Home
Useful Resources -- Final Year Project 2002-2003

 
Books
 
TitleDescription
Unix System Administration Handbook (3rd Edition)
Evi Nemeth, Garth Snyder, Scott Seebass, Trent R. Hein (Prentice Hall 2001)
An excellent book on Unix system administration which covers Linux, FreeBSD, HP-UX and Solaris configurations. A must-have reference book for all Unix system administrators.
Computer Networking: A Top-down Approach Featuring the Internet
James F. Kurose, Keith W. Ross (Addison Wesley 2001)
This book utilizes the Internet as an example to illustrate the principles of computer networking. The top-down approach used in this book has made the material easier to understand.
Maximum Linux Security (2nd Edition)
Anonymous (Sams Publishing 2001)
This is a book written to discuss computer security issues from a hacker's perspective. It also suggests possible ways of defense.
TCP/IP Unleashed
Tim Parker, Mark Sportack (Sams Publishing 2000)
This book discusses TCP/IP and network services that run above it in a general way, without making reference to specific operating systems. It does not describe the protocols in detail, but can serve as a starting point for further investigation.
Real World Linux Security: Intrusion Prevention, Detection and Recovery
Bob Toxen (Prentice Hall 2001)
This book proposes a lot of scenarios where security may be compromised and possible ways of defense. Another book written from a hacker's perspective.
Linux Firewalls (2nd Edition)
Bob Ziegler (New Riders Publishing 2002)
Featuring an excellent coverage on iptables, the Linux firewall tool for kernel 2.4 and later.
Network Security -- Private Communication in a Public World (2nd Edition)
Charlie Kaufman, Radia Perlman, Mike Spencer (Prentice Hall 2002)
A comprehensive book on network security emphasising on algorithms and standards on cryptography and authentication.
 
Online Resources
 
Secure Communication Protocols and Cryptographic Algorithms
RFC1321The MD5 Message Digest Algorithm
FIPS PUB 180-2Secure Hash Standard
FIPS PUB 197Advanced Encryption Standard (AES)
FIPS PUB 46-3Data Encryption Standard (DES) (with 3-DES)
RFC2246Transport Layer Security (TLS) v1
SSL3Secure Socket Layer (SSL) v3 (Draft, Local Copy)
RFC2104HMAC: Keyed-Hashing for Message Authentication
FIPS SP800-38ARecommendation for Block Cipher Modes of Operation -- Methods and Techniques
RFC2437PKCS #1: RSA Cryptography Specifications Version 2.0
RSA-RC6RC6
FIPS 186-2Digital Signature Standard (DSS)
 
Miscellaneous Links
SSL 3.0 Specification
Java Native Interface -- The Java Tutorial
JNI HOW-TO
Analysis of the SSL 3.0 Protocol
Specifications of the SET Protocol
Request For Comments
Last Updated on 23/12/2002
Chan Bernard Ki Hong (1999-2004).
Downloads | FAQ | Legal Information | Feedback | Validate This Page