knowledge (May 7, 2012)
http://www.youtube.com/watch?v=pTeZP-XfuKI
Cryptography: Secrets and Lies, Knowledge and Trust (May 8, 2012)
http://www.youtube.com/watch?v=Eu_j5_tains
Randomness the Utility of Unpredictability (May 10, 2012)
http://www.youtube.com/watch?v=ZzsFb-6wvoE
Professor Avi Wigderson, Institute for Advanced Study
Website:
http://www.math.ias.edu/avi/
DBLP:
http://www.informatik.unitrier.de/~ley/pers/hd/w/Wigderson:Avi.html

Top of Shelf
Top of Section

=======================================

History of Cryptology ====================


Cryptology: The Mathematics of Secure Communication
Gustavus J. Simmons
The Mathematical Intelligencer,
Volume 1, Number 4 (December 1979)
http://dx.doi.org.databases.poly.edu/10.1007/BF03028244
http://dx.doi.org/10.1007/BF03028244
Abraham Lincolns Cyphering Book and Ten other Extraordinary
Cyphering Books
Nerida F. Ellerton and M. A. (Ken) Clements
Springer, 2014, ISBN 978-3-319-02502-5
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-02502-5
http://dx.doi.org/10.1007/978-3-319-02502-5
Code Breaking in the Pacific
Peter Donovan and John Mack
Springer, 2014, ISBN 978-3-319-08278-3
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-08278-3
http://dx.doi.org/10.1007/978-3-319-08278-3

Top of Shelf
Top of Section
=======================================

Alice and Bob in Cipherspace =============


This shelf contains the original article, links to the articles
bibliography, and links to additional items I consider relevant and
useful.
Alice and Bob in Cypherspace
Brian Hayes
Pages 362-367
American Scientist, Volume 100, Number 5 (September-October 2012)
http://www.americanscientist.org/issues/pub/2012/5/alice-and-bobin-cipherspace
Computing Science column and book reviews
http://www.americanscientist.org/issues/issue_byAuthor_list.aspx?aut
horID=6660&pageID=1
Website
http://bit-player.org/
Evaluating 2-DNF Formulas on Ciphertexts
Dan Boneh, Eu-Jin Coh, and Kobbi Nissim
Pages 325-341
http://dx.doi.org.databases.poly.edu/10.1007/978-3-540-30576-7_18
http://dx.doi.org/10.1007/978-3-540-30576-7_18
Theory of Cryptography: Second Theory of Cryptography Conference,
TCC 2005
Joe Kilian (Editor)
Springer, 2005, ISBN 978-3-540-30576-7, LNCS 3378
http://dx.doi.org.databases.poly.edu/10.1007/b106171
http://dx.doi.org/10.1007/b106171
Fully Homomorphic Encryption without Bootstrapping: ITCS 2012
Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan
http://eprint.iacr.org/2011/277.pdf

Fully Homomorphic Encryption from Ring-LWE and Security for Key


Dependent Messages: Crypto 2011
Zvika Brakerski and Vinod Vaikuntanathan
http://www.stanford.edu/~zvika/localpapers/IdealHom.pdf
Homepage of Zvika Brakerski
http://www.stanford.edu/~zvika/
Public Key Compression and Modulus Switching for Fully
Homomorphic Encryption over the Integers
Pages 446-464
Jean-Sebastien Coron, David Naccache, and Mehdi Tibouchi
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-29011-4_27
http://dx.doi.org/10.1007/978-3-642-29011-4_27
Fully Homomorphic Encryption with Polylog Overhead
Craig Gentry, Shai Halevi, and Nigel P. Smart
Pages 465-482
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-29011-4_28
http://dx.doi.org/10.1007/978-3-642-29011-4_28
Advances in Cryptology EUROCRYPT 2012
David Pointcheval and Thomas Johansson (Editors)
Springer, 2012, ISBN 978-3-642-29011-4, LNCS 7237
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-29011-4
http://dx.doi.org/10.1007/978-3-642-29011-4
Public Key Compression and Modulus Switching for Fully
Homomorphic Encryption over the Integers Talk at EUROCRYPT 2012
Jean-Sebastien Coron
http://www.youtube.com/watch?v=SDIXprI3D7k
Fully Homomorphic Encryption with Polylog Overhead Talk at
EUROCRYPT 2012
http://www.youtube.com/watch?v=dIUU24jBFok
Talks at EUROCRYPT 2012

http://www.youtube.com/watch?v=X2W8YEppLbI&feature=list_other
&playnext=1&list=SPC73BF951C580030A
A Fully Homomorphic Scheme
Ph.D. Dissertation, Department of Computer Science, Stanford
University (September 2009)
Craig Gentry
http://crypto.stanford.edu/craig/
Fully Homomorphic Encryption Using Ideal Lattices
Proceedings of the 41st Annual ACM Symposium on Theory of
Computing
(STOC 2009)
Craig Gentry Pages 169-178
http://dx.doi.org.databases.poly.edu/10.1145/1536414.1536440
http://dx.doi.org/10.1145/1536414.1536440
Implementing Gentrys Fully-Homomorphic Encryption Scheme
Craig Gentry and Shai Halevi
Pages 129-148
http://www.springerlink.com.databases.poly.edu/content/961007012q
743401/
http://www.springerlink.com/content/961007012q743401/
Advances in Cryptology EUROCRYPT 2011
Kenneth G. Paterson (Editor)
Springer, 2011, ISBN 978-3-642-20464-7, LNCS 6632
http://www.springerlink.com.databases.poly.edu/content/978-3-64220464-7/contents/
http://www.springerlink.com/content/978-3-642-20464-7/contents/
Probabilistic Encryption & How To Play Mental Poker
Keeping Secret All Partial Information

Proceedings of the 14th Annual ACM Symposium on Theory of


Computing (STOC 1982)
Shafi Goldwasser and Silvio Micali
Pages 365-377
http://dl.acm.org.databases.poly.edu/citation.cfm?id=802212
http://dl.acm.org/citation.cfm?id=802212
The Story of Alice and Bob
John Gordon
http://www.johngordonsweb.co.uk/concept/alicebob.html
Concept Laboratories
http://www.johngordonsweb.co.uk/concept/index.html
Can Homomorphic Encryption be Practical?
Proceedings of the 3rd ACM Workshop on
Cloud Computing Security (CCSW 2011)
Pages 113-124
Kristin Lauter, Michael Naehrig, and Vinod Vaikuntanathan
http://dx.doi.org.databases.poly.edu/10.1145/2046660.2046682
http://dx.doi.org/10.1145/2046660.2046682
On Data Banks and Privacy Homomorphisms
Ronald L. Rivest, Len Adleman, and Michael L. Detouzos
http://people.csail.mit.edu/rivest/RivestAdlemanDertouzosOnDataBanksAndPrivacyHomomorphisms.pdf
Home Page of L. Rivest
http://people.csail.mit.edu/rivest/
Google Scholar
http://scholar.google.com/citations?user=6qE0tdAAAAAJ&hl=en
Wikipedia:
http://en.wikipedia.org/wiki/Ron_Rivest
Fully Homomorphic Encryption over the Integers
Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-13190-5_2

http://dx.doi.org/10.1007/978-3-642-13190-5_2
Advances in Cryptology EUROCRYPT 2010
Henri Gilbert (Editor)
Springer, 2010, ISBN 978-3-642-13190-5, LNCS 6110
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-13190-5
http://dx.doi.org/10.1007/978-3-642-13190-5
Fully Homomorphic Encryption with Relatively
Small Key and Ciphertext Sizes
Nigel P. Smart and Frederick Vercauteren
Pages 420-443
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-13013-7_25
http://dx.doi.org/10.1007/978-3-642-13013-7_25
Public Key Cryptography PKC 2010
Phong Q. Nguyen and David Pointcheval (Editors)
Springer, 2010, ISBN 978-3-642-13012-0, LNCS 6056
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-13013-7
http://dx.doi.org/10.1007/978-3-642-13013-7
Home Page of Nigel Smart
(Contains an online version of his book
Cryptography, An Introduction: Third Edition)
http://www.cs.bris.ac.uk/~nigel/
Computing Blindfolded: New Developments in Fully
Homomorphic Encryption
Vinod Vaikuntanathan
http://www.cs.toronto.edu/~vinodv/FHE-focs-survey.pdf
Homepage of Vinod Vaikuntanathan
http://www.cs.toronto.edu/~vinodv/
Homomorphic Encryption Tutorial (Crypto 2011)
Shai Halevi, IBM Research

http://www.youtube.com/watch?v=jIWOR2bGC7c
http://www.youtube.com/watch?v=huLGjBpj3Os

Part 1
Part 2

Fully Homomorphic Encryption


Shai Halevi, IBM Research
http://www.youtube.com/watch?v=R5jaHNC_neI
http://www.youtube.com/watch?v=1UDZko9jW5w

Part 1
Part 2

Winter School on Secure Computation and Efficiency


Professor Yehuda Lindell,
Department of Computer Science, Bar-Ilan University
http://www.youtube.com/watch?v=z3U-5mf6hGw
Encrypted Messages from the Heights of Cryptomania
Craig Gentry
Pages 120-121
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-36594-2_7
http://dx.doi.org/10.1007/978-3-642-36594-2_7
Theory of Cryptography,
10th Theory of Cryptography Conference, TCC2013
Amit Sahai (Editor)
Springer, 2013, ISBN 978-3-642-36594-2, LNCS 7785
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-36594-2
http://dx.doi.org/10.1007/978-3-642-36594-2

Top of Shelf
Top of Section
=======================================

How to Share a Secret ===================


Chapter 17 How to Share a Secret
Johannes Blomer
Pages 159-168
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-15328-0_17
http://dx.doi.org/10.1007/978-3-642-15328-0_17

Algorithms Unplugged
B. Vocking et al. (Editors)
Springer, 2011, ISBN 978-3-642-15328-0
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-15328-0
http://dx.doi.org/10.1007/978-3-642-15328-0

How to Share a Secret


Adi Shamir
Pages 612-613
http://dx.doi.org.databases.poly.edu/10.1145/359168.359176
http://dx.doi.org/10.1145/359168.359176
Communications of the ACM,
Volume 22, Number 11 (November 1979)

Safeguarding cryptographic keys


G. R. Blakley
Proceedings AFIPS 1979 National Computer Conference
http://dx.doi.org.databases.poly.edu/10.1109/AFIPS.1979.98
http://dx.doi.org/10.1109/AFIPS.1979.98
The breadth of Shamirs secret-sharing scheme
Ed Dawson and Diane Donovan
Pages 69-78
http://dx.doi.org.databases.poly.edu/10.1016/0167-4048(94)90097-3
http://dx.doi.org/10.1016/0167-4048(94)90097-3
Computers & Security, Volume 13, Number 1 (February 1994)

How to Leak a Secret: Theory and Applications of Ring Signatures


Ronald L. Rivest, Adi Shamir, and Yael Tauman
Pages 164-186
http://dx.doi.org.databases.poly.edu/10.1007/11685654_7
http://dx.doi.org/10.1007/11685654_7
Theoretical Computer Science: Essays in Memory of Shimon Even
Oded Goldreich, Arnold L. Rosenberg, and Alan M. Selman (Editors)
Springer, 2006, ISBN 978-3-540-32881-0
http://dx.doi.org.databases.poly.edu/10.1007/11685654
http://dx.doi.org/10.1007/11685654
Secret swarm unit: Reactive k-secret sharing
Shlomi Dolev, Limor Lahiani, and Moti Yung
Pages 1291-1305
http://dx.doi.org.databases.poly.edu/10.1016/j.adhoc.2012.03.011
http://dx.doi.org/10.1016/j.adhoc.2012.03.011
Ad Hoc Networks, Volume 10, Number 7 (September 2012)

Top of Shelf
Top of Section
=======================================
Privacy ===============================
How Should We Think about Privacy?
Jaron Lanier
Pages 64-71
Scientific American, Volume 309, Number 5 (November 2013)
http://dx.doi.org.databases.poly.edu/10.1038/scientificamerican111364

http://dx.doi.org/10.1038/scientificamerican1113-64
Home page of Jaron Lanier
http://www.jaronlanier.com/
Wikipedia:
http://en.wikipedia.org/wiki/Jaron_Lanier

The Data-Driven Society


Alex Sandy Pentland
Pages 78-83
Scientific American, Volume 309, Number 4 (October 2013)
http://dx.doi.org.databases.poly.edu/10.1038/scientificamerican101378
http://dx.doi.org/10.1038/scientificamerican1013-78

Uniquely Me! How much information does it take to


single out one person among billions?
Brian Hayes
American Scientist, Volume 102, Number 2 (March-April 2014)
http://dx.doi.org/10.1511/2014.107.106

How Companies Learn Your Secrets


Charles Duhigg
New York Times Magazine (February 16, 2012)
http://www.nytimes.com/2012/02/19/magazine/shoppinghabits.html?pagewanted=all

Browse at Your Own Risk


Nick Nikiforakis and Gunes Acar
IEEE Spectrum, Volume 51, Number 8 (August 2014)
http://dx.doi.org.databases.poly.edu/10.1109/MSPEC.2014.6866435
http://dx.doi.org/10.1109/MSPEC.2014.6866435

The End of Privacy

TED Radio Hour (September 26, 2014)


http://www.npr.org/programs/ted-radio-hour/265352348/the-end-ofprivacy?showDate=2014-09-26
Against the Hypothesis of the End of Privacy: An Agent-Based
Modelling Approach to Social Media
Paola Tubaro, Antonio A. Casilli, and Yasaman Sarabi
Springer, 2014, ISBN 978-3-319-02456-1
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-02456-1
http://dx.doi.org/10.1007/978-3-319-02456-1
Can You Engineer Privacy?
Seda Gurses
Communications of the ACM, Volume 57, Number 8 (August 2014)
http://dx.doi.org.databases.poly.edu/10.1145/2633029
http://dx.doi.org/10.1145/2633029
The Privacy Engineers Manifesto: Getting from Policy to
Code to QA to Value
Michelle Finneran Dennedy, Jonathan Fox, and Thomas R. Finneran
Springer, 2014, ISBN 978-1-4302-6356-2
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4302-6356-2
http://dx.doi.org/10.1007/978-1-4302-6356-2
Privacy Technologies and Policy First Annual Privacy Forum,
APF 2012
Bart Prenel and Demosthenes Ikonomou (Editors)
Springer, 2014, ISBN 978-3-642-54069-1, LNCS 8319
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-54069-1
http://dx.doi.org/10.1007/978-3-642-54069-1
Privacy Technologies and Policy Second Annual Privacy Forum,

APF 2014
Bart Prenel and Demosthenes Ikonomou (Editors)
Springer, 2014, ISBN 978-3-319-06749-0, LNCS 8450
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-06749-0
http://dx.doi.org/10.1007/978-3-319-06749-0
Privacy, Big Data, and the Public Good: Frameworks for Engagement
Julia lane, Victoria Stodden, Stefan Bender, and Helen Neissenbaum
(Editors)
Cambridge University Press, 2014, ISBN 9781107590205
http://dx.doi.org.databases.poly.edu/10.1017/CBO9781107590205
http://dx.doi.org/10.1017/CBO9781107590205
Facebook Nation: Total Information Awareness
Newton Lee
Springer, 2013, ISBN 978-1-4614-5308-6
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-5308-6
http://dx.doi.org/10.1007/978-1-4614-5308-6
The Basics of Digital Privacy: Simple Tools to Protect Your
Personal Information and Your Identity Online
Denny Cherry
Elsevier, 2014, ISBN 978-0-12-800011-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128000113
http://www.sciencedirect.com/science/book/9780128000113
Unauthorized Access: The Crisis in Online Privacy and Security
Robert H. Sloan and Richard Warner
CRC Press, 2014, ISBN 978-1-4398-3014-7
http://dx.doi.org.databases.poly.edu/10.1201/b15148
http://dx.doi.org/10.1201/b15148

Electronic Identity
Norberto Nuno Gomes de Andrade, Lisha Chen-Wilson,
David Argles, Gary Wills, and Michele Schiano di Zenise
Springer, 2014, ISBN 978-1-4471-6449-4
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4471-6449-4
http://dx.doi.org/10.1007/978-1-4471-6449-4
Emerging Pervasive Information and Communication Technologies
(PICT): Ethical Challenges, Opportunities and Safeguards
Kenneth D. Pimple (Editor)
Springer, 2014, ISBN 978-94-007-6833-8
http://dx.doi.org.databases.poly.edu/10.1007/978-94-007-6833-8
http://dx.doi.org/10.1007/978-94-007-6833-8
Anonymization
Rolf H. Weber and Ulrike I. Heinrich
Springer, 2012, ISBN 978-1-4471-4066-5
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4471-4066-5
http://dx.doi.org/10.1007/978-1-4471-4066-5
Practical Anonymity: Hiding in Plain Sight Online
Peter Loshin
Elsevier, 2013, ISBN 978-0-12-410404-4
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124104044
http://www.sciencedirect.com/science/book/9780124104044
On Anonymity in an Electronic Society: A Survey of
Anonymous Communication Systems
Matthew Edman and Bulent Yener
ACM Computing Surveys, Volume 42, Number 1 (December 2009)

http://dx.doi.org.databases.poly.edu/10.1145/1592451.1592456
http://dx.doi.org/10.1145/1592451.1592456
SmartData: Privacy Meets Evolutionary Robotics
Inman Harvey, Ann Cavoukian, George Tomko, Don Borett,
Hon Kwan, and Dimitrios Hatzinalos (Editors)
Springer, 2013, ISBN 978-1-4614-6409-9
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-6409-9
http://dx.doi.org/10.1007/978-1-4614-6409-9
Security and Privacy for Augmented Reality Systems
Franciska Roesner, Tadayoshi Kohno, and David Molnar
Communications of the ACO, Volume 57, Number 4 (April 2014)
http://dx.doi.org.databases.poly.edu/10.1145/2580723.2580730
http://dx.doi.org/10.1145/2580723.2580730
Chapter 13 Privacy for Reporters of Human Rights Abuses:
Identity and Anonymity in Mobile Networks
Leonardo Martucci and Simone Fischer-Hubner
Pages 181-199
http://dx.doi.org.databases.poly.edu/10.1007/978-94-007-1384-0_13
http://dx.doi.org/10.1007/978-94-007-1384-0_13
Mobile Technologies for Conflict Management: Online
Dispute Resolution, Governance, Participation
Marta Poblet (Editor)
Springer, 2011, ISBN 978-94-007-1384-0
http://dx.doi.org.databases.poly.edu/10.1007/978-94-007-1384-0
http://dx.doi.org/10.1007/978-94-007-1384-0
Privacy in Social Networks
Elena Zheleva, Evimaria Terzi, and Lise Getoor
Morgan & Claypool, 2012, ISBN 9781608458639

http://dx.doi.org.databases.poly.edu/10.2200/S00408ED1V01Y201203
DMK004
http://dx.doi.org/10.2200/S00408ED1V01Y201203DMK004
Privacy Online: Perspectives on Privacy and Self-Disclosure
in the Social Web
Sabine Trepte and Leonard Reinecke (Editors)
Springer, 2011, ISBN 978-3-642-21521-6
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-21521-6
http://dx.doi.org/10.1007/978-3-642-21521-6
Special Issue on Digital Privacy: theory, policies and technologies
Travis D. Breaux, Annie I. Anton, Stefanos Gritzalis, and John
Mylopoulos
Requirements Engineering, Volume 16, Number 1 (March 2011)
http://link.springer.com.databases.poly.edu/journal/766/16/1/
http://link.springer.com/journal/766/16/1/
Privacy and Identity Management for Life
Jan Camemisch, Simone Fischer-Hubner, and Kai Rannenberg (Editors)
Springer, 2011, ISBN 978-3-642-20317-6
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-20317-6
http://dx.doi.org/10.1007/978-3-642-20317-6
Special Issue on Trust and Privacy in Electronic Commerce
Peter Herrmann and Mozhgan Tavakolifard
Electronic Commerce Research,
Volume 10, Numbers 3-4 (December 2010)
http://link.springer.com.databases.poly.edu/journal/10660/10/3/
http://link.springer.com/journal/10660/10/3/
Quo vadis, data privacy?

Johannes Gehrke
Blavatnik Awards for Young Scientists 2011
Annals of the New York Academy of Sciences,
Volume 1260, Number 1 (July 2012)
http://dx.doi.org.databases.poly.edu/10.1111/j.17496632.2012.06630.x
http://dx.doi.org/10.1111/j.1749-6632.2012.06630.x
Privacy and Technologies of Identity: A Cross-Disciplinary
Conversation
Katherine J. Strandburg and Daniela Stan Raicu
Springer, 2006, ISBN 978-0-387-28222-0
http://dx.doi.org.databases.poly.edu/10.1007/0-387-28222-X
http://dx.doi.org/10.1007/0-387-28222-X
Deeplinks Blog posts about Biometrics
https://www.eff.org/deeplinks/biometrics
Deeplinks Topics
https://www.eff.org/deeplinks/archives
Electronic Frontier Foundation
https://www.eff.org/

Top of Shelf
Top of Section
=======================================
Data Privacy ===========================

Data privacy
Vicenc Torra and Guillermo Navarro-Arribas
Wiley Interdisciplinary Reviews: Data Mining and Knowledge
Discovery,
Volume 4, Number 4 (July/August 2014) Pages 269-340
http://dx.doi.org.databases.poly.edu/10.1002/widm.1129
http://dx.doi.org/10.1002/widm.1129
Chapter 2 A General Survey of Privacy-Preserving Data Mining:
Models and Algorithms
Charu C. Aggarwal and Philip S. Yu
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-70992-5_2
http://dx.doi.org/10.1007/978-0-387-70992-5_2
Privacy-Preserving Data Mining: Models and Algorithms
Charu C. Aggarwal and Philip S. Yu (Editors)
Springer, 2008, ISBN 978-0-387-70992-5
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-70992-5
http://dx.doi.org/10.1007/978-0-387-70992-5
Home Page of Charu C. Aggarwal
http://charuaggarwal.net/
Privacy-Preserving Data Mining
Jaideep Vaidya, Chris Clifton, and Michael Zhu
Springer, 2006, ISBN 978-0-387-29489-6
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-29489-6
http://dx.doi.org/10.1007/978-0-387-29489-6
Statistical Confidentiality: Principles and Practice
George T. Duncan, Mark Elliot, Juan-Jose Salazar-Gonzalez
Springer, 2011, ISBN 978-1-4419-7802-8
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4419-7802-8

http://dx.doi.org/10.1007/978-1-4419-7802-8
Elements of Statistical Disclosure Control
Leon Willenborg and Ton de Waal
Springer, 2001, ISBN 978-1-4613-0121-9
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4613-0121-9
http://dx.doi.org/10.1007/978-1-4613-0121-9
Chapter 5 Disclosure Control Methods and
Information Loss for Microdata
Josep Domingo-Ferrer and Vicenc Torra
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.91.1046
Confidentiality, Disclosure, and Data Access: Theory and Practical
Applications for Statistical Agencies
P. Doyle, J. Lane, J. Theeuwes, and L. Zayatz (Editors)
Elsevier, 2001, ISBN 978-0444507617
Information Fusion in the Context of Data Privacy
Pages 235-244
Guillermo Navarro-Arribas and Vicenc Torra (editors)
Information Fusion, Volume 13, Number 4 (October 2012)
http://www.sciencedirect.com.databases.poly.edu/science/article/pii/S
1566253512000024
http://www.sciencedirect.com/science/article/pii/S1566253512000024
The Dining Cryptographers Problem:
Unconditional Sender and Recipient Untraceability
David Chaum
Pages 65-75
Journal of Cryptology, Volume 1, Number 1 (January 1988)
http://dx.doi.org.databases.poly.edu/10.1007/BF00206326
http://dx.doi.org/10.1007/BF00206326
Dining cryptographers problem

Wikipedia:
http://en.wikipedia.org/wiki/Dining_cryptographers_problem
Untraceable Electronic Mail, Return Addresses,
and Digital Pseudonyms
David L. Chaum
Pages 84-90
Communications of the ACM, Volume 24, Number 2 (February 1981)
http://dx.doi.org.databases.poly.edu/10.1145/358549.358563
http://dx.doi.org/10.1145/358549.358563
David Chaum
Wikipedia:
http://en.wikipedia.org/wiki/David_Chaum
Differential Privacy
Cynthia Dwork
Pages 1-12
http://dx.doi.org.databases.poly.edu/10.1007/11787006_1
http://dx.doi.org/10.1007/11787006_1
Automata, Languages and Programming:
33rd International Colloquium, ICALP 2006; Proceedings, Part II
Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener
(Editors)
Springer, 2006, ISBN 978-3-540-35908-1, LNCS 4052
http://dx.doi.org.databases.poly.edu/10.1007/11787006
http://dx.doi.org/10.1007/11787006
Cynthia Dwork
Wikipedia:
http://en.wikipedia.org/wiki/Cynthia_Dwork
DBLP:
http://www.informatik.unitrier.de/~ley/pers/hd/d/Dwork:Cynthia
Privacy Challenges in RFID
Gildas Avoine

Pages 1-8

http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-28879-1_1
http://dx.doi.org/10.1007/978-3-642-28879-1_1
Data Privacy Management and Autonomous Spontaneus Security:
DPM 2011 and SETOP 2011, Revised Selected Papers
Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas,
Nora Cuppens-Boulahia, and Sabrina de Capitani di Vimercati (Editors)
Springer, 2012, ISBN 978-3-642-28879-1, LNCS 7122
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-28879-1
http://dx.doi.org/10.1007/978-3-642-28879-1
Advanced Research in Data Privacy
Guillermo Navarro-Arribas and Vicenc Torra (Editors)
Springer, 2015, ISBN 978-3-319-09885-2
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-09885-2
http://dx.doi.org/10.1007/978-3-319-09885-2

Top of Shelf
Top of Section
=======================================
Security Science ========================
Security Science: The Theory and Practice of Security
Clifton L Smith and David J Brooks
Elsevier, 2013, ISBN 978-0-12-394436-8
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
123944368
http://www.sciencedirect.com/science/book/9780123944368

Security for Business Professionals: How to Plan, Implement,


and Manage Your Companys Security Program
Bradley A. Wayland
Elsevier, 2014, ISBN 978-0-12-800565-1
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128005651
http://www.sciencedirect.com/science/book/9780128005651
Integrated Security System Design: A Complete Reference for
Building Enterprise-Wide Digital Security Systems, Second Edition
Thomas Norman
Elsevier, 2014, ISBN 978-0-12-800022-9
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128000229
http://www.sciencedirect.com/science/book/9780128000229
Smart Human Security Framework Using Internet of Things,
Cloud and Fog Computing
Vivek Kumar Sehgal, Anubhav Patrick,
Ashutosh Soni, and Lucky Rajput
Pages 251-263
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-11227-5_22
http://dx.doi.org/10.1007/978-3-319-11227-5_22
Classification Mechanism for IoT Devices towards
Creating a Security Framework
V.J. Jincy and Sudharsan Sundararajan
Pages 265-277
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-11227-5_23
http://dx.doi.org/10.1007/978-3-319-11227-5_23

Intelligent Distributed Systems


Rajkumar Buyya and Sabu M. Thampi (Editors)
Springer, 2015, ISBN 978-3-319-11227-5
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-11227-5

http://dx.doi.org/10.1007/978-3-319-11227-5
Electronic Access Control
Thomas Norman
Elsevier, 2012, ISBN 978-0-12-382028-0
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
123820280
http://www.sciencedirect.com/science/book/9780123820280
Applied Crime Analysis: A Social Science Approach to
Understanding Crime, Criminals, and Victims
Wayne Petherick
Elsevier, 2015, ISBN 978-0-323-29460-7
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
323294607
http://www.sciencedirect.com/science/book/9780323294607
Misleading DNA Evidence: Reasons for Miscarriages of Justice
Peter Gill
Elsevier, 2014, ISBN 978-0-12-417214-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124172142
http://www.sciencedirect.com/science/book/9780124172142
Security Careers: Skills, Compensation, and Career Paths; Third Edition
Stephen W. Walker and James E. Fushee
Elsevier, 2014, ISBN 978-0-12-800104-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128001042
http://www.sciencedirect.com/science/book/9780128001042
Risk Analysis and the Security Survey, Fourth Edition

James F. Broder and Eugene Tucker


Elsevier, 2012, ISBN 978-0-12-382233-8
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
123822338
http://www.sciencedirect.com/science/book/9780123822338
The Managers Handbook for Business Security, Second Edition
George K. Campbell (Contributing Editor)
Elsevier, 2014, ISBN 978-0-12-800062-5
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128000625
http://www.sciencedirect.com/science/book/9780128000625
School Security: How to Build and Strengthen a School Safety Program
Paul Timm
Elsevier, 2015, ISBN 978-0-12-407811-6
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124078116
http://www.sciencedirect.com/science/book/9780124078116
The Handbook for School Safety and Security: Best Practices and
Procedures
Lawrence J. Fennelly and Mariana A. Perry (Editors)
Elsevier, 2014, ISBN 978-0-12-800568-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128005682
http://www.sciencedirect.com/science/book/9780128005682
Effective Security Management, Fifth Edition
Charles A. Sennewald
Elsevier, 2011, ISBN 978-0-12-382012-9

http://www.sciencedirect.com.databases.poly.edu/science/book/9780
123820129
http://www.sciencedirect.com/science/book/9780123820129
Security Consulting, Fourth Edition
Charles A. Sennewald
Elsevier, 2013, ISBN 978-0-12-398500-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
123985002
http://www.sciencedirect.com/science/book/9780123985002
From the Files of a Security Expert Witness
Charles A. Sennewald
Elsevier, 2014, ISBN 978-0-12-411625-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124116252
http://www.sciencedirect.com/science/book/9780124116252
Effective Physical Security, Fourth Edition
Lawrence J. Fennelly
Elsevier, 2013, ISBN 978-0-12-415892-4
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124158924
http://www.sciencedirect.com/science/book/9780124158924
CCTV: From Lights to Pixels, Third Edition
Vlado Damjanovski
Elsevier, 2014, ISBN 978-0-12-404557-6
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124045576
http://www.sciencedirect.com/science/book/9780124045576

Digital Video Surveillance and Security, Second Edition


Anthony C. Caputo
Elsevier, 2014, ISBN 978-0-12-420042-5
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124200425
http://www.sciencedirect.com/science/book/9780124200425
Security and Loss Prevention, Sixth Edition
Philip P. Purpura
Elsevier, 2013, ISBN 978-0-12-387846-5
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
123878465
http://www.sciencedirect.com/science/book/9780123878465
Profiling and Serial Crime: Theoretical and Practical Issues, Third
Edition
Wayne Petherick
Elsevier, 2013, ISBN 978-1-4557-3174-9
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
455731749
http://www.sciencedirect.com/science/book/9781455731749
Forensic Victimology: Examining Violent Crime Victims in Investigative
and Legal Contexts, Second Edition
Brent E. Turvey
Elsevier, 2014, ISBN 978-0-12-408084-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124080843
http://www.sciencedirect.com/science/book/9780124080843
Miscarriages of Justice: Actual Innocence, Forensic Evidence, and the
Law

Brent E. Turvey and Craig M. Cooley


Elsevier, 2014, ISBN 978-0-12-411558-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124115583
http://www.sciencedirect.com/science/book/9780124115583

Top of Shelf
Top of Section
=======================================
Additional Web Resources ===============
Blog of Gene Spafford
https://www.cerias.purdue.edu/site/blog/author/spaf/
Krebs on Security in-depth security news and investigation
http://krebsonsecurity.com/
Schneier on Security a blog covering security and security
technology
http://www.schneier.com/
Questions & Answers Cryptography @ Stack Exchange
http://crypto.stackexchange.com/
Cryptology ePrint Archive
http://eprint.iacr.org/

NaCl: Networking and Cryptography library


http://nacl.cr.yp.to/
Ritters Crypto Glossary and Dictionary of Technical Cryptography
http://www.ciphersbyritter.com/GLOSSARY.HTM
Ciphers By Ritter
http://www.ciphersbyritter.com/
RSA Laboratories
http://www.rsa.com/rsalabs/
Research Showcase @ CMU
Carnegie Mellon University
http://repository.cmu.edu/
Electronic Frontier Foundation
https://www.eff.org/

Top of Shelf
Top of Section
=======================================