BOOKS
Master of Science in Cyber Security Operations and Leadership - Curriculum Books
-
Axelrod, C. W. (2012). Engineering Safe and Secure Software Systems, 1st Edition. Artech House.
-
Bosworth, S. Kabab, M. E. Wayne, E. (2014). Computer Security Handbook, Volume 1. 6th Edition. Wiley.
-
Bosworth, S. Kabab, M. E. Wayne, E. (2014). Computer Security Handbook, Volume 2. 6th Edition. Wiley.
-
Ferguson, N. Schneier, B. Kohno, T. (2010). Cryptography Engineering: Design Principles and Practical Applications. Wiley.
-
Jensen III, C. J. McElreath, D. H. Graves, M. (2018). Introduction to Intelligence Studies, 2nd Edition. Routledge Taylor & Francis Group.
-
Johnson, R. (2014). Security Policies and Implementation Issues, 2nd Edition. Jones & Bartlett Learning.
-
Iannarelli, J. G. O’Shaughnessy, M. (2015). Information Governance and Security. Protecting and Managing Your Company's Proprietary Information. Elsevier.
-
Ross, R. McEvilley, M. Oren, J. C. (2017). Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure System. U.S. Department of Commerce - National Institute of Standards and Technology.
-
Sherwood, J. Clark, A. Lynas, D. (2005). Enterprise Security Architecture: A Business Driven Approach. CRC Press.
-
Sommerville, I. (2016). Software Engineering, 10th Edition. Pearson Education Limited.
Additional Reading
-
Anderson, R. J. (2018). Security Engineering: A Guide to Building Dependable Distributed Systems, Second Edition. Wiley.
-
Aumasson, J. (2018). Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press.
-
Bejtlich, R. (2013). The Practice of Network Security Monitoring: Understanding Incident Detection and Response. No Starch Press.
-
Chapple, M, Stewart, J. M. Gibson, D. (2018). (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition. Sybex.
-
Chebbi, C. (2018). Advanced Infrastructure Penetration Testing. Packt Publishing.
-
Diogenes, Y. Ozkaya, E. (2018). Cybersecurity - Attack and Defense Strategies. Packt Publishing.
-
Forshaw, J. (2017). Attacking Network Protocols. No Starch Press.
-
Garman, J. (2010). Kerberos: The Definitive Guide. O’Reilly Media.
-
Hertzog, R. O’Gorman, J. Aharoni, M. (2017). Kali Linux Revealed. Mastering the Penetration Testing Distribution. Offsec Press.
-
Lyon. G. (2008, December). Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. Insecure.com LLC.
-
Monte, M. (2015). Network Attacks and Exploitation. Wiley.
-
Touhill, C. J. Touhill, G. J. (2014). Cybersecurity for Executives: A Practical Guide. Wiley-AIChE.