home *** CD-ROM | disk | FTP | other *** search
/ Hackers Underworld 2: Forbidden Knowledge / Hackers Underworld 2: Forbidden Knowledge.iso / HACKING / BOOKS.TXT < prev    next >
Text File  |  1994-07-17  |  42KB  |  730 lines

  1.  
  2.              BIBLIOGRAPHY OF COMPUTER SECURITY BOOKS
  3.                        (1973 through 1988)
  4.  
  5. Note:  A bibliography is now being developed to encompass 1989. 
  6.      
  7.  
  8.                        ABUSE/MISUSE/CRIME
  9.  
  10.                                                             
  11.           AUTHOR:  Fennelly, Lawrence J.                     
  12.                                                             
  13.           TITLE:  Handbook of Loss Prevention and Crime      
  14.                  Prevention                                 
  15.           ORGANIZATION:                                      
  16.           VOLUME NO:                                         
  17.           EDITION NO:  Second                                
  18.           NAME OF PUBLISHER:  Butterworth Publishers         
  19.           LOCATION OF PUBLISHER:  Stoneham, MA               
  20.           PUBLICATION DATE:  October 1988                    
  21.           CATEGORY:  Abuse/Misuse/Crime                      
  22.          COST:  $69.95                                      
  23.          DESCRIPTION:  This book brings together the        
  24.          expertise of over 40 security and crime prevention 
  25.          professionals with information on the latest       
  26.          technology, trends, and references.                
  27.  
  28.                                                             
  29.           AUTHOR:  Lobel, Jerome                             
  30.                                                             
  31.           TITLE:  Foiling The Systems Breakers               
  32.                                                             
  33.           ORGANIZATION:                                      
  34.           VOLUME NO:                                         
  35.           EDITION NO:  First                                 
  36.           NAME OF PUBLISHER:  McGraw-Hill Book Company       
  37.           LOCATION OF PUBLISHER:  New York                   
  38.           PUBLICATION DATE:  1986                            
  39.           CATEGORY:  Abuse/Misuse/Crime                      
  40.          COST:  $34.95                                      
  41.          DESCRIPTION:  This book is designed to help system 
  42.          designers and data processing staff find ways to   
  43.          protect computer systems from unauthorized access. 
  44.                 
  45.  
  46.                                                            
  47.           AUTHOR:  U.S. Department of Justice                
  48.                                                             
  49.           TITLE:   Computer Crime:  Computer Security        
  50.                   Techniques                                
  51.           ORGANIZATION:  U.S. Department of Justice          
  52.           VOLUME NO:                                         
  53.           EDITION NO:  First                                 
  54.           NAME OF PUBLISHER: U.S. Department of Justice      
  55.           LOCATION OF PUBLISHER:  Washington, D.C.           
  56.           PUBLICATION DATE:  Not Given TBD                   
  57.           CATEGORY:  Abuse/Misuse/Crime                      
  58.          COST:  Free                                        
  59.          DESCRIPTION:  Presents the results of a major      
  60.          review of the computer security procedures         
  61.          currently employed in the public and private       
  62.          sectors.                                           
  63.  
  64.  
  65.           AUTHOR:  U.S. Department of Justice                
  66.                                                             
  67.           TITLE:  Computer Crime:  Electronic Fund Transfer  
  68.                  Systems and Crime                          
  69.           ORGANIZATION: U.S. Department of Justice           
  70.           VOLUME NO:                                         
  71.           EDITION NO:  First                                 
  72.           NAME OF PUBLISHER:  U.S. Department of Justice     
  73.           LOCATION OF PUBLISHER:  Washington, D.C.           
  74.           PUBLICATION DATE:  1982                            
  75.           CATEGORY:  Abuse/Misuse/Crime                      
  76.          COST:  Free                                        
  77.          DESCRIPTION:  Reviews the crime-related            
  78.          implications of the growth of computer usage in    
  79.          EFT, and the nature and magnitude of EFT crimes.   
  80.  
  81.  
  82.  
  83.           AUTHOR:   Van Duyn, Julia                          
  84.                                                             
  85.           TITLE:  The Human Factor in Computer Crime         
  86.                                                             
  87.           ORGANIZATION:  Institute of Internal Auditors      
  88.           VOLUME NO:                                         
  89.           EDITION NO:                                        
  90.           NAME OF PUBLISHER:  Petrocelli Books, Inc.         
  91.           LOCATION OF PUBLISHER:  New York, Princeton        
  92.           PUBLICATION DATE:  1984                            
  93.           CATEGORY:  Abuse/Misuse/Crime                      
  94.          COST:  $24.95                                      
  95.          DESCRIPTION:  States that insiders in a company    
  96.          are the ones most likely to commit computer abuse. 
  97.          A list of procedures that management can follow to 
  98.          make their installation secure is included.        
  99.                   
  100.  
  101.                          ACCESS CONTROL
  102.  
  103.           AUTHOR:  Abrams, M.D. and Podell, H.J.             
  104.                                                             
  105.           TITLE:  Computer and Network Security              
  106.                                                             
  107.           ORGANIZATION:                                      
  108.           VOLUME NO:                                         
  109.           EDITION NO: First                                  
  110.           NAME OF PUBLISHER:  Computer Society               
  111.           LOCATION OF PUBLISHER:  Los Alamitos, CA           
  112.           PUBLICATION DATE:   1987                           
  113.           CATEGORY:  Access Control                          
  114.          COST:  $50.00                                      
  115.          DESCRIPTION: Examines information system security  
  116.          with regard to computer, data, and network         
  117.          security.                                          
  118.                     
  119.                                                           
  120.           AUTHOR:  Bowers, Dan M.                            
  121.                                                             
  122.           TITLE:   Access Control and Personal Identification
  123.                   Systems                                   
  124.           ORGANIZATION:                                      
  125.           VOLUME NO:                                         
  126.           EDITION NO:  First                                 
  127.           NAME OF PUBLISHER:  Butterworth Publishers         
  128.           LOCATION OF PUBLISHER:  Stoneham, MA               
  129.           PUBLICATION DATE:  1988                            
  130.           CATEGORY:  Access Control                          
  131.          COST:  $24.95                                      
  132.          DESCRIPTION:  Presents a thorough examination of   
  133.          access control systems and devices for security    
  134.          managers and practitioners in the field.           
  135.  
  136.               
  137.  
  138.                                                         
  139.           AUTHOR:  Davies, D.W. and Price, W.L.              
  140.                                                             
  141.           TITLE:  Security for Computer Networks: An         
  142.          Introduction to Data Security in Teleprocessing    
  143.           ORGANIZATION:  National Physical Laboratory        
  144.           VOLUME NO:                                         
  145.           EDITION NO:  First                                 
  146.           NAME OF PUBLISHER: John Wiley & Sons, Inc.         
  147.           LOCATION OF PUBLISHER:  New York                   
  148.           PUBLICATION DATE:  1984                            
  149.           CATEGORY: Access Control                           
  150.          COST:  $34.95                                      
  151.          DESCRIP