| Home Page |
| Course Page |
Java Tutorials
Java Documentation
Data Communications and Networks Books
TCP/IP Books
Network Security Books
Cryptography Books
Books on the Above in Java
Data Structures and Algorithms Books
Journals
Conferences
Internet Standards
The Java Tutorial. http://java.sun.com/docs/books/tutorial
Java I/O Tutorial (including object serialization). http://java.sun.com/docs/books/tutorial/essential/io/index.html
Java Custom Networking Tutorial. http://java.sun.com/docs/books/tutorial/networking/index.html
Java Threads Tutorial. http://java.sun.com/docs/books/tutorial/essential/threads/index.html
Java Exceptions Tutorial. http://java.sun.com/docs/books/tutorial/essential/exceptions/index.html
Java 2 Standard Edition Software Development Kit Version 1.6.0 Documentation. http://java.sun.com/javase/6/docs/
Java 2 Standard Edition Software Development Kit Version 1.6.0 API Specification. http://java.sun.com/javase/6/docs/api/
Douglas E. Comer. Computer Networks and Internets, Fifth Edition. Prentice-Hall, 2009.
James F. Kurose and Keith W. Ross. Computer Networking: A Top-Down Approach Featuring the Internet, Fifth Edition. Addison-Wesley, 2009.
Behrouz A. Forouzan. Data Communications and Networking, Fourth Edition. McGraw-Hill, 2007.
Nader F. Mir. Computer and Communication Networks. Prentice Hall, 2007.
Larry L. Peterson and Bruce S. Davie. Computer Networks: A Systems Approach, 4th Edition. Morgan Kaufmann, 2007.
William Stallings. Data and Computer Communications, Eighth Edition. Prentice Hall, 2006.
Andrew S. Tanenbaum. Computer Networks, Fourth Edition. Prentice Hall PTR, 2003.
Alan Dennis. Networking in the Internet Age. John Wiley & Sons, 2002.
Charles E. Perkins, editor. Ad Hoc Networking. Addison-Wesley, 2001.
Radia Perlman. Interconnections: Bridges, Routers, Switches, and Internetworking Protocols, Second Edition. Addison-Wesley, 2000.
Dimitri Bertsekas and Robert Gallager. Data Networks, Second Edition. Prentice Hall, 1992.
Douglas Comer, David Stevens, and Michael Evangelista. Internetworking with TCP/IP, Volume 2: Design, Implementation, and Internals, Fourth Edition. Prentice-Hall, 2006.
Douglas Comer and David Stevens. Internetworking with TCP/IP, Volume 3: Client-Server Programming and Applications, Linux/Posix Sockets Version. Prentice-Hall, 2001.
Douglas Comer. Internetworking with TCP/IP, Volume 1: Principles, Protocols, and Architecture, Fourth Edition. Prentice-Hall, 2000.
Warren W. Gay. Linux Socket Programming By Example. Que, 2000.
Douglas Comer and David Stevens. Internetworking with TCP/IP, Volume 3: Client-Server Programming and Applications, Windows Sockets Version. Prentice-Hall, 1997.
Douglas Comer and David Stevens. Internetworking with TCP/IP, Volume 3: Client-Server Programming and Applications, BSD Sockets Version, Second Edition. Prentice-Hall, 1996.
Sidnie Feit. TCP/IP: Architecture, Protocols, and Implementation. McGraw-Hill, 1993.
Ryan Russell, Tim Mullen (Thor), FX, Dan "Effugas" Kaminsky, Joe Grand, Ken Pfeil, Ido Dubrawsky, Mark Burnett, and Paul Craig. Stealing the Network: How to Own the Box. Syngress Publishing, 2003.
Charlie Kaufman, Radia Perlman, and Mike Speciner. Network Security: Private Communication in a Public World, Second Edition. Prentice Hall PTR, 2002.
Kevin D. Mitnick and William L. Simon. The Art of Deception. Wiley Publishing, Inc., 2002.
Anonymous. Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation, Second Edition. Sams Publishing, 2001.
Anonymous. Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network, Third Edition. Sams Publishing, 2001.
Jeff Crume. Inside Internet Security: What Hackers Don't Want You to Know. Addison-Wesley, 2000.
Bruce Schneier. Secrets and Lies: Digital Security in a Networked World. John Wiley & Sons, 2000.
Antoine Joux. Algorithmic Cryptanalysis. Chapman & Hall/CRC, 2009.
Jonathan Katz and Yehuda Lindell. Introduction to Modern Cryptography. Chapman & Hall/CRC, 2008.
Christopher Swenson. Modern Cryptanalysis: Techniques for Advanced Code Breaking. John Wiley & Sons, 2008.
Susan Loepp and William K. Wootters. Protecting Information: From Classical Error Correction to Quantum Cryptography. Cambridge University Press, 2006.
Douglas R. Stinson. Cryptography: Theory and Practice, 3rd Edition. Chapman & Hall/CRC, 2006.
Wade Trappe and Lawrence C. Washington. Introduction to Cryptography with Coding Theory, 2nd Edition. Prentice Hall, 2006.
Oded Goldreich. Foundations of Cryptography: Volume II Basic Applications. Cambridge University Press, 2004.
Wenbo Mao. Modern Cryptography: Theory and Practice. Hewlett-Packard Company/Prentice Hall PTR, 2004.
Niels Ferguson and Bruce Schneier.
Practical Cryptography.
Wiley Publishing, 2003.
Errata:
http://www.schneier.com/book-practical.html
Charlie Kaufman, Radia Perlman, and Mike Speciner. Network Security: Private Communication in a Public World, Second Edition. Prentice Hall PTR, 2002.
Oded Goldreich. Foundations of Cryptography: Volume I Basic Tools. Cambridge University Press, 2001.
Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone.
Handbook of Applied Cryptography.
CRC Press, 1997.
Free online version:
http://www.cacr.math.uwaterloo.ca/hac/
Bruce Schneier. Applied Cryptography, 2nd Edition. John Wiley & Sons, 1996.
Rich Helton and Johennie Helton. Java Security Solutions. Wiley Publishing, Inc., 2002.
David Reilly and Michael Reilly. Java Network Programming and Distributed Computing. Addison-Wesley, 2002.
Anany Levitin. Introduction to the Design and Analysis of Algorithms, Second Edition. Addison-Wesley,2007.
Richard Johnsonbaugh and Marcus Schaefer. Algorithms. Prentice Hall, 2004.
Michael T. Goodrich and Roberto Tamassia. Algorithm Design: Foundations, Analysis, and Internet Examples. John Wiley & Sons, 2002.
Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. Introduction to Algorithms, Second Edition. MIT Press, 2001.
Robert Sedgewick. Algorithms, Second Edition. Addison-Wesley, 1988.
Alfred V. Aho, John E. Hopcroft, and Jeffrey D. Ullman. Data Structures and Algorithms. Addison-Wesley, 1983.
ACM SIGCOMM Computer Communication Review
ACM SIGMOBILE Mobile Computing and Communications Review
ACM Transactions on Information and System Security
ACM Transactions on Internet Technology
IEEE Communications
IEEE Journal on Selected Areas in Communications
IEEE Network
IEEE Transactions on Communications
IEEE Transactions on Wireless Communications
IEEE Wireless Communications (formerly IEEE Personal Communications)
IEEE/ACM Transactions on Networking
Mobile Networks and Applications
Wireless Networks
ACM Conference on Computer and Communications Security
ACM MobiCom International Conference on Mobile Computing and Networking
ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
IEEE Conference on Local Computer Networks
IEEE INFOCOM
IEEE Intelligent Network Workshop
IEEE International Conference on Communications
IEEE International Conference on Computer Communications and Networks
IEEE International Conference on Network Protocols
IEEE International Conference on Networks
IEEE International Phoenix Conference on Computers and Communications
IEEE Symposium on Computers and Communications
IEEE Wireless Communications and Networking Conference
Internet Engineering Task Force (IETF). http://www.ietf.org
IETF Requests for Comments (RFCs) -- Internet standards. http://www.ietf.org/rfc.html
Internet Assigned Numbers Authority (IANA). http://www.iana.org
| Course Page |
| Home Page |