BIBLIOGRAFÍA BÁSICA 

 

▪ Garfinkel, S.; Spafford, G.; Schawartz, A. Practical Unix & Internet Security. O'Reilly.

▪ Northcutt, S.; Zeltser, L.; Winters, S.; Frederick, K.K; Ritchey, R.W. Inside Network Perimeter Security. New Riders.

▪ Farmer, D.; Venema, W. Forensic Discovery. Addison-Wesley.

 

BIBLIOGRAFÍA COMPLEMENTARIA

 

▪ Chapman, D.B.; Zwick, E.D. Building Internet Firewalls. O'Reilly.

▪ Northcutt, S.; Novak, J.; Northcutt, S.; Novak, J. Network Intrusion Detection. New Riders.

▪ Anonymous. Maximum Security. SAMS.

▪ McClure, S.; Scambray, J.; Kurtz, G. Hackers. Secretos y soluciones para la seguridad de redes. McGraw-Hill.

▪ Scheneier, B. Applied Cryptography. John Wiley & Sons, Inc.

▪ Scheneier, B. Secrets and Lies: Digital Security in an Networked World. John Wiley & Sons, Inc.

▪ Mitnick, K.D.; Simon, W.L. The art of deception. John Wiley & Sons, Inc.