• General

    Seguridad en Redes de Comunicación (2015)

    • Bibliografía






      • W. Stallings & L. Brown (2007): «Computer Security: Principles and Practice». Prentice Hall.

      • S. Northcutt et all (2005): «Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems». Sams.






      • D.W. Davies & W.L. Price (1989): «Security for Computer Networks». Wiley.

      • Charles P. Pfleeger & Shari Lawrence Pfleeger (2003): «Security in Computing». Prentice Hall.

      • E. Rescorla (2000): «SSL and TLS: Designing and Building Secure Systems». Reading, MA: Addison-Wesley.

      • C. Adams & S. Lloyd (2002): «Understanding PKI: Concepts, Standards and Deployment Considerations». Addison-Wesley.

      • L. Spitzner: «Honeypots: Tracking Hackers». Addison-Wesley.

      • J. Pastor et all (1999): «Criptografía Digital: Fundamentos y Aplicaciones».