Список литературы для самостоятельного изучения

  1. Andrew Tanenbaum. Modern operating systems. Prentice Hall, 2001.
  2. Brian Kernighan, Dennis Ritchie. The C programming language. Prentice Hall, 1988.
  3. Виктор Юров. Assembler. Специальный справочник. Издательский дом «Питер», 2005.
  4. Ассемблер в Linux для программистов C

  5. Chris Anley, John Heasman, Felix Linder, Gerardo Richarte. The Shellcoder’s handbook. Wiley Publishing, 2007.
  6. Douglas Comer. Internetworking with TCP/IP: Principles, protocols and architecture. Prentice Hall, 2006.
  7. AEleen Frisch. Essential system administration. O’Reilly Media Inc., 2002.
  8. Simon Singh, The Code Book, 1999, ISBN 1-85702-889-9 (Перевод: Саймон Сингх, Книга шифров, ISBN 978-5-17-038477-8)
  9. Jonathan Katz, Yehuda Lindell, Introduction to modern cryptography, 2008, ISBN 978-1-58488-551-1
  10. Reinhard Wobst, Cryptology unlocked, 2007, ISBN 978-0-470-06064-3
  11. Bruce Schneier, Applied Cryptography, 1996, ISBN 0-471-11709-9 (Перевод: Брюс Шнайер, Прикладная криптография, 2002, ISBN 5-89392-055-4)
  12. Samuel S. Wagstaff Jr., Cryptanalysis of Number Theoretic Ciphers, 2002, ISBN 978-1584881537
  13. Christopher Swenson, Modern Cryptanalysis: Techniques for Advanced Code Breaking, 20082, ISBN 978-0470135938
  14. Richard E. Smith, Authentication: From Passwords to Public Keys, 2001, ISBN 978-0201615999
  15. Chris Anley, John Heasman, Felix Linder, Gerardo Richarte. The Shellcoder’s handbook. Wiley Publishing, 2007.
  16. Douglas Comer. Internetworking with TCP/IP: Principles, protocols and architecture. Prentice Hall, 2006.
  17. Æleen Frisch. Essential system administration. O’Reilly Media Inc., 2002.
  18. Christopher Swenson, Modern Cryptanalysis: Techniques for Advanced Code Breaking, 20082, ISBN 978-0470135938
  19. Richard E. Smith, Authentication: From Passwords to Public Keys, 2001, ISBN 978-0201615999
  20. Mike Wenstrom, Managing Cisco Network Security, 2001, ISBN 978-1578701032
  21. Dafydd Stuttard, Marcus Pinto. The Web Application Hacker's Handbook: Detecting and Exploiting Security Flaws. Wiley Publishing, 2007.

Infosec: biblio (last edited 2012-01-27 19:52:45 by Dennis Gamayunov)