Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
Table of Contents
Cybersecurity
Biometrics
Security Engineering
Digital Forensics
Risk
Trust
Professional Certifications
Programming
Mathematics for Cryptography
Cryptography
History of Cryptology
Alice and Bob in Cipherspace
How to Share a Secret
Privacy
Data Privacy
Security Science
Additional Web Resources
Cybersecurity ==========================
Encyclopedia of Cryptography and Security
Henk C.A. van Tilborg and Sushil Jajodia (Editors)
Springer, 2011, ISBN 978-1-4419-5906-5
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4419-5906-5
http://dx.doi.org/10.1007/978-1-4419-5906-5
What Is Computer Science? An Information Security Perspective
Daniel Page and Nigel Smart
Springer, 2014, ISBN 978-3-319-04042-4
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-04042-4
http://dx.doi.org/10.1007/978-3-319-04042-4
Applied Information Security: A Hands-on Approach
David Basin, Patrick Schaller, and Michael Schlapfer
Springer, 2011, ISBN 978-3-642-24474-2
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-24474-2
http://dx.doi.org/10.1007/978-3-642-24474-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128013083
http://www.sciencedirect.com/science/book/9780128013083
Designing and Building A Security Operations Center
David Nathans
Elsevier, 2015, ISBN 978-0-12-800899-7
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128008997
http://www.sciencedirect.com/science/book/9780128008997
Cyber Security and IT Infrastructure Protection
John R. Vacca (Editor)
Elsevier, 2014, ISBN 978-0-12-416681-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124166813
http://www.sciencedirect.com/science/book/9780124166813
Detecting and Combating Malicious Email
Julie JCH Ryan and Cade Kamachi
Elsevier, 2015, ISBN 978-0-12-800110-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128001103
http://www.sciencedirect.com/science/book/9780128001103
Cyber Crime and Cyber Terrorism Investigators Handbook
Babak Akhgar, Andrew Staniforth, and Francesca Bosco (Editors)
Elsevier, 2014, ISBN 978-0-12-800743-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128007433
http://www.sciencedirect.com/science/book/9780128007433
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597491686
http://www.sciencedirect.com/science/book/9781597491686
Simple Steps to Data Encryption: A Practical Guide to Secure
Computing
Peter Loshin
Elsevier, 2013, ISBN 978-0-12-411483-8
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124114838
http://www.sciencedirect.com/science/book/9780124114838
Cyberterrorism: Understanding, Assessment, and Response
Thomas M. Chen, Lee Jarvis, and Stuart Macdonald (Editors)
Springer, 2014, ISBN 978-1-4939-0962-9
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4939-0962-9
http://dx.doi.org/10.1007/978-1-4939-0962-9
Introduction to Cyber-Warfare: A Multidisciplinary Approach
Paolo Shakarian, Jana Shakarian, and Andrew Ruef
Elsevier, 2013, ISBN 978-0-12-407814-7
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124078147
http://www.sciencedirect.com/science/book/9780124078147
The Basics of Cyber Warfare: Understanding the Fundamentals of
Cyber Warfare in Theory and Practice
Steve Winterfeld and Jason Andress
Elsevier, 2013, ISBN 978-0-12-404737-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124047372
http://www.sciencedirect.com/science/book/9780124047372
Mark Stamp
Wiley, 2011, ISBN 9781118027974
http://dx.doi.org.databases.poly.edu/10.1002/9781118027974
http://dx.doi.org/10.1002/9781118027974
Newton Lee
Springer, 2013, ISBN 978-1-4614-7205-6
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-7205-6
http://dx.doi.org/10.1007/978-1-4614-7205-6
Handbook of Computational Approaches to Counterterrorism
V.S. Subrahmanian (Editor)
Springer, 2013, ISBN 978-1-4614-5311-6
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-5311-6
http://dx.doi.org/10.1007/978-1-4614-5311-6
Human Aspects of Information Security, Privacy, and Trust, First
International Conference, HAS 2013
Louis Marinos and Ioannis Askoxylakis (Editors)
Springer, 2013, ISBN 978-3-642-39345-7
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-39345-7
http://dx.doi.org/10.1007/978-3-642-39345-7
From One Winning Career to the Next: Transitioning Public Sector
Leadership and Security Expertise to the Business Bottom Line
J. David Quilter
Elsevier, 2013, ISBN 978-0-12-411594-1
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124115941
http://www.sciencedirect.com/science/book/9780124115941
Applied Cyber Security and the Smart Grid: Implementing
Security Controls into the Modern Power Infrastructure
Eric D. Knapp and Raj Samani
Elsevier, 2013, ISBN 978-1-59749-998-9
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499989
http://www.sciencedirect.com/science/book/9781597499989
Physical-Layer Security: From Information Theory to Security
Engineering
Matthieu Block and Joao Barros
Cambridge University Press, 2011, ISBN 9780511977985
http://dx.doi.org.databases.poly.edu/10.1017/CBO9780511977985
http://dx.doi.org/10.1017/CBO9780511977985
Applied Cyber-Physical Systems
Sang C. Suh, U. John Tanik, John N. Carbone, and Abdullah Eroglu
(Editors)
Springer, 2014, ISBN 978-1-4614-7336-7
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-7336-7
http://dx.doi.org/10.1007/978-1-4614-7336-7
Handbook on Securing Cyber-Physical Critical Infrastructure:
Foundations and Challenges
Sajal K. das, Krishna Kant, and Nan Zhang
Elsevier, 2012, ISBN 978-0-12-415815-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124158153
http://www.sciencedirect.com/science/book/9780124158153
Analyzing and Defending Against Web-Based Malware
Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, and
Insup Lee
ACM Computing Surveys, Volume 45, Number 4 (August 2013)
http://dx.doi.org.databases.poly.edu/10.1145/2501654.2501663
http://dx.doi.org/10.1145/2501654.2501663
Botnets: A survey
Pages 378-403
http://www.sciencedirect.com/science/book/9780124071919
Intelligent Systems for Security Informatics
Christopher Yang, Wenji Mao, Xiaolong Zheng, and Hui Wang
Elsevier, 2013, ISBN 978-0-12-404702-0
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124047020
http://www.sciencedirect.com/science/book/9780124047020
Advanced Persistent Threat: Understanding the Danger and
How to Protect Your Organization
Eric Cole
Elsevier, 2013, ISBN 978-1-59749-949-1
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499491
http://www.sciencedirect.com/science/book/9781597499491
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Will Gragido, Daniel Molina, John Pirc, and Nick Selby
Elsevier, 2013, ISBN 978-1-59749-740-4
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597497404
http://www.sciencedirect.com/science/book/9781597497404
The Economics of Information Security and Privacy
Rainer Bohme (Editor)
Springer, 2013, ISBN 978-3-642-39498-0
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-39498-0
http://dx.doi.org/10.1007/978-3-642-39498-0
Economics of Information Security and Privacy III
Bruce Schneier (Editor)
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-36373-3
http://dx.doi.org/10.1007/978-3-642-36373-3
Information Hiding: First International Workshop
Ross Anderson (Editor)
Springer, 1996, ISBN 978-3-540-49589-5, LNCS 1174
http://dx.doi.org.databases.poly.edu/10.1007/3-540-61996-8
http://dx.doi.org/10.1007/3-540-61996-8
Information Hiding in Speech Signals for Secure Communication
Wu Zhijun
Elsevier, 2015, ISBN 978-0-12-801328-1
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128013281
http://www.sciencedirect.com/science/book/9780128013281
Wireless Mobile Internet Security, Second Edition
Man Young Rhee
Wiley, 2013, ISBN 9781118512920
http://dx.doi.org.databases.poly.edu/10.1002/9781118512920
http://dx.doi.org/10.1002/9781118512920
Trustworthy Execution on Mobile Devices
Amit Vasudevan, Jonathan M. McCune, and James Newsome
Springer, 2014, ISBN 978-1-4614-8190-4
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-8190-4
http://dx.doi.org/10.1007/978-1-4614-8190-4
Identifying back doors, attack points, and surveillance mechanisms in
iOS devices
Jonathan Zdziarski
Pages 3-19
Digital Investigation, Volume 11, Number 1 (March 2014)
http://dx.doi.org.databases.poly.edu/10.1016/j.diin.2014.01.001
http://dx.doi.org/10.1016/j.diin.2014.01.001
Signal Processing Approaches to Secure Physical Layer
Communications in Multi-Antenna Wireless Systems
Y.-W. Peter Hong, Pang-Chang Lan, and C.-C. Jay Kuo
Springer, 2014, ISBN 978-981-4560-14-6
http://dx.doi.org.databases.poly.edu/10.1007/978-981-4560-14-6
http://dx.doi.org/10.1007/978-981-4560-14-6
Security for Wireless Sensor Networks using Identity-Based
Cryptography
Harsh Kupwade Patil and Stephen A. Szygenda
CRC Press, 2013, ISBN 978-1-4398-6902-4
http://dx.doi.org.databases.poly.edu/10.1201/b13080
http://dx.doi.org/10.1201/b13080
Chapter 1 Introduction to UTM (Unified Threat Management)
http://dx.doi.org.databases.poly.edu/10.1016/B978-1-59-7497473.00001-6
http://dx.doi.org/10.1016/B978-1-59-749747-3.00001-6
UTM Security with Fortinet: Mastering FortiOS
Kenneth Tam, Martin H. Hoz Salvador, Ken McAlpine, Rick Basile,
Bruce Matsugu, and Josh More
Elsevier, 2013, ISBN 978-1-59749-747-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597497473#ancpt010
http://www.sciencedirect.com/science/book/9781597497473#ancpt01
0
Spyware and Adware
John Aycock
http://www.sciencedirect.com/science/book/9781597499583
Windows Server 2012 Security from End to Edge and Beyond:
Architecting, Designing, Planning, and Deploying
Windows Server 2012 Security Solutions
Thomas W. Shinder, Yuri Diogenes, and Debra Littlejohn Shinder
Elsevier, 2013, ISBN 978-1-59749-980-4
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499804
http://www.sciencedirect.com/science/book/9781597499804
http://dx.doi.org.databases.poly.edu/10.1016/B978-1-59749-9804.09985-4
http://dx.doi.org/10.1016/B978-1-59749-980-4.09985-4
Investigating Computer-Related Crime, Second Edition
Peter Stephenson and Keith Gilbert
CRC Press, 2013, ISBN 978-1-4200-0370-3
http://dx.doi.org.databases.poly.edu/10.1201/b14664
http://dx.doi.org/10.1201/b14664
Cybercrimes: A Multidisciplinary Analysis
Sumit Ghosh and Elliot Turrini
Springer, 2010, ISBN 978-3-642-13547-7
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-13547-7
http://dx.doi.org/10.1007/978-3-642-13547-7
Guest editorial: security requirements engineering:
past, present, future
Eric Dubois and Haralambos Mouratidis
Pages 1-5
Special Issue on RE09: Security Requirements Engineering
Requirements Engineering, Volume 15, Number 1 (March 2010)
http://dx.doi.org.databases.poly.edu/10.1007/s00766-009-0094-8
http://dx.doi.org/10.1007/s00766-009-0094-8
6. Information Security Applications Based on Biomolecular Systems
Guinevere Strack, Heather R. Lukarift, Glenn R. Johnson,
and Evgeny Katz
Pages 103-116
http://dx.doi.org.databases.poly.edu/10.1002/9783527645480.ch6
http://dx.doi.org/10.1002/9783527645480.ch6
Biomolecular Information Processing: From Logic Systems to
Smart Sensors and Actuators
Evgeny Katz (Editor)
Wiley, 2012, ISBN 9783527645480
http://dx.doi.org.databases.poly.edu/10.1002/9783527645480
http://dx.doi.org/10.1002/9783527645480
Cyber Security Policy Guidebook
Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs,
Jeffrey Schmidt, and Joseph Weiss
Wiley, 2012, ISBN 9781118241530
http://dx.doi.org.databases.poly.edu/10.1002/9781118241530
http://dx.doi.org/10.1002/9781118241530
Cryptographic Protocol: Security Analysis Based on Trusted Freshness
Ling Dong and Kefei Chen
Springer, 2012, ISBN 978-3-642-24073-7
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-24073-7
http://dx.doi.org/10.1007/978-3-642-24073-7
Engineering Secure Two-Party Computation Protocols: Design,
Optimization, and Applications of Efficient Secure Function Evaluation
Thomas Schneider
Springer, 2012, ISBN 978-3-642-30042-4
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-30042-4
http://dx.doi.org/10.1007/978-3-642-30042-4
Secure Multi-Party Non-Repudiation Protocols and Applications
Jose A. Onieva, Javier Lopez, and Jianying Zhou
Springer, 2009, ISBN 978-0-387-75630-1
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-75630-1
http://dx.doi.org/10.1007/978-0-387-75630-1
Advances in Intelligence and Security Informatics
Wenji Mao and Fei-Yue Wang
Elsevier, 2012, ISBN 978-0-12 397200-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
123972002
http://www.sciencedirect.com/science/book/9780123972002
Balanced Secure Scan: Partial Scan Approach for Secret Information
Protection
Michiko Inoue, Tomokazu Yoneda, Mineo Hasegawa,
and Hideo Fujiwara
Pages 99-108
Journal of Electronic Testing, Volume 27, Number 2 (April 2011)
http://dx.doi.org.databases.poly.edu/10.1007/s10836-011-5204-0
http://dx.doi.org/10.1007/s10836-011-5204-0
Building an Information Security Awareness Program:
Defending Against Social Engineering and Technical Threats
Bill Gardner and Valerie Thomas
Elsevier, 2014, ISBN 978-0-12-419967-5
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124199675
http://www.sciencedirect.com/science/book/9780124199675
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499514
http://www.sciencedirect.com/science/book/9781597499514
Client-Side Attacks and Defense
Robert Shimonski and Sean-Philip Oriyano
Elsevier, 2012, ISBN 978-1-59749-590-5
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597495905
http://www.sciencedirect.com/science/book/9781597495905
The Hackers Guide to OS X: Exploiting OS X from the Root Up
Rob Bathurst, Russ Rogers, and Alijohn Ghassemlouei
Elsevier, 2013, ISBN 978-1-59749-950-7
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499507
http://www.sciencedirect.com/science/book/9781597499507
Thors Microsoft Security Bible: A Collection of
Practical Security Techniques
Timothy Thor Mullen
Elsevier, 2011, ISBN 978-1-59749-572-1
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597495721
http://www.sciencedirect.com/science/book/9781597495721
Embedded Systems Security: Practical Methods for
Safe and Secure Software and Systems Development
David Kleidermacher and Mike Kleidermacher
Elsevier, 2012, ISBN 978-0-12-386886-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
123868862
http://www.sciencedirect.com/science/book/9780123868862
Security Basics for Computer Architects
Ruby B. Lee
Morgan & Claypool, 2013, ISBN 9781627051569
http://dx.doi.org.databases.poly.edu/10.2200/S00512ED1V01Y201305
CAC025
http://dx.doi.org/10.2200/S00512ED1V01Y201305CAC025
Introduction to Hardware Security and Trust
Mohammad Tehranipoor and Cliff Wang (Editors)
Springer, 2012, ISBN 9781-4419-8080-9
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4419-8080-9
http://dx.doi.org/10.1007/978-1-4419-8080-9
Integrated Circuit Authentication: Hardware Trojans
and Counterfeit Detection
Mohammad Tehranipoor, Hassan Salmani, and Xuehui Zhang
Springer, 2014, ISBN 978-3-319-00816-5
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-00816-5
http://dx.doi.org/10.1007/978-3-319-00816-5
A Survey of Security Issues in Hardware Virtualization
Gabor Pek, Levente Buttyan, and Boldizsar Bencsath
ACM Computing Surveys, Volume 45, Number 3 (June 2013)
http://dx.doi.org.databases.poly.edu/10.1145/2480741.2480757
http://dx.doi.org/10.1145/2480741.2480757
Physical Unclonable Functions in Theory and Practice
Christoph Bohm and Maximilian Hofer
Springer, 2013, ISBN 978-1-4614-5040-5
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-5040-5
http://dx.doi.org/10.1007/978-1-4614-5040-5
Secure Smart Embedded Devices, Platforms and Applications
Konstantinos Markantonakis and Keith Mayes (Editors)
Springer, 2014, ISBN 978-1-4614-7915-4
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-7915-4
http://dx.doi.org/10.1007/978-1-4614-7915-4
Advanced DPA Theory and Practice: Towards the Security
Limits of Secure Embedded Circuits
Eric Peeters
Springer, 2013, ISBN 978-1-4614-6783-0
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-6783-0
http://dx.doi.org/10.1007/978-1-4614-6783-0
Game Theory Meets Network Security and Privacy
Mohammad Hossein Manshael, Quanyan Zhu, Tansu Alpcan,
Tamer Basar, and Jan-Pierre Hubaux
ACM Computer Surveys, Volume 45, Number 3 (June 2013)
http://dx.doi.org.databases.poly.edu/10.1145/2480741.2480742
http://dx.doi.org/10.1145/2480741.2480742
Security and Game Theory: Algorithms, Deployed Systems,
Lessons Learned
Milind Tambe
Cambridge University Press, 2012, ISBN 9780511973031
http://dx.doi.org.databases.poly.edu/10.1017/CBO9780511973031
http://dx.doi.org/10.1017/CBO9780511973031
Insider Threat: Protecting the Enterprise from Sabotage,
Spying, and Theft
Eric Cole and Sandra Ring
Internet of Things
IBM Video:
http://www.ibm.com/smarterplanet/us/en/overview/article/iot_video.
html
That Internet of Things Thing
Kevin Ashton (June 22, 2009)
http://www.rfidjournal.com/article/view/4986
Internet of Things: Hype or Reality?
Anders Gustafsson (January 14, 2013)
http://allthingsd.com/20130114/internet-of-things-hype-or-reality/
The Internet of Things Has Arrived And So Have Massive Security
Issues
Andrew Rose (January 11, 2013)
http://www.wired.com/opinion/2013/01/securing-the-internet-ofthings/
IoT Hub:
http://www.internet-of-things.eu/
Wikipedia:
http://en.wikipedia.org/wiki/Internet_of_Things
Computer Networks,
Volume 57, Number 10 (July 2013)
Pages 2266-2279
http://dx.doi.org.databases.poly.edu/10.1016/j.comnet.2012.12.018
http://dx.doi.org/10.1016/j.comnet.2012.12.018
Security and Privacy in Cloud Computing: A Survey
Mahesh U. Shankarwar and Ambika V. Pawar
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-12012-6_1
http://dx.doi.org/10.1007/978-3-319-12012-6_1
Proceedings of the 3rd International Conference on
Frontiers of Intelligent Computing:
Theory and Applications (FICTA) 2014, Volume 2
Suresh Chandra Satapathy, Bhabendra Narayan Biswal,
Siba K. Ugata, and J.K. Mandal (Editors)
Springer, 2015, ISBN 978-3-319-12012-6
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-12012-6
http://dx.doi.org/10.1007/978-3-319-12012-6
Information Assurance and Security Education and Training:
WISE 8, WISE 7, and WISE 6 Revised Selected Papers
Ronald C. Dodge Jr. and Lynn Futcher (Editors)
Springer, 2013, ISBN 978-3-642-39377-8
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-39377-8
http://dx.doi.org/10.1007/978-3-642-39377-8
Rethinking computing insanity, practice and research
Gene Spafford (December 15, 2008)
http://www.cerias.purdue.edu/site/blog/post/rethinking_computing_i
nsanity_practice_and_research/
Perfect Password: Selection, Protection, Authentication
Mark Burnett and Dave Kleiman
Top of Shelf
Top of Section
=======================================
Biometrics ============================
Encyclopedia of Biometrics
Stan Z. Lee (Editor)
Springer, 2009, ISBN 978-0-387-73003-5
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-73003-5
http://dx.doi.org/10.1007/978-0-387-73003-5
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4419-5906-5
http://dx.doi.org/10.1007/978-1-4419-5906-5
Introduction to Biometrics
Anil K. Jain, Arun A. Ross, and Karthik Nandakumar
Springer, 2011, ISBN 978-0-387-77325-4
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-77326-1
http://dx.doi.org/10.1007/978-0-387-77326-1
Biometrics in the New World: The Cloud, Mobile Technology
and Pervasive Identity
Julian Ashbourn
Springer, 2014, ISBN 978-3-319-04159-9
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-04159-9
http://dx.doi.org/10.1007/978-3-319-04159-9
Guide to Biometrics for Large-Scale Systems: Technological,
Operational, and User-Related Factors
Julian Ashbourn
Springer, 2011, ISBN 978-0-85729-467-8
http://dx.doi.org.databases.poly.edu/10.1007/978-0-85729-467-8
http://dx.doi.org/10.1007/978-0-85729-467-8
Touchless Palmprint Recognition Systems
Angelo Genovese, Vincenzo Piuri, and Fabio Scotti
Springer, 2014, ISBN 978-3-319-10365-5
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-10365-5
http://dx.doi.org/10.1007/978-3-319-10365-5
Implementation and evaluation of a remote authentication
system using touchless palmprint recognition
Haruki Ota, Shoichiro Aoyama, Ryu Watanabe, Koichi Ito,
http://dx.doi.org.databases.poly.edu/10.1007/978-0-85729-994-9_13
http://dx.doi.org/10.1007/978-0-85729-994-9_13
Computer Analysis of Human Behavior
Albert Ali Salah and Theo Gevers (Editors)
Springer, 2011, ISBN 978-0-85729-994-9
http://dx.doi.org.databases.poly.edu/10.1007/978-0-85729-994-9
http://dx.doi.org/10.1007/978-0-85729-994-9
Enhancing Information Security and Privacy by
Combining Biometrics with Cryptography
Sanjay G. Kanade, Dijana Petrovska-Delacretaz,
and Bernadette Dorizzi
Morgan & Claypool, 2012, ISBN 9781608458486
http://dx.doi.org.databases.poly.edu/10.2200/S00417ED1V01Y201205
SPT003
http://dx.doi.org/10.2200/S00417ED1V01Y201205SPT003
Security and Privacy in Biometrics
Patrizio Campisi (Editor)
Springer, 2013, ISBN 978-1-4471-5230-9
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4471-5230-9
http://dx.doi.org/10.1007/978-1-4471-5230-9
Top of Shelf
Top of Section
=======================================
http://dx.doi.org/10.1145/2659899
Communications of the ACM, Volume 57, Number 10 (October 2014)
Top of Shelf
Top of Section
=======================================
Digital Forensics ========================
Digital Forensics
Simson L. Garfinkel
American Scientist, Volume 100, Number 5 (September-October 2013)
http://www.americanscientist.org/issues/feature/2013/5/digitalforensics
Python Forensics: A Workbench for Inventing and Sharing
Digital Forensic Technology
Chet Hosmer
Elsevier, 2014, ISBN 978-0-12-418676-7
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124186767
http://www.sciencedirect.com/science/book/9780124186767
Unified Communications Forensics: Anatomy of Common UC Attacks
Nicholas Grant & Joseph W Shaw II
Elsevier, 2014, ISBN 978-1-59749-992-7
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499927
http://www.sciencedirect.com/science/book/9781597499927
Investigating Internet Crimes: An Introduction to
Solving Crimes in Cyberspace
Todd G. Shipley and Art Bowker
Elsevier, 2014, ISBN 978-0-12-407817-8
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124078178
http://www.sciencedirect.com/science/book/9780124078178
Cloud Storage Forensics
Darren Quick, Ben Martini, and Kim-Kwang Raymond Choo
Elsevier, 2014, ISBN 978-0-12-419970-5
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124199705
http://www.sciencedirect.com/science/book/9780124199705
CyberForensics: Understanding Information Security Investigations
Jennifer Bayuk (Editor)
Springer, 2010, ISBN 978-1-60761-772-3
http://dx.doi.org.databases.poly.edu/10.1007/978-1-60761-772-3
http://dx.doi.org/10.1007/978-1-60761-772-3
Placing the Suspect Behind the Keyboard: Using Digital Forensics
and Investigative Techniques to Identify Cybercrime Suspects
Brett Shavers
Elsevier, 2013, ISBN 978-1-59749-985-9
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499859
http://www.sciencedirect.com/science/book/9781597499859
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597496438
http://www.sciencedirect.com/science/book/9781597496438
10 Digital evolution: history, challenges and future
directions for the digital and multimedia sciences section
David W. Baker et al.
Pages 252-291
http://dx.doi.org.databases.poly.edu/10.1002/9781118373880.ch10
http://dx.doi.org/10.1002/9781118373880.ch10
http://dx.doi.org/10.1007/978-1-4419-5803-7
Linux Malware Incident Response: A Practitioners Guide to
Forensic Collection and Examination of Volatile Data
Cameron H. Malin, Foghan Casey, and James A. Aquilina
Elsevier, 2013, ISBN 978-0-12-409507-6
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124095076
http://www.sciencedirect.com/science/book/9780124095076
Malware Forensic Field Guide for Windows Systems
Cameron Malin, Eoghan Casey, and James Aquilina
Elsevier, 2012, ISBN 978-1-59749-472-4
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597494724
http://www.sciencedirect.com/science/book/9781597494724
Windows Registry Forensics: Advanced Digital Forensic Analysis
of the Windows Registry
Harlan Carvey
Elsevier, 2011, ISBN 978-1-59749-580-6
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597495806
http://www.sciencedirect.com/science/book/9781597495806
Android Malware
Xuxian Jiang and Yajin Zhou
Springer, 2013, ISBN 978-1-4614-7394-7
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-7394-7
http://dx.doi.org/10.1007/978-1-4614-7394-7
Automatic Malware Analysis: An Emulator Based Approach
http://www.sciencedirect.com/science/book/9781597496599
Logging and Log Management: The Authoritative Guide to
Understanding the Concepts Surrounding Logging and Log
Management
Anton A. Chuvakin, Kevin J. Schmidt, and Christopher Phillips
Elsevier, 2013, ISBN 978-1-59749-635-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597496353
http://www.sciencedirect.com/science/book/9781597496353
Virtualization and Forensics: A Digital Forensic Investigators Guide to
Virtual Environments
Diane Barrett and Gregory Kipper
Elsevier, 2010, ISBN 978-1-59749-557-8
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597495578
http://www.sciencedirect.com/science/book/9781597495578
Top of Shelf
Top of Section
=======================================
Risk
=================================
http://dx.doi.org.databases.poly.edu/10.1007/978-3-658-01115-4
http://dx.doi.org/10.1007/978-3-658-01115-4
Measuring and Managing Information Risk: A FAIR Approach
Jack Freund and Jack Jones
Elsevier, 2015, ISBN 978-0-12-420231-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124202313
http://www.sciencedirect.com/science/book/9780124202313
Risk Management Framework:
A Lab-Based Approach to Securing Information Systems
James Broad
Elsevier, 2013, ISBN 978-1-59749-995-8
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499958
http://www.sciencedirect.com/science/book/9781597499958
FISMA and the Risk Management Framework:
The New Practice of Federal Cyber Security
Stephen D. Gantz and Daniel R. Philpott
Elsevier, 2013, ISBN 978-1-59749-641-4
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597496414
http://www.sciencedirect.com/science/book/9781597496414
FISMA Compliance Handbook
Laura P. Taylor
Elsevier, 2013, ISBN 978-0-12-405871-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124058712
http://www.sciencedirect.com/science/book/9780124058712
Top of Shelf
Top of Section
=======================================
Trust =================================
Trust, Computing, and Society
Richard H.R. Harper (Editor)
Cambridge University Press, 2014, ISBN 9781139828567
http://dx.doi.org/10.1017/CBO9781139828567
Top of Shelf
Top of Section
=======================================
Professional Certifications ================
CISSP (Certified Information Systems Security Professional)
Certification
https://www.isc2.org/cissp/default.aspx
Wikipedia:
http://en.wikipedia.org/wiki/Certified_Information_Systems_Security_
Professional
CSSLP (Certified Secure Software Lifecycle Professional) Certification
https://www.isc2.org/csslp/Default.aspx
Certification Programs
https://www.isc2.org/credentials/default.aspx
International Information Systems Security Certification Consortium
https://www.isc2.org/
Wikipedia: http://en.wikipedia.org/wiki/(ISC)%C2%B2
Eleventh Hour CISSP Study Guide, Second Edition
Eric Conrad, Seth Misenar, and Joshua Feldman
Elsevier, 2014, ISBN 978-0-12-417142-8
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124171428
http://www.sciencedirect.com/science/book/9780124171428
Top of Shelf
Top of Section
=======================================
Programming ==========================
Foundations of Security: What Every Programmer Needs to Know
Neil Daswani, Christoph Kern, and Anita Kesavan
Springer, 2007, ISBN 978-1-4302-0377-3
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4302-0377-3
http://dx.doi.org/10.1007/978-1-4302-0377-3
Violent Python: A Cookbook for Hackers, Forensic Analysts,
Penetration Testers and Security Engineers
TJ. OConnor
Elsevier, 2013, ISBN 978-1-59749-957-6
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597499576
http://www.sciencedirect.com/science/book/9781597499576
Gray Hat Python: Python Programming for Hackers and Reverse
Engineers
Justin Seitz
No Starch Press, 2009, ISBN 9781593271923
**** Login to books24X7 digital library
**** and search on the ISBN number above
************************************
24 Deadly Sins of Software Security: Programming Flaws
and How to Fix Them
Michael Howard and David LeBlanc
McGraw-Hill, 2010, ISBN 9780071626750
http://www.accessengineeringlibrary.com.databases.poly.edu/browse/
24-deadly-sins-of-software-security-programming-flaws-and-how-tofix-them
http://www.accessengineeringlibrary.com/browse/24-deadly-sins-ofsoftware-security-programming-flaws-and-how-to-fix-them
Cryptography in C and C++
Michael Welschenbach
Springer, 2005, ISBN 978-1-4302-0026-0
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4302-0026-0
http://dx.doi.org/10.1007/978-1-4302-0026-0
Coding for Penetration Testers: Building Better Tools
Jason Andress and Ryan Linn
Elsevier, 2012, ISBN 978-1-59749-729-9
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597497299
http://www.sciencedirect.com/science/book/9781597497299
Web Application Obfuscation
Mario Heiderich, Eduardo Alberto Vela Nava,
Gareth Heyes, and David Lindsay
Elsevier, 2011, ISN 978-1-59749-604-9
http://www.sciencedirect.com.databases.poly.edu/science/book/9781
597496049
http://www.sciencedirect.com/science/book/9781597496049
Introduction to Reliable and Secure Distributed Programming,
Second Edition
Christian Cachin, Rachid Guerraoui, and Luis Rodrigues
Springer, 2011, ISBN 978-3-642-15260-3
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-15260-3
http://dx.doi.org/10.1007/978-3-642-15260-3
Advanced API Security: Securing APIs with OAuth 2.0,
Top of Shelf
Top of Section
=======================================
Mathematics for Cryptography ============
Mathematics of Public Key Cryptography
Steven D. Galbraith
Cambridge University Press, 2012, ISBN 9781139013926
http://dx.doi.org.databases.poly.edu/10.1017/CBO9781139012843
http://dx.doi.org/10.1017/CBO9781139012843
Functional Encryption: A New Vision for Public-Key Cryptography
Dan Boneh, Amit Sahai, and Brent Waters
Communications of the ACM,
http://dx.doi.org/10.1007/978-3-8348-1990-1
Codes: An Introduction to Information Communication
and Cryptography
N.L. Biggs
Springer, 2008, ISBN 978-1-84800-273-9
http://dx.doi.org.databases.poly.edu/10.1007/978-1-84800-273-9
http://dx.doi.org/10.1007/978-1-84800-273-9
Codes and Turbo Codes
Claude Berrou
Springer, 2010, ISBN 978-2-8178-0039-4
http://dx.doi.org.databases.poly.edu/10.1007/978-2-8178-0039-4
http://dx.doi.org/10.1007/978-2-8178-0039-4
A Students Guide to Coding and Information Theory
Stefan M. Moser and Po-Ning Chen
Cambridge University Press, 2012, ISBN 9781139059534
http://dx.doi.org.databases.poly.edu/10.1017/CBO9781139059534
http://ebooks.cambridge.org/ebook.jsf?bid=CBO9781139059534
Rubiks for Cryptographers
Pages 733-739
Christophe Petit and Jean-Jacques Quisquater
http://www.ams.org/notices/201306/rnoti-p733.pdf
Notices of the AMS, Volume 60, Number 6 (June/July 2013)
http://www.ams.org/notices/201306/
A Mathematical Theory of Communication
C. E. Shannon
Pages 379-423
The Bell System Technical Journal, Volume 27, Number 3 (July 1948)
http://www.alcatel-lucent.com/bstj/vol27-1948/articles/bstj27-3379.pdf
Top of Shelf
Top of Section
=======================================
Cryptography ==========================
Encyclopedia of Cryptography and Security
Henk C.A. van Tilborg and Sushil Jajodia (Editors)
Springer, 2011, ISBN 978-1-4419-5906-5
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4419-5906-5
http://dx.doi.org/10.1007/978-1-4419-5906-5
Cryptography
Wikipedia:
http://en.wikipedia.org/wiki/Cryptography
http://dx.doi.org/10.1017/CBO9780511721656
Algebraic Cryptanalysis
Gregory V. Bard
Springer, 2009, ISBN 978-0-387-88757-9
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-88757-9
http://dx.doi.org/10.1007/978-0-387-88757-9
Identity-Based Encryption
Sanjit Chatterjee and Palash Sarkar
Springer, 2011, ISBN 978-1-4419-9383-0
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4419-9383-0
http://dx.doi.org/10.1007/978-1-4419-9383-0
Adaptive Cryptographic Access Control
Anne V.D.M. Kayem, Selim G. Akl, and Patrick Martin
Springer, 2010, ISBN 978-1-4419-6655-1
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4419-6655-1
http://dx.doi.org/10.1007/978-1-4419-6655-1
Practical Signcryption
Alexander W. Dent and Yuliang Zheng (Editors)
Springer, 2010, ISBN 978-3-540-89411-7
http://dx.doi.org.databases.poly.edu/10.1007/978-3-540-89411-7
http://dx.doi.org/10.1007/978-3-540-89411-7
Cryptography: all-out attacks or how to attack cryptography
without intensive cryptanalysis
Pages 207-237
Jean-Baptiste Bedrune, Eric Filiol, and Frederic Raynal
Journal in Computer Virology, Volume 6, Number 3 (August 2010)
http://dx.doi.org.databases.poly.edu/10.1007/s11416-008-0117-x
http://dx.doi.org/10.1007/s11416-008-0117-x
Top of Shelf
Top of Section
=======================================
Top of Shelf
Top of Section
=======================================
http://www.youtube.com/watch?v=X2W8YEppLbI&feature=list_other
&playnext=1&list=SPC73BF951C580030A
A Fully Homomorphic Scheme
Ph.D. Dissertation, Department of Computer Science, Stanford
University (September 2009)
Craig Gentry
http://crypto.stanford.edu/craig/
Fully Homomorphic Encryption Using Ideal Lattices
Proceedings of the 41st Annual ACM Symposium on Theory of
Computing
(STOC 2009)
Craig Gentry Pages 169-178
http://dx.doi.org.databases.poly.edu/10.1145/1536414.1536440
http://dx.doi.org/10.1145/1536414.1536440
Implementing Gentrys Fully-Homomorphic Encryption Scheme
Craig Gentry and Shai Halevi
Pages 129-148
http://www.springerlink.com.databases.poly.edu/content/961007012q
743401/
http://www.springerlink.com/content/961007012q743401/
Advances in Cryptology EUROCRYPT 2011
Kenneth G. Paterson (Editor)
Springer, 2011, ISBN 978-3-642-20464-7, LNCS 6632
http://www.springerlink.com.databases.poly.edu/content/978-3-64220464-7/contents/
http://www.springerlink.com/content/978-3-642-20464-7/contents/
Probabilistic Encryption & How To Play Mental Poker
Keeping Secret All Partial Information
http://dx.doi.org/10.1007/978-3-642-13190-5_2
Advances in Cryptology EUROCRYPT 2010
Henri Gilbert (Editor)
Springer, 2010, ISBN 978-3-642-13190-5, LNCS 6110
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-13190-5
http://dx.doi.org/10.1007/978-3-642-13190-5
Fully Homomorphic Encryption with Relatively
Small Key and Ciphertext Sizes
Nigel P. Smart and Frederick Vercauteren
Pages 420-443
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-13013-7_25
http://dx.doi.org/10.1007/978-3-642-13013-7_25
Public Key Cryptography PKC 2010
Phong Q. Nguyen and David Pointcheval (Editors)
Springer, 2010, ISBN 978-3-642-13012-0, LNCS 6056
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-13013-7
http://dx.doi.org/10.1007/978-3-642-13013-7
Home Page of Nigel Smart
(Contains an online version of his book
Cryptography, An Introduction: Third Edition)
http://www.cs.bris.ac.uk/~nigel/
Computing Blindfolded: New Developments in Fully
Homomorphic Encryption
Vinod Vaikuntanathan
http://www.cs.toronto.edu/~vinodv/FHE-focs-survey.pdf
Homepage of Vinod Vaikuntanathan
http://www.cs.toronto.edu/~vinodv/
Homomorphic Encryption Tutorial (Crypto 2011)
Shai Halevi, IBM Research
http://www.youtube.com/watch?v=jIWOR2bGC7c
http://www.youtube.com/watch?v=huLGjBpj3Os
Part 1
Part 2
Part 1
Part 2
Top of Shelf
Top of Section
=======================================
Algorithms Unplugged
B. Vocking et al. (Editors)
Springer, 2011, ISBN 978-3-642-15328-0
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-15328-0
http://dx.doi.org/10.1007/978-3-642-15328-0
Top of Shelf
Top of Section
=======================================
Privacy ===============================
How Should We Think about Privacy?
Jaron Lanier
Pages 64-71
Scientific American, Volume 309, Number 5 (November 2013)
http://dx.doi.org.databases.poly.edu/10.1038/scientificamerican111364
http://dx.doi.org/10.1038/scientificamerican1113-64
Home page of Jaron Lanier
http://www.jaronlanier.com/
Wikipedia:
http://en.wikipedia.org/wiki/Jaron_Lanier
APF 2014
Bart Prenel and Demosthenes Ikonomou (Editors)
Springer, 2014, ISBN 978-3-319-06749-0, LNCS 8450
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-06749-0
http://dx.doi.org/10.1007/978-3-319-06749-0
Privacy, Big Data, and the Public Good: Frameworks for Engagement
Julia lane, Victoria Stodden, Stefan Bender, and Helen Neissenbaum
(Editors)
Cambridge University Press, 2014, ISBN 9781107590205
http://dx.doi.org.databases.poly.edu/10.1017/CBO9781107590205
http://dx.doi.org/10.1017/CBO9781107590205
Facebook Nation: Total Information Awareness
Newton Lee
Springer, 2013, ISBN 978-1-4614-5308-6
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-5308-6
http://dx.doi.org/10.1007/978-1-4614-5308-6
The Basics of Digital Privacy: Simple Tools to Protect Your
Personal Information and Your Identity Online
Denny Cherry
Elsevier, 2014, ISBN 978-0-12-800011-3
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128000113
http://www.sciencedirect.com/science/book/9780128000113
Unauthorized Access: The Crisis in Online Privacy and Security
Robert H. Sloan and Richard Warner
CRC Press, 2014, ISBN 978-1-4398-3014-7
http://dx.doi.org.databases.poly.edu/10.1201/b15148
http://dx.doi.org/10.1201/b15148
Electronic Identity
Norberto Nuno Gomes de Andrade, Lisha Chen-Wilson,
David Argles, Gary Wills, and Michele Schiano di Zenise
Springer, 2014, ISBN 978-1-4471-6449-4
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4471-6449-4
http://dx.doi.org/10.1007/978-1-4471-6449-4
Emerging Pervasive Information and Communication Technologies
(PICT): Ethical Challenges, Opportunities and Safeguards
Kenneth D. Pimple (Editor)
Springer, 2014, ISBN 978-94-007-6833-8
http://dx.doi.org.databases.poly.edu/10.1007/978-94-007-6833-8
http://dx.doi.org/10.1007/978-94-007-6833-8
Anonymization
Rolf H. Weber and Ulrike I. Heinrich
Springer, 2012, ISBN 978-1-4471-4066-5
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4471-4066-5
http://dx.doi.org/10.1007/978-1-4471-4066-5
Practical Anonymity: Hiding in Plain Sight Online
Peter Loshin
Elsevier, 2013, ISBN 978-0-12-410404-4
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124104044
http://www.sciencedirect.com/science/book/9780124104044
On Anonymity in an Electronic Society: A Survey of
Anonymous Communication Systems
Matthew Edman and Bulent Yener
ACM Computing Surveys, Volume 42, Number 1 (December 2009)
http://dx.doi.org.databases.poly.edu/10.1145/1592451.1592456
http://dx.doi.org/10.1145/1592451.1592456
SmartData: Privacy Meets Evolutionary Robotics
Inman Harvey, Ann Cavoukian, George Tomko, Don Borett,
Hon Kwan, and Dimitrios Hatzinalos (Editors)
Springer, 2013, ISBN 978-1-4614-6409-9
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4614-6409-9
http://dx.doi.org/10.1007/978-1-4614-6409-9
Security and Privacy for Augmented Reality Systems
Franciska Roesner, Tadayoshi Kohno, and David Molnar
Communications of the ACO, Volume 57, Number 4 (April 2014)
http://dx.doi.org.databases.poly.edu/10.1145/2580723.2580730
http://dx.doi.org/10.1145/2580723.2580730
Chapter 13 Privacy for Reporters of Human Rights Abuses:
Identity and Anonymity in Mobile Networks
Leonardo Martucci and Simone Fischer-Hubner
Pages 181-199
http://dx.doi.org.databases.poly.edu/10.1007/978-94-007-1384-0_13
http://dx.doi.org/10.1007/978-94-007-1384-0_13
Mobile Technologies for Conflict Management: Online
Dispute Resolution, Governance, Participation
Marta Poblet (Editor)
Springer, 2011, ISBN 978-94-007-1384-0
http://dx.doi.org.databases.poly.edu/10.1007/978-94-007-1384-0
http://dx.doi.org/10.1007/978-94-007-1384-0
Privacy in Social Networks
Elena Zheleva, Evimaria Terzi, and Lise Getoor
Morgan & Claypool, 2012, ISBN 9781608458639
http://dx.doi.org.databases.poly.edu/10.2200/S00408ED1V01Y201203
DMK004
http://dx.doi.org/10.2200/S00408ED1V01Y201203DMK004
Privacy Online: Perspectives on Privacy and Self-Disclosure
in the Social Web
Sabine Trepte and Leonard Reinecke (Editors)
Springer, 2011, ISBN 978-3-642-21521-6
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-21521-6
http://dx.doi.org/10.1007/978-3-642-21521-6
Special Issue on Digital Privacy: theory, policies and technologies
Travis D. Breaux, Annie I. Anton, Stefanos Gritzalis, and John
Mylopoulos
Requirements Engineering, Volume 16, Number 1 (March 2011)
http://link.springer.com.databases.poly.edu/journal/766/16/1/
http://link.springer.com/journal/766/16/1/
Privacy and Identity Management for Life
Jan Camemisch, Simone Fischer-Hubner, and Kai Rannenberg (Editors)
Springer, 2011, ISBN 978-3-642-20317-6
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-20317-6
http://dx.doi.org/10.1007/978-3-642-20317-6
Special Issue on Trust and Privacy in Electronic Commerce
Peter Herrmann and Mozhgan Tavakolifard
Electronic Commerce Research,
Volume 10, Numbers 3-4 (December 2010)
http://link.springer.com.databases.poly.edu/journal/10660/10/3/
http://link.springer.com/journal/10660/10/3/
Quo vadis, data privacy?
Johannes Gehrke
Blavatnik Awards for Young Scientists 2011
Annals of the New York Academy of Sciences,
Volume 1260, Number 1 (July 2012)
http://dx.doi.org.databases.poly.edu/10.1111/j.17496632.2012.06630.x
http://dx.doi.org/10.1111/j.1749-6632.2012.06630.x
Privacy and Technologies of Identity: A Cross-Disciplinary
Conversation
Katherine J. Strandburg and Daniela Stan Raicu
Springer, 2006, ISBN 978-0-387-28222-0
http://dx.doi.org.databases.poly.edu/10.1007/0-387-28222-X
http://dx.doi.org/10.1007/0-387-28222-X
Deeplinks Blog posts about Biometrics
https://www.eff.org/deeplinks/biometrics
Deeplinks Topics
https://www.eff.org/deeplinks/archives
Electronic Frontier Foundation
https://www.eff.org/
Top of Shelf
Top of Section
=======================================
Data Privacy ===========================
Data privacy
Vicenc Torra and Guillermo Navarro-Arribas
Wiley Interdisciplinary Reviews: Data Mining and Knowledge
Discovery,
Volume 4, Number 4 (July/August 2014) Pages 269-340
http://dx.doi.org.databases.poly.edu/10.1002/widm.1129
http://dx.doi.org/10.1002/widm.1129
Chapter 2 A General Survey of Privacy-Preserving Data Mining:
Models and Algorithms
Charu C. Aggarwal and Philip S. Yu
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-70992-5_2
http://dx.doi.org/10.1007/978-0-387-70992-5_2
Privacy-Preserving Data Mining: Models and Algorithms
Charu C. Aggarwal and Philip S. Yu (Editors)
Springer, 2008, ISBN 978-0-387-70992-5
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-70992-5
http://dx.doi.org/10.1007/978-0-387-70992-5
Home Page of Charu C. Aggarwal
http://charuaggarwal.net/
Privacy-Preserving Data Mining
Jaideep Vaidya, Chris Clifton, and Michael Zhu
Springer, 2006, ISBN 978-0-387-29489-6
http://dx.doi.org.databases.poly.edu/10.1007/978-0-387-29489-6
http://dx.doi.org/10.1007/978-0-387-29489-6
Statistical Confidentiality: Principles and Practice
George T. Duncan, Mark Elliot, Juan-Jose Salazar-Gonzalez
Springer, 2011, ISBN 978-1-4419-7802-8
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4419-7802-8
http://dx.doi.org/10.1007/978-1-4419-7802-8
Elements of Statistical Disclosure Control
Leon Willenborg and Ton de Waal
Springer, 2001, ISBN 978-1-4613-0121-9
http://dx.doi.org.databases.poly.edu/10.1007/978-1-4613-0121-9
http://dx.doi.org/10.1007/978-1-4613-0121-9
Chapter 5 Disclosure Control Methods and
Information Loss for Microdata
Josep Domingo-Ferrer and Vicenc Torra
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.91.1046
Confidentiality, Disclosure, and Data Access: Theory and Practical
Applications for Statistical Agencies
P. Doyle, J. Lane, J. Theeuwes, and L. Zayatz (Editors)
Elsevier, 2001, ISBN 978-0444507617
Information Fusion in the Context of Data Privacy
Pages 235-244
Guillermo Navarro-Arribas and Vicenc Torra (editors)
Information Fusion, Volume 13, Number 4 (October 2012)
http://www.sciencedirect.com.databases.poly.edu/science/article/pii/S
1566253512000024
http://www.sciencedirect.com/science/article/pii/S1566253512000024
The Dining Cryptographers Problem:
Unconditional Sender and Recipient Untraceability
David Chaum
Pages 65-75
Journal of Cryptology, Volume 1, Number 1 (January 1988)
http://dx.doi.org.databases.poly.edu/10.1007/BF00206326
http://dx.doi.org/10.1007/BF00206326
Dining cryptographers problem
Wikipedia:
http://en.wikipedia.org/wiki/Dining_cryptographers_problem
Untraceable Electronic Mail, Return Addresses,
and Digital Pseudonyms
David L. Chaum
Pages 84-90
Communications of the ACM, Volume 24, Number 2 (February 1981)
http://dx.doi.org.databases.poly.edu/10.1145/358549.358563
http://dx.doi.org/10.1145/358549.358563
David Chaum
Wikipedia:
http://en.wikipedia.org/wiki/David_Chaum
Differential Privacy
Cynthia Dwork
Pages 1-12
http://dx.doi.org.databases.poly.edu/10.1007/11787006_1
http://dx.doi.org/10.1007/11787006_1
Automata, Languages and Programming:
33rd International Colloquium, ICALP 2006; Proceedings, Part II
Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener
(Editors)
Springer, 2006, ISBN 978-3-540-35908-1, LNCS 4052
http://dx.doi.org.databases.poly.edu/10.1007/11787006
http://dx.doi.org/10.1007/11787006
Cynthia Dwork
Wikipedia:
http://en.wikipedia.org/wiki/Cynthia_Dwork
DBLP:
http://www.informatik.unitrier.de/~ley/pers/hd/d/Dwork:Cynthia
Privacy Challenges in RFID
Gildas Avoine
Pages 1-8
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-28879-1_1
http://dx.doi.org/10.1007/978-3-642-28879-1_1
Data Privacy Management and Autonomous Spontaneus Security:
DPM 2011 and SETOP 2011, Revised Selected Papers
Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas,
Nora Cuppens-Boulahia, and Sabrina de Capitani di Vimercati (Editors)
Springer, 2012, ISBN 978-3-642-28879-1, LNCS 7122
http://dx.doi.org.databases.poly.edu/10.1007/978-3-642-28879-1
http://dx.doi.org/10.1007/978-3-642-28879-1
Advanced Research in Data Privacy
Guillermo Navarro-Arribas and Vicenc Torra (Editors)
Springer, 2015, ISBN 978-3-319-09885-2
http://dx.doi.org.databases.poly.edu/10.1007/978-3-319-09885-2
http://dx.doi.org/10.1007/978-3-319-09885-2
Top of Shelf
Top of Section
=======================================
Security Science ========================
Security Science: The Theory and Practice of Security
Clifton L Smith and David J Brooks
Elsevier, 2013, ISBN 978-0-12-394436-8
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
123944368
http://www.sciencedirect.com/science/book/9780123944368
http://dx.doi.org/10.1007/978-3-319-11227-5
Electronic Access Control
Thomas Norman
Elsevier, 2012, ISBN 978-0-12-382028-0
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
123820280
http://www.sciencedirect.com/science/book/9780123820280
Applied Crime Analysis: A Social Science Approach to
Understanding Crime, Criminals, and Victims
Wayne Petherick
Elsevier, 2015, ISBN 978-0-323-29460-7
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
323294607
http://www.sciencedirect.com/science/book/9780323294607
Misleading DNA Evidence: Reasons for Miscarriages of Justice
Peter Gill
Elsevier, 2014, ISBN 978-0-12-417214-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124172142
http://www.sciencedirect.com/science/book/9780124172142
Security Careers: Skills, Compensation, and Career Paths; Third Edition
Stephen W. Walker and James E. Fushee
Elsevier, 2014, ISBN 978-0-12-800104-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
128001042
http://www.sciencedirect.com/science/book/9780128001042
Risk Analysis and the Security Survey, Fourth Edition
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
123820129
http://www.sciencedirect.com/science/book/9780123820129
Security Consulting, Fourth Edition
Charles A. Sennewald
Elsevier, 2013, ISBN 978-0-12-398500-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
123985002
http://www.sciencedirect.com/science/book/9780123985002
From the Files of a Security Expert Witness
Charles A. Sennewald
Elsevier, 2014, ISBN 978-0-12-411625-2
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124116252
http://www.sciencedirect.com/science/book/9780124116252
Effective Physical Security, Fourth Edition
Lawrence J. Fennelly
Elsevier, 2013, ISBN 978-0-12-415892-4
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124158924
http://www.sciencedirect.com/science/book/9780124158924
CCTV: From Lights to Pixels, Third Edition
Vlado Damjanovski
Elsevier, 2014, ISBN 978-0-12-404557-6
http://www.sciencedirect.com.databases.poly.edu/science/book/9780
124045576
http://www.sciencedirect.com/science/book/9780124045576
Top of Shelf
Top of Section
=======================================
Additional Web Resources ===============
Blog of Gene Spafford
https://www.cerias.purdue.edu/site/blog/author/spaf/
Krebs on Security in-depth security news and investigation
http://krebsonsecurity.com/
Schneier on Security a blog covering security and security
technology
http://www.schneier.com/
Questions & Answers Cryptography @ Stack Exchange
http://crypto.stackexchange.com/
Cryptology ePrint Archive
http://eprint.iacr.org/
Top of Shelf
Top of Section
=======================================