Perfilado de sección

  • bibliografia

      

     

        Básica    

     

    • W. Stallings & L. Brown (2007): «Computer Security: Principles and Practice». Prentice Hall.

    • S. Northcutt et all (2005): «Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems». Sams.

     

     

     

        Complementaria    

     

    • D.W. Davies & W.L. Price (1989): «Security for Computer Networks». Wiley.

    • Charles P. Pfleeger & Shari Lawrence Pfleeger (2003): «Security in Computing». Prentice Hall.

    • E. Rescorla (2000): «SSL and TLS: Designing and Building Secure Systems». Reading, MA: Addison-Wesley.

    • C. Adams & S. Lloyd (2002): «Understanding PKI: Concepts, Standards and Deployment Considerations». Addison-Wesley.

    • L. Spitzner: «Honeypots: Tracking Hackers». Addison-Wesley.

    • J. Pastor et all (1999): «Criptografía Digital: Fundamentos y Aplicaciones».