top of page

BOOKS

​Master of Science in Cyber Security Operations and Leadership - Curriculum Books

  • Axelrod, C. W. (2012). Engineering Safe and Secure Software Systems, 1st Edition. Artech House.

​​

  • Bosworth, S. Kabab, M. E. Wayne, E. (2014). Computer Security Handbook, Volume 1. 6th Edition. Wiley.

  • ​Bosworth, S. Kabab, M. E. Wayne, E. (2014). Computer Security Handbook, Volume 2. 6th Edition. Wiley.

  • Ferguson, N. Schneier, B. Kohno, T. (2010). Cryptography Engineering: Design Principles and Practical Applications. Wiley.

  • Jensen III, C. J. McElreath, D. H. Graves, M. (2018). Introduction to Intelligence Studies, 2nd Edition. Routledge Taylor & Francis Group. 

  • Johnson, R. (2014). Security Policies and Implementation Issues, 2nd Edition. Jones & Bartlett Learning.

  • Iannarelli, J. G. O’Shaughnessy, M. (2015). Information Governance and Security. Protecting and Managing Your Company's Proprietary Information. Elsevier.

  • Ross, R. McEvilley, M. Oren, J. C. (2017). Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure System. U.S. Department of Commerce - National Institute of Standards and Technology. 

  • Sherwood, J. Clark, A. Lynas, D. (2005). Enterprise Security Architecture: A Business Driven Approach. CRC Press.

 

  • Sommerville, I. (2016). Software Engineering, 10th Edition. Pearson Education Limited.

Additional Reading

  • Anderson, R. J. (2018). Security Engineering: A Guide to Building Dependable Distributed Systems, Second Edition. Wiley.

​​

  • Aumasson, J. (2018). Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press.

  • Bejtlich, R. (2013). The Practice of Network Security Monitoring: Understanding Incident Detection and Response. No Starch Press.

  • Chapple, M, Stewart, J. M. Gibson, D. (2018). (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition. Sybex.

  • Chebbi, C. (2018). Advanced Infrastructure Penetration Testing. Packt Publishing.

  • Diogenes, Y. Ozkaya, E. (2018). Cybersecurity - Attack and Defense Strategies. Packt Publishing.

  • Forshaw, J. (2017). Attacking Network Protocols. No Starch Press.

  • Garman, J. (2010). Kerberos: The Definitive Guide. O’Reilly Media.

  • Hertzog, R. O’Gorman, J. Aharoni, M. (2017). Kali Linux Revealed. Mastering the Penetration Testing Distribution. Offsec Press.

  • Lyon. G. (2008, December). Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. Insecure.com LLC.

  • Monte, M. (2015). Network Attacks and Exploitation. Wiley.

  • Touhill, C. J. Touhill, G. J. (2014). Cybersecurity for Executives: A Practical Guide. Wiley-AIChE.

bottom of page