E. Amoroso: Fundamentals of computer security technology. Prentice Hall 1994. 11266 Ross Anderson: [Home page.] Internet 1996, 6p. 13872 Anonimo: Linux - massima sicurezza. Apogeo 2000, 660p. Lire 78.000. D. Atencio Psille/J. Eschweiler: Security at work. Springer 2005, 500p. Eur 50. 7589 Giuseppe Ateniese/Carlo Blundo/Alfredo De Santis/Douglas Stinson: Visual cryptography for general access structures. Internet 1995, 32p. Andre' Bacard: The computer privacy handbook. Daniel Barrett: Bandits on the information superhighway. O'Reilly 1996, 230p. 1-56592-156-9. $18. 7892 Joffroy Beauquier/Maurice Nivat: Application of formal language theory to problems of security and synchronization. In 1105 Book, 407-454. Hermann-Josef Bergmann/Jutta Stolp: Datenschutz und Datensicherheit im Netz. Hu''thig 1996, 180p. 3-7785-2530-1. DM 78. Personal Computer im Netz. 6869 Thomas Beth: Sichere offene Datennetze. Spektrum 1995/5, 46-55. 7588 Carlo Blundo/Douglas Stinson: Anonymous secret sharing schemes. Internet 1996, 15p. 7684 David Bonn: The trouble with live data. Linux Journal April 1996, 63-65. 1105 Ronald Book (ed.): Formal language theory. Academic Press 1980. 13593 Gabriele Bosetti: I love you. Linux & C Giugno 2000, 27-29. M. Brown/Joey Rogers: User identification via keystroke characteristics of typed names using neural networks. Int. J. Man-Machine Studies 39 (1993), 999-1014. H. Brueggemann/W. Gerhardt-Haeckl (ed.): Verlaessliche IT-Systeme. Vieweg 1995. 11361 Ran Canetti/Rosario Gennaro/Amir Herzberg/Dalit Naor: Proactive security - long-term protection against break-ins. RSA Cryptobytes 3/1 (1997), 1, 3-8. 6847 Fabio Massimo Cestari: I firewall. Internet News Giugno 1995, 44-47. D. Brent Chapman/Elizabeth Zwicky: Building Internet firewalls. O'Reilly 1995. 1-56592-124-0. William Cheswick/Steven Bellovin: Firewalls and Internet security. Addison-Wesley 1994. 0-201-63357-4. $27. "An interesting overview of many important means (firewall in particular, of course) of protecting your Internet system." [Firewalls und Sicherheit im Internet Addison-Wesely 1995, 404p. 3-89319-875-x. DM 80] 12427 William Cheswick/Steven Bellovin/James Gosling/Warwick Ford: Mauern, ta''uschen, bremsen. Spektrum 1999/3, 90-93. 8443 Barry Cipra: Lattices may put security codes on a firmer footing. Science 23 August 1996, 1047-1048. On Ajtai's result that there are no algorithms for solving a finite set of lattice shortest basis problems, without solving all of them. I. Damgard (ed.): Lectures on data security. Springer LN CS 1561 (1999), 250p. 3-540-65757-6. DM 58. D. Davies/W. Price: Security for computer networks. Wiley 1989. 9817 Paul Davis: Mathematics and the Internet. Internet, ca. 1996. The mathematics of internet security. 12881 Peter De Jager: Der Jahrtausendfehler. Spektrum 1999/11, 84-89. 10298 Patrik D'haeseleer/Stephanie Forrest/Paul Helman: An immunological approach to change detection - algorithms, analysis and implications. Proc. 1996 IEEE Symp. Security Privacy (1996), ... 13732 Gurpreet Dhillon/James Backhouse: Information system security management in the new millennium. Comm. ACM 43/7 (2000), 125-128. Yun Ding/Patrick Horster: Undetectable online password guessing attacks. Operating Systems Rev. 29/4 (1995), 77-86. 25270 Bernt Eberhart: Welche Risiken birgt die Zukunftsfabrik? Interview mit Christof Paar. Zeit Online Mai 2014, 2p. 22940 Peter Eckersley: How unique is your web browser? Internet ca. 2010, 19p. Uwe Ellermann: Ein Firewall am Fachbereich Informatik. Isolations- und Audittechniken zum Schutz von lokalen Computernetzen. Diplomarbeit Univ. Hamburg 1993. 11746 Uwe Ellermann: Bastion aus''en. Internet 1994, 2p. Uwe Ellermann: Isolations- und Audittechniken zum Schutz von lokalen Computer-Netzen. DFN-Bericht 76 (1994), 206p. 7781 Benjamin Ewy: Creating a Linux firewall using the TIS firewall toolkit. Linux Journal May 1996, 36-44. 13842 Matteo Falsetti: Aiuto! - sono entrato nel sistema ... e adesso? Linux & C Novembre 2000, 40-45. Y. Fisher: Fractal image compression. Springer 1994, 350p. 3-540-94211-4. DM 78. John Flowers: Linux security. Macmillan 1999. 0-73570035-4. $40. 10297 Stephanie Forrest/Steven Hofmeyr/Thomas Longstaff/Anil Somayaji: A sense of self for Unix processes. Proc. 1996 IEEE Symp. Security Privacy (1996), 120-128. 10303 Stephanie Forrest/Steven Hofmeyr/Anil Somayaji: Computer immunology. Internet ca. 1995, 19p. 10312 Stephanie Forrest/Alan Perelson/Lawrence Allen/Rajesh Cherukuri: Self-nonself discrimination in a computer. Proc. 1994 IEEE Symp. Res. Security Privacy (...), ... 12894 Dario Forte: Installare Linux in sicurezza. Linux Journal Dicembre/Gennaio 2000, 12-14. Martin Freiss: Protecting networks with SATAN. O'Reilly 1998, 110p. 1-56592-425-8. $20. 7491 Aeleen Frisch: Maximizing Linux security I. Linux Journal January 1996, 12-18. 7644 Aeleen Frisch: Maximizing Linux security II. Linux J. February 1996, 10-14. Walter Fumy/Patrick Horster/Peter Kraaibe: Standards und Patente zur IT-Sicherheit. Oldenbourg 1995, 270p. 3-486-22602-9. DM 98. IT = Informationstechnik. 6896 Simson Garfinkel/Gene Spafford: Practical Unix security. O'Reilly 1991. 0-937175-72-2. $30. "Semplicemente il miglior libro nel campo... tutto il necessario per rendere il vostro sistema UNIX il piu` sicuro possibile" (Maurizio Codogno). 9620 Simson Garfinkel/Gene Spafford: Practical Unix and Internet security. O'Reilly 1996, 1004p. 1-56592-148-8. $40. Simson Garfinkel/Gene Spafford: Web security and commerce. O'Reilly 1997, 410p. $27. 5591 Elisabeth Geake: Call for checks on official databases. New Scientist 28 August 1993, 10. Britain's Data Protection Registrar should have more power to investigate government and police use of personal information, say computer experts. 24513 Daniel Genkin/Adi Shamir/Eran Tromer: RSA key extraction via low-bandwith acoustic cryptanalysis. Internet 2013, 57p. Winfried Gleissner/Ruediger Grimm/Siegfried Herda/Hartmut Isselhorst: Manipulation in Rechnern und Netzen. Addison-Wesley 1989. 3-89319-258-1. Ruediger Grimm: Sicherheit fuer offene Kommunikation. Bibl. Inst. 1994, 280p. 3-411-16131-0. DM 48. 14145 Francesca Guarnieri: Teoria dei numeri e sicurezza dei dati. Tesi, Ferrara 1998. Chris Hare/Karanjit Siyan: Internet firewalls and network security. New Riders 1997. 14702 Hans-Werner Hein: Besprechung des Buchs "Secrets and lies" von Bruce Schneier. Spektrum 2001/8, 90-91. L. Hoffman (ed.): Building the big brother. The cryptographic policy debate. Springer 1995, 500p. 3-540-94441-9. DM 56. Patrick Horster (ed.): Trust center. Vieweg 1995. 13140 Marco Ivaldi: Quando il ricupero delle informazioni cancellate e' difficile ma non impossibile. Linux & C Febbraio 2000, 40-43. 13773 Marco Ivaldi: Openwall - sicurezza a partire dal kernel. Linux & C Luglio 2000, 34-37. 13786 Marco Ivaldi: CFS - file system criptato. Linux & C Ottobre 2000, 36-39. 14233 Marco Ivaldi: Password security cracking. Linux & C Aprile 2001, 46-50. 14325 Marco Ivaldi: SNORT - IDS per tutti. Linux & C Maggio 2001, 44-48. 8600 Jeffrey Kegler: Intel v. Randal Schwartz - why care? Internet 1996, 4p. S. Kent: Encryption-based protection for interactive user/computer communication. Proc. 5th Data Comm. Symp. 1977, ... S. Kent: Architectural security. In Lynch/Rose 1993, ... S. Kent: Internet privacy enhanced mail. Comm. ACM August 1993, ... 11748 Jeffrey Kephart/Gregory Sorkin/David Chess/Steve White: Kampf den Computerviren. Spektrum 1998/5, 60-65. Lars Klander: Hacker proof. McGraw-Hill 1998, 690p. Lire 74.000. Jonathan Knudsen: Java cryptography. O'Reilly 1998, 340p. 1-56592-402-9. $30. 11241 Klaus-Peter Kossakowski: Sicherheit im Deutschen Forschungsnetz. Interent ca. 1994, 16p. 27415 Michael Kofler u.a.: Hacking & Security. Rheinwerk 2018, 1060p. Eur 53. 7683 Chris Kostick: Building a Linux firewall. Linux Journal April 1996, 49-61. 9591 Othmar Kyas: Sicherheit im Internet. Datacom 1996. H. Langendoerfer/B. Schnor: Verteilte Systems. Hanser 1994. J. Leggett/G. Williams: Verifying identity via keystroke characteristics. Int. J. Man-Machine Studies 28 (1988), 67-76. J. Leggett/G. Williams/M. Usnick/M. Longnecker: Dynamic identity verification via keystroke characteristics. Int. J. Man-Machine Studies 35 (1991), 859-870. 6830 Sergio Leoni: Telecronaca di un attacco. Internet News Maggio 1995, 56-60. Un guest pericoloso in un sistema Linux. M. Lomas (ed.): Security protocols. Springer LN CS 1189 (1997). 7226 J. Loxton (ed.): Number theory and cryptography. Cambridge UP 1990, 235p. 0-521-39877-0 (pb.). Mark Ludwig: The giant black book of computer viruses. American Eagle 1998. D. Lynch/M. Rose (ed.): Internet system handbook. Addison-Wesley 1993. 7307 Charles Mann: Security schemes aspire to no-fuss system protection. Science 17 November 1995, 1113-1114. 13578 Scott Mann/Ellen Mitchell: La sicurezza dei sistemi Linux. Mondadori 2000, 570p. Lire 100.000. 21046 Stuart McClure/Joel Scambray/George Kurtz: Hacker 6.0. Apogeo 2009, 600p. Eur 55. Carolyn Meinel: The happy hacker. A guide to (mostly) harmless computer hacking. American Eagle 1998. 12426 Carolyn Meinel: Tatort Internet. Spektrum 1999/3, 82-89. B. Miller: Vital signs of identity. IEEE Spectrum February 1994, 22-30. Peter Neumann: Computer related risks. 1997, 360p. $25. 13733 Peter Neumann: Risks in retrospect. Comm. ACM 43/7 (2000), 144. Peter Norton/Arthur Griffith: Peter Norton's complete guide to Linux. Sams 1999. 0-67231573-4. $30. Scott Oaks: Java security. O'Reilly 1998, 470p. 1-56592-403-7. $33. Rolf Oppliger: Computersicherheit. Vieweg 1992, 153p. 3-528-05296-1. DM 40. C. Pfleeger: Security in computing. Prentice Hall 1989. 12429 Christoph Po''ppe: Kennt ein Computer Gut und Bo''se? Spektrum 1999/3, 100. 13945 Klaus Pommerening: Datenschutz und Datensicherheit. Bibl. Inst. 1991, 260p. 3-411-15171-4. DM 30. Available on Internet. 7591 Rolf Rees/Douglas Stinson: Combinatorial characterizations of authentication codes II. Internet 1995, 26p. 7607 Ronald Rivest: Multi-grade cryptography. Internet 1995, 8p. A. Ros''nagel: Institutionell-organisatorische Gestaltung informationstechnischer Sicherungsinfrastrukturen. Datenschutz u. Datensich. 1995/5, 259-269. Christoph Ruland: Informationssicherheit in Datennetzen. Datacom 1993, 325p. 3-89238-081-3. DM 88. Deborah Russell/G. Gangemi: Computer security basics. O'Reilly 1991, 460p. 0-937175-71-4. DM 59. 12860 Salvatore Sanfilippo: Installazione di un firewall. Linux & C Novembre 1999, 25-29. 12888 Salvatore Sanfilippo: Installazione di un firewall. Linux & C Gennaio 2000, 34-37. 12935 Salvatore Sanfilippo: Installazione di un firewall. Linux & C Febbraio 2000, 36-39. 13843 Salvatore Sanfilippo: Programmazione sicura. Linux & C Novembre 2000, 46-49. Ingrid Schaumueller-Bichl: Sicherheitsmanagement. Bibl. Inst. 1992, 350p. 3-411-15501-9. DM 49. 6439 Jeffrey Schiller: Sicherheit im Daten-Nahverkehr. Spektrum 1995/1, 50-57. Datensicherheit in Computernetzen ist ein hartnaeckiges Problem. Das System Athena, welches die Recher des MIT gegen unbefugten Zugriff absichert, hat jedoch bisher jeder Attacke standgehalten. Bruce Schneier: E-mail security. Wiley 1994. 11299 Bruce Schneier: Why cryptography is harder than it looks. Inf. Security Bull. 2/2 (1997), 31-36. 13524 Bruce Schneier: Risks of relying on cryptography. Comm. ACM 42/10 (1999), 144. Bruce Schneier: Secrets and lies. Wiley 200, 430p. $30. Hartmut Schulz: Computerkriminalitaet. dtv 1992. 13626 M. Schumacher/M. Moschgath/U. Roedig: Angewandte Informations- sicherheit. Ein Hackerpraktikum an Universita''ten. Informatik-Spektrum Juni 2000, 202-211. Hans Seelos: Informationssysteme und Datenschutz im Krankenhaus. Vieweg 1991, 170p. 3-528-05185-X. DM 98. 7572 John Snare: Security in telecommunication services over the next decade. In 7226 Loxton, 98-105. 11235 Peter Sonntag: Netzwerksicherheit. Internet ca. 1997, 12p. 11238 Peter Sonntag: Viren in Programmen und Datennetzen. Internet ca. 1997, 6p. 20579 Michael Soukup: Das Ende des Datenschutzes. Spiegel Online 16. September 2008, 2p. 7657 Eugene Spafford: Crisis and aftermath. Comm. ACM 32/6 (1989), 678-687. How the Internet worm operated. 9623 William Stallings: Sicherheit im Datennetz. Prentice Hall 1995, 522p. 3-930436-29-9. DM 59. Angelika Steinacker: Anonyme Kommunikation in Netzen. Bibl. Inst. 1992, 220p. 3-411-15531-0. DM 44. 6514 Steffen Stempel/Hans-Joachim Knobloch: Netzwerksicherheit durch Authentikationsverfahren. Spektrum 1994/5, 70-71. 9808 Douglas Stewart/P. Tobin Maginnis/Thomas Simpson: Who is at the door - the SYN denial of service. Linux Journal June 1997, 12-16. Reinhard Vossbein (ed.): Organisation sicherer Informationsverarbeitungs- systeme. Oldenbourg 1995, 330p. 3-486-22973-7. DM 98. 6513 Paul Wallich: Piraten im Datennetz. Spektrum 1994/5, 64-71. Internet ist verwundbar. 21045 Wallace Wang: Il manuale del giovane hacker. Tecniche Nuove 2006, 400p. Eur 20. B. Winkler/B. Dealy: Information security technology? Don't rely on it - a case study in social engineering. Proc. 9th Usenix Security Symp. 1995, 1-5. 6739 Ingolf Wittmann: Lizenzierung von Unix-Software - iFOR/LS, eine Moeglichkeit. Unix/Mail 12 (1994), 518-521. Softwarepiraterie und der illegale Einsatz von Programmen sind heute eines der groessten Probleme von Programmierern und Softwarehaeusern. Dies kann bis zum Konkurs eines Unternehmens fuehren. 13624 Gritta Wolf/Andreas Pfitzmann: Charakteristika von Schutzzielen und Konsequenzen fu''r Benutzungsschnittstellen. Informatik-Spektrum Juni 2000, 173-91. 11251 ZZ: On cryptography and privacy. Netsurfer Focus 21 August ?, 14p. 11744 ZZ: [Network security.] Internet 1992, 14p. 11747 ZZ: TCP-Wrapper. Internet 1993, 2p. 11745 ZZ: [Network security.] Internet 1994, 25p. 11743 ZZ: [Network security.] Internet 1995, 10p. 11362 ZZ: [On proactive security.] RSA Cryptobytes 3/1 (1997), 2. ZZ: Maximum security. A hacker's guide to protecting your Internet site and network. Sam 1997.