The busy network administrator Keeps fit and flexible Loves to cook (former pizza chef) Ponders unfathomable culture

My Computer Security Library

Copyright 2016, 2018 by Richard J. Ballard -- All Rights Reserved.

This library spans the fundamental issues of computer security. 21st Century computer security has become a design / operations specialty. IMO an always valid question: Does this design / product decision unduly complicate fault isolation?

City
by Clifford D. Simak

The first (c1952) fictional treatment of computer viruses that I know.

The Shockwave Rider
by John Brunner

The first (c1975) fictional treatment of hackers and computer worms that I know. Similarities (government-trained fugitive cyberwarrior) to the television series Dark Angel.

Neuromancer
by William Gibson

The classic (c1984) fictional treatment of hacking in an internetworked world. Similarities (social environment) to the television series Dark Angel.

Cyberpunk: Outlaws and Hackers on the Computer Frontier
by Katie Hafner and John Markoff

A good introduction (holiday gift?) for customers and management.

Disclosure
starring Michael Douglas and Demi Moore

This 1994 thoughtful film depicts how friendships and competitiveness sometimes defeats corporate IT security.

Hackers
starring Jonny Lee Miller and Angelina Jolie

This 1995 energetic film depicts the potential social attractiveness (but not the potential antisocial destructiveness) of computer hackers.

Computer Security for Dummies
by Peter T. Davis and Barry D. Lewis

c1996 clearly written 342 page introduction to a complex subject.

Steal This Computer Book
by Wallace Wang

c1998 humorously written 340 page guide to the good guys and bad guys on the Internet.

Network Security: PRIVATE Communication in a PUBLIC World
by Charlie Kaufman, Radia Perlman, and Mike Speciner

c1995 clearly written 505 page guide to the principles of computer and communications security.

Building Internet FIREWALLS
by D. Brent Chapman and Elizabeth D. Zwicky

c1995 clearly written 517 page guide to computer and communications security issues / countermeasures. Not a how to text.

Computer Crime: A Crimefighter's Handbook
by David Icove, Karl Seger, and William VonStorch

c1995 well written 437 page guide to computer crime, proactive measures and reactive responses. 146 pp. of statutes, sample search warrant.

Practical UNIX & Internet Security (2nd Edition)
by Simson Garfinkel and Gene Spafford

c1996 clearly written 971 page guide to UNIX and Internet security issues and countermeasures.

Hacker Proof: The Ultimate Guide to Network Security
by Lars Klander

c1997 clearly written 660 page guide EXPLAINING network security issues / countermeasures. Includes utilities CDROM.

Hacking Exposed: Network Security Secrets & Solutions
by Stuart McClure et al

c1999 clearly written 484 page guide to attacking / protecting workstations, servers and network remote access resources. Updated editions exist.

Securing Windows NT/2000 Servers for the Internet
by Stefan Norberg

c2001 clearly written 199 page overview of perimeter networks and (hardened) bastian hosts for Windows NT / 2000 administrators. Predates Internet automated maintenance / patching.

Bulletproofing TCP/IP-based Windows NT/2000 Networks
by Gilbert Held

c2001 well organized 290 page guide to network security issues and countermeasures. Predates Internet automated maintenance / patching.

Visit Richard's Home webpage.

Visit Richard's VampireFreaks webpage: friends, photos and opinions.

Visit Richard's MySpace webpage: friends, photos and opinions.

Visit Richard's Amazon.com Profile: 200+ product reviews.

Comments? Send Richard a message at RBall84213@att.net.