William F. Slater, III, PMP, CISA, CISSP, MCSE, MCITP
Program Manager
IT Consultant in Data Center Management and
Change Management
M.S. in Computer Information Systems
1337 N. Ashland Ave., #2
Chicago, IL  60622
United States of America

Home:    773-235-3080
Cellular:  312-758-0307


Home  |  Persistence  |  The last class I took  | Impressions of my Classes and Teachers and Teams
My UoP MS CIS Schedule  |  My current grades  |  Examples of Course Work  | The Program Description: My UoP MS CIS Class
 Handbook
  | 
MyCampus.phoenix.edu  |  Bio  | Teamwork  |  Gallery   |  My Higher Education Timeline  
My thoughts on working in an online education program  |  Why work on a Master's Degree in a Graduate program? 
The UoP contact if you decide online education if for you  |  Certifications - Present & Planned 
Graduating and Getting your Graduate Degree at UoP - How Does It Feel? billslater.com

Institute of Data Center Professionals - Data Center Technology Certificate Program
*** Stolen Material Notice ***


 

Supplemental Recommended Reading List

For 

CSS 558 & CSS 559 - Database Concepts I & II

 

Last Updated on May 17, 2004

 

Abbey, M., Corey, M. and Abramson, I. (1999). Oracle 8i: A Beginnerís Guide. Berkeley, CA: Osborne McGraw-Hill.

Atre, A. (1980). Data Base: Structured Techniques for Design, Performance, and Management. New York: John Wiley.

Atzeni, P. and De Antonellis, V. (1993). Relational Database Theory. Redwood City, CA: Benjamin Cummings.

Auerbach Publishers. (1981). Practical Data Base Management. Reston, VA: Prentice-Hall.

Balter, A. (1997). Allison Balterís Mastering Access 97 Development, second edition.  Indianapolis, IN: SAMS Publishing.

Celko, J. (1995). Instant SQL Programming. Birmingham, U.K.: Wrox Press.

Chappell, D. (2002). Understanding .NET: A Tutorial and Analysis. Boston: Addison-Wesley.

Chaturvedi, D. and Pathak, P. (1999). Administering SQL Server 7: Complete Administration Reference. Berkely, CA: McGraw-Hill.

Chorafas, D. (1989). Handbook of Database Management and Distributed Relational Databases.  Blue Ridge Summit, PA: Tab Books.

Chou, G. T. (1990). Using SQL. Carmel, IN: Que Corporation.

Corrigan, P. H. (1994). LAN Disaster Prevention and Recovery. Englewood Cliffs, NJ: Prentice Hall.

Date, C. J. and Darwen, H. (1998). Foundation for Object/Relational Databases: The Third Manifesto. Reading, MA: Addison-Wesley.

Date, C. J. (2001). An Introduction to Database Systems, seventh edition. Reading, MA: Addison-Wesley.

Date, C. J. (2001). The Database Relational Model: A Retrospective Review and Analysis. Reading, MA: Addison-Wesley.

Dillon, S., et al. (2002). Beginning Oracle Programming. Birmingham, U.K.: Wrox Press.

England, K. (1997). The SQL Server 6.5 Performance Optimization and Tuning Handbook. Boston: Digital Press.

Fleming, C. C. and von Halle, B. (1989). Handbook of Relational Database Design. Reading, MA: Addison-Wesley.

Forte, S., Howe, T., and Ralston, J. (1999). Microsoft Access 2000 Development. Indianapolis, IN: SAMS Publishing.

Fowler, M. and Scott, K. (1997). UML Distilled: Applying the Standard Object Modeling Language. Reading, MA: Addison-Wesley.

Frank, L. (1989). Database Theory and Practice. Wokingham, England: Addison-Wesley.

Greenwald, R., et al. (2001). Oracle Essentials: Oracle 9i, Oracle 8i, Oracle 8. Beijing, China: OíReilly & Associates.

Glass, R. L. (1999). Computing Calamities: Lessons learned from products, projects, and companies that failed. Upper Saddle River, NJ: Prentice Hall.

Groff, J. R. and Weinberg, P. N. (1990). Using SQL. Berkely, CA: Osborne McGraw-Hill.

Gruber, M. (2000). Mastering SQL. San Francisco: Sybex.

Hackatorn, R. H. (1993).  Enterprise Database Connectivity: The Key to Enterprise Applications on the Desktop. New York: John Wiley & Sons.

Hares, J. S. (1992). Information Engineering for the Advanced Practicioner. Chichester, U.K.: John Wiley & Sons.

Hernandez, M. (2003). Database Design for Mere Mortals, second edition. Boston: Addison-Wesley.

Hobbs, L. and England, K. (1991). Rdb/VMS: A Comprehensive Guide. Bedford, MA Digital Press.

Hogan, R. (1990). A Practical Guide to Data Base Design. Englewood Cliffs, NJ: Prentice-Hall.

Hogue, F. (2000). e-Enterprise: Business Models, Architectures and Components. Cambridge, U.K.: Cambridge University Press.

Hubbard, G. U. (1981). Computer Assisted Database Design. New York: Van Nostrand Reinhold Company.

Humphries, M., et al. (1998). Data Warehousing: Architecture and Implementation. Upper Saddle River, NJ: Prentice Hall.

Hunt, J. (2001). Java and Object Orientation: An Introduction. London: Springer.

Inmon, W H. and Kelly, C. (1993). Rdb/VMS: Developing the Data Warehouse. Boston: QED Publishing Group.

Inmon, W H. and Hackathorn, R D. (1993). Using the Data Warehouse. New York: John Wiley & Sons.

Inmon, W H. (1981) Effective Data Base Design. Englewood Cliffs, NJ: Prentice-Hall.

Jagannathan, S., Srinivasan, J., and Kalman, J. (2002). Internet Commerce Metrics and Models in the New Era of Accountability.  Upper Saddle River, NJ: Prentice Hall.

Jennings, R. (1999). Special Edition Using Access 2000. Indianapolis, IN: Que.

Khoshafian, S. (1993). Object-Oriented Databases. New York: John Wiley & Sons.

Koshafian, S., et al. (1992). A Guide to Developing Client/Server SQL Applications. San Mateo, CA: Morgan Kaufmann.

Khoshafian, S., et al. (1992). Intelligent Offices: Object-Oriented Multi-Media Information Management in Client/Server Architectures. New York: John Wiley & Sons.

Klander, L. M. (2000). Access 2000 Client/Server Solutions. Scottsdale, AZ: Coriolis Group.

Kroha, P. (1993). Objects and Databases. London: McGraw-Hill.

Lincthicum, D. (2000). Enterprise Application Integration.  Boston: Addison-Wesley.

Lincthicum, D. (1997). David Linthicumís Guide to Client/Server and Intranet Development.  New York: John Wiley.

Loney, K. and Koch, G. (2000). Oracle 8i: The Complete Reference. Berkeley, CA: Osborne McGraw-Hill.

Lowe, D. (1995). Client/Server Computing for Dummies. Foster City, CA: IDG Books Worldwide.

Martin, J. (1977). Computer Data-Base Organization. Englewood Cliffs, NJ: Prentice-Hall.

McFadden, F. R. and Hoffer, J. A. (1991). Database Management, third edition. Redwood City, CA: Benjamin Cummings.

McCullough-Dieter, C. (1999). Oracle 8i for Dummies. Foster City, CA: IDG Books.

Microsoft Corporation. (2003).  Installing, Configuring, and Administering Microsoft SQL Server 2000 Enterprise Edition: Exam 70-228.  Redmond, WA: Microsoft Press.

Microsoft Corporation. (2003).  Microsoft SQL Server 2000 Database Design and Implementation: Exam 70-229.  Redmond, WA: Microsoft Press.

Mohr, S. (1999). Designing Distributed Applications: with XML, ASP, IE5, LDAP, and MSMQ. Birmingham, U.K.: Wrox Press.

Moniz, J. (1999). Enterprise Application Architecture: with VB, ASP, and MTS. Birmingham, U.K.: Wrox Press.

OíDonahue, J. (2002). Java Database Programming. Indianapolis, IN: Wiley Publishing.

Orfali, R., Harkey, D. and Edwards, J. (1994).  Essential Client/Server Survival Guide. New York: Van Nostrand Reinhold.

Pascal, F. (2000). Practical Issues in Database Management: A Reference for the Thinking Practitioner.  Boston: Addsion-Wesley.

Pascal, F.  (1993). Understanding Relational Databases with Examples in SQL-92.  New York: John Wiley & Sons.

Papa, J., et al (1999).  Professional ADO RDS Programming with ASP.  Birmingham, U.K.: Wrox Press, Ltd.

Pender, T. (2003). The UML Bible. Indianapolis, IN: Wiley Publishing.

Perkinson, R. C. (1984). Data Analysis: The Key to Data Base Design. Wellesley, MA: QED Information Sciences.

Reed, P.R. (2002). Developing Applications with Java and UML. Boston: Addsion-Wesley.

Reingruber, M.C. and Gregory, W. W. (1994). The Data Modeling Handbook: A Best Practice Approach to Building Quality Data Models. New York: John Wiley & Sons.

Rob, P. and Coronel, C. (2002). Database Systems: Design, Implementation, and Management, Fifth Edition. Boston: Course Technology.

Ross, R G. (1978). Data Base Systems: Design, Implementation and Management. New York: AMACOM.

Rozenshtein, D., Abrahamovich, A. and Birger, E. (1995). Optimizing Transact-SQL. Fremont, CA: SQL Forum Press.

Rumbaugh, J. et al. (1991). Object-Oriented Modeling and Design. Englewood Cliffs, NJ: Prentice-Hall.

Sanders, G. L. (1995). Data Modeling. Danvers, MA: Boyd & Fraser Publishing.

Saunders, K. M. (1992).  The Relational Database Advisor: Elements of PC Database Design. Blueridge Summit, PA:Windcrest/McGraw-Hill.

Schur, S. G. (1994). The Database Factory: Active Database for Enterprise Computing. New York: John Wiley & Sons.

Sessions, R. (2003). Software Fortresses: Modeling Enterprise Architectures. Boston: Addison-Wesley.

Shapiro, J. R. (2001). SQL Server 2000: The Complete Reference. Berkely, CA: Osborne McGraw-Hill:

Shasha, D. E. (1992). Database Tuning: A Principled Approach. Englewood Cliffs, NJ: Prentice-Hall.

Shlaer, S. and Mellor, S.  (1988).  Object-Oriented Systems Analysis: Modeling the World in Data. Englewood Cliffs, NJ: Prentice-Hall.

Teorey, T. (1982). Design of Database Structures. Englewood Cliffs, NJ: Prentice-Hall.

Teorey, T. (1999). Database Modeling and Design, third edition. San Francisco: Morgan Kaufmann.

Tillman, G. (1993). A Practical Guide to Logical Data Modeling. New York: McGraw-Hill.

Toigo, J. W. (1989). Disaster Recovery Planning: Managing Risk & Catastrophe in Information Systems. Englewood Cliffs, NJ: Prentice Hall.

Todman, C. (2001). Designing a Data Warehouse: Supporting Customer Relationship Management. Upper Saddle River, NJ: Prentice Hall.

Vaskevitch, D. (1993). Client/Server Strategies: A Survival Guide for Corporate Engineers. San Mateo, CA: IDG Books Worldwide.

Wampler, B. E. (2002). The Essence of Object-Oriented Programming with Java and UML.  Boston: Addsion-Wesley.

Whalen, E., et al. (2001). Microsoft SQl Server 2000 Performance Tuning Technical Reference. Redmond, WA: Microsoft Press.

Willis, T. (2000).  Beginning Visual Basic SQL Server 7.0.  Birmingham, U.K.: Wrox Press.

Zikopoulos, P. C., et al. (2003). DB2 Version 8: The Official Guide. Upper Saddle River, NJ: Prentice Hall.


CSS 558 / CSS 559

Database Concepts I & II

Supplemental Resource List

Topics on Security, Privacy and Law

 

Alexander, M. (1996). The Underground Guide to Computer Security. Reading, MA: Addison-Wesley Publishing Company.

Allen, J. H. (2001). The CERT Guide to System and Network Security Practices.  Boston, MA: Addison-Wesley.

Anonymous. (1997). Maximum Security: A Hackerís Guide to Protecting Your Internet Site and Network. Indianapolis, IN: SAMS.

Atkins, D. et al. (1996). Internet Security Professional Reference. Indianapolis, IN: New Riders.

Banks, M. A. (1997). Web Psychos, Stalkers, and Pranksters: How to Protect Yourself in Cyberspace. Scottsdale, AZ: Coriolis Group Books.

Bernstein, T. (1996). Internet Security for Business. New York: John Wiley & Sons.

Bott, E. and Siechert, C. (2003). Microsoft Windows Security for Windows XP and Windows 2000 Inside Out. Redmond, WA: Microsoft Press.

Bragg, R. (2001). Windows 2000 Security. Indianapolis, IN: New Riders Publishing.

Bragg, R. (2003). Implementing and Administrating Security in a Windows 2000 Network. Indianapolis, IN: Que Corporation.

Bragg, R. (2004). MCSE Self-Paced Training Kit (Exam 70-298): Designing Security for a Microsoft Windows Server 2003 Network:. Redmond, WA: Microsoft Press.

Brenton, C. and Hunt, C. (2003). Mastering Network Security. Alameda, CA: SYBEX, Inc.

Brin, D. (1998). The Transparent Society. Reading, MA: Addison-Wesley.

Burger, R. (1988). Computer Viruses: A High-Tech Disease. Grand Rapids, MI: Abacus.

Casey, E. (2000). Digital Evidence and Forensic Science, Computers and the Internet. San Diego, CA: Academic Press.

Casey, E. [Ed.]. (2002). Handbook of Computer Crime Investigation: Forensic Tools and Technology. San Diego: Academic Press.

Cavazos, E. and Morin, G. (1994). Cyber-Space and the Law: Your Rights and Duties in the On-Line World. Cambridge, MA: MIT Press.

Chapman, D. B. and Zwicky, E. D.  (1995). Building Internet Firewalls. Sebastopol, CA: OíReilly & Associates.

Cheswick, W. R. and Bellovin, S. M. (1994). Firewalls and Internet Security: Repelling the Wily Hacker.  Reading, MA: Addison-Wesley Publishing Company.

Cohen, F. B. (1994). A Short Course on Computer Viruses, second edition. New York: John Wiley & Sons, Inc.

Cole, E. (2002). Hackers Beware: Defending Your Network From the Wily Hacker.  Indianapolis, IN: New Riders Publishing.

Cooper, F., et al. (1995). Implementing Internet Security. Indianapolis, IN: New Riders.

Cox, P. and Sheldon, T.  (2001).  Windows 2000 Security Handbook. Berkely, CA: Osborne McGraw-Hill.

Crume, J. (2000). Inside Internet Security: What Hackers Donít Want You to Know. Harlow, England: Addison-Wesley.

Davis, P. T. (1994). Complete LAN Security and Control. New York: Windcrest/McGraw-Hill.

Denning, P. J. [Ed.]. (1990). Computers Under Attack: Intruders, Worms and Viruses. Reading, MA: Addison-Wesley Publishing Company.

Dunham, K. (2000).  Bigelowís Virus Troubleshooting Pocket Reference. New York: McGraw-Hill.

Dyson, E. (1997). Release 2.0: A Design for Living in the Digital Age. New York: Broadway Books.

Ellis, J. and Speed, T. (2001). The Internet Security Guidebook. San Diego, CA: Academic Press.

Escamilla, T. (1998).  Intrusion Detection: Network Security Beyond the Firewall.  New York: John Wiley.

Fadia, A. (2003). Network Security: A Hackerís Perspective. Cincinnati, OH: Premier Press.

Frackman, A., Martin, R., and Ray, C. (2002). Internet and Online Privacy: A Legal and Business Guide. New York: ALM Publishing.

Galbreath, N. (2002).  Crytography for Internet and Database Applications. Indianapolis, IN: Wiley Publishing.

Garfinkel, S. (1995). PGP: Pretty Good Privacy. Sebastopol, CA: OíReilly & Associates, Inc.

Gaskin, J. (1997). Corporate Politics and the Internet: Connection Without Controversy. Upper Saddle River, NJ: Prentice Hall.

Goncalves, M. (1998). Firewalls Complete. New York: McGraw-Hill.

Goncalves, M. et al. (1997). Internet Privacy Kit. Indianapolis, IN: Que.

Govanus, G. and King, R. (2000). MCSE Windows 2000 Network Security Design Study Guide. Alameda, CA: SYBEX, Inc.

Hafner, K. and Markoff, J. (1991). Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York: Simon and Schuster.

Hall, Eric A. (2000). Internet Core Protocols:  The Definitive Guide. Sebastopol, CA:  OíReilly & Associates.

Hansche, S., Berti, J. and Hare, C. (2004). Official (ISC)2  Guide to the CISSP Exam. Boca Raton, FL: Auerbach Publications.

Harris, S. (2002).  Mike Meyersí CISSP Certification Passport. Berkely, CA: Osborne McGraw-Hill.

Haynes, C. (1990). The Computer Virus Protection Book. Alameda, CA: SYBEX, Inc.

Hills, M. (1997). Intranet Business Strategies. New York: John Wiley & Sons, Inc.

Hoffman, L. J. [Ed.] (1990). Rogue Programs: Viruses, Worms, and Trojan Horses. New York: Van Nostrand Reinhold.

Hoffman, L. J. (1977). Modern Methods for Computer Security and Privacy. Englewood Cliffs, NJ: Prentice-Hall.

Honeypot Project, (2002).  Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community. Boston, MA: Addison-Wesley.

Horton, M, and Mugge, C. (2003). Hack Notes Network Security Portable Reference. Berkeley, CA: Osborne McGraw-Hill.

Hughes, L. J. (1995).  Actually Useful Internet Security Techniques. Indianapolis, IN: New Riders Publishing.

Icove, D., et al. (1995). Computer Crime: A Crimefighterís Handbook. Sebastopol, CA: OíReilly & Associates.

Internet Security Systems, Inc. (2000). Microsoft Windows 2000 Security Technical Reference. Redmond, WA: Microsoft Press.

Jaworski, J. and Perrone, P. (2000). Java Security Handbook. Indianapolis, IN: SAMS.

Kaspersky, K. (2003). Hacker Disassembling Uncovered. Wayne, PA: A-List, LLC.

Kelly, K. (1994). Out of Control. Reading, MA: Addison-Wesley.

Knightmare. (1994). Secrets of a Super Hacker. Port Townsend, WA: Loompanics Unlimited.

Krauss, L. I. And McGahan, A. (1979).  Computer Fraud and Countermeasures.  Englewood Cliffs, NJ: Prentice-Hall.

Kruse, W. G. and Heiser, J. G. (2002). Computer Forensics: Incident Response Essentials. Boston, MA: Addison-Wesley Publishing Company.

LaMacchia, B. A. and Sebastian, L. (2002). .NET Framework Security. Indianapolis, IN: Addison-Wesley Publishing Company.

Landreth, B. (1985). Out of the Inner Cirle: A Hackerís Guide to Computer Security. Bellvue, WA: Microsoft Press.

Lane, C. A. (1997). Naked in Cyberspace. Wilton, CT: Pemberton, Press.

Larson, E. and Stephens, B. (2000). Administrating Web Servers, Security, & Maintenance. Upper Saddle River, NJ: Prentice Hall.

Levy, S. (1984). Hackers: Heroes of the Computer Revolution. Garden City, NY: Anchor Press/Doubleday.

Ludwig, M.A. (1990). The Little Black Book of Computer Viruses: Volume One The Basic Tehcnology.  Tucson, AZ: American Eagle Publishing, Inc.

Ludwig, M.A. (1993). Computer Viruses, Artificial Life and Evolution: The Little Black Book of Computer Viruses Volume II.  Tucson, AZ: American Eagle Publishing, Inc.

Lundell, A. (1989). Virus! The Secret World of Computer Invaders that Breed and Destroy. Chicago, IL: Contemporary Books.

Mandia, K. and Prosise, C. (2001). Incident Response: Investigating Computer Crime. Berkely, CA: Osborne McGraw-Hill.

Mao, Wenbo. (2004). Modern Cryptography: Theory and Practice. Upper Saddle River, NJ: Prentice Hall.

Marcella, A. J. and Greenfield, R. S. [Editors]. (2002). Cyber Forensics: A Field Manual for Collecting, Examining, and Preseving Evidence of Computer Crimes. Boca Raton, FL: Auerbach Publications.

McAfee, J. and Haynes, C. (1989). Computer Viruses, Worms, Data Diddlers, Killer Programs and Other Threats to Your System: What They Are, How They Work, and How To Defend Your PC, MAC, or Mainframe. New York: St. Martinís Press.

McClure, S., Scanbray, J. and Kurtz, G. (2003). Hacking Exposed: Network Security Secrets and Solutions, fourth edition. Berkeley, CA: Osborne McGraw-Hill.

McClure, S., Scanbray, J. and Kurtz, G. (2001). Hacking Exposed: Network Security Secrets and Solutions, third edition. Berkeley, CA: Osborne McGraw-Hill.

McClure, S., Scanbray, J. and Kurtz, G. (2001). Hacking Exposed: Network Security Secrets and Solutions, second edition. Berkeley, CA: Osborne McGraw-Hill.

McLean, I. (2000). Windows 2000 Security Little Black Book. Scottsdale, AZ:Coriolis Group.

McNamara, J. (2003). Secrets of Computer Espionage. Indianapolis, IN: Wiley Publishing, Inc.

Meinel, C. P. (1999). The Happy Hacker, third edition. Show Low, AZ: American Eagle Publishing, Inc.

Mitnick, K., and Simon, W. (2002). The Art of Deception: Controlling the Human Element of Security. Indianapolis, IN: Wiley Publishing.

Nichols, R. K., Ryan, D., and Ryan, J. C. H. (2000). Defending Your Digital Assets Against Hackers, Crackers, Spies & Thieves. New York: McGraw-Hill.

Norberg, S. (2001). Securing Windows 2000 Servers for the Internet. Beijing, China: OíReilly & Associates.

Northcutt, S., et al. (2001).  Intrusion Signature and Analysis. Indianapolis, IN: New Riders Publishing.

Northcutt, S., et al. (2003). Inside Network Perimeter Security.  Indianapolis, IN: New Riders.

Northrup, T. and Thomas, O. (2004). MCSA/MCSE Self-Paced Training Kit (Exam 70-299): Implementing and Administering Security in a Microsoft Windows Server 2003 Network. Redmond, WA: Microsoft Press.

OíReilly & Associates [Ed.]. (1997). The Harvard Conference on the Internet and Society.  Cambridge, MA: Harvard University Press.

Peikari, C. and Chuvakin, A. (2004). Security Warrior. Sebastopol, CA: OíReilly & Associates, Inc.

Peltier, T. and Howard, P. D. (2002). The Total CISSP Exam Prep Book: Practice Questions, Answers and Exam Taking Tips and Techiques.

Pfleeger, C. P. and Pfleeger, S. L. (2003). Security in Computing, Third Edition.  Upper Saddle River, NJ: Prentice Hall.

Pistoia, M., et al. (1999). Java 2 Network Security, second edition. Upper Saddle River, NJ: Prentice Hall.

Power, R, (2000). Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace. Indianapolis, IN: Que Corporation.

Ranum, M. J. (2004). The Myth of Homeland Security. Indianapolis, IN: Wiley Publishing, Inc.

Roberts, R. (1988). Computer Viruses. Greensboro, NC: Computer! Books.

Rose, L. (1995).  NetLaw: Your Rights in the Online World. Berkely, CA: Osborne McGraw-Hill.

Rose, L. and Wallace, J. (1992).  SysLaw, second edition.  Winona, MN: PC Information Group.

Russell, R., et al. (2003). Stealing the Network: How to Own the Box. Rockland, MA: Syngress Publishing.

Scanbray, J. and McClure, S. (2001). Hacking Windows 2000 Exposed. Berkeley, CA: Osborne McGraw-Hill.

Schiffman, M. (2001). Hackerís Challenge: Test Your Incident Response Skills Using 20 Useful Scenarios.  New York: Osborne McGraw-Hill.

Schiffman, M., et al. (2003). Hackerís Challenge 2: Test Your Network Security and Forensic Skills.  New York: Osborne McGraw-Hill.

Schneier, B. (2000). Secrets and Lies: Digital Security in a Networked World. New York: John Wiley & Sons.

Schneir, B. (1996). Applied Cryptography: Protocols, Algorithms, and Source Code in C, second edition. New York: John Wiley & Sons.

Schneir, B. (2003). Beyond Fear: Thinking Sensibly About Security In An Uncertain World. New York: Copernicus Books.

Schwartau, W. (2000). Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption. New York: Thunderís Mouth Press.

Sheldon, T. (1997). Windows NT Security Handbook. Berkely, CA: Osborne McGraw-Hill.

Sherman, C. and Price, G. (2001).  The Invisible Web: Uncovering Information Sources Serach Engines Canít See . Medford, NJ: Information Today, Inc.

Siyan, K. and Hare, C. (1995). Internet Firewalls and Network Security.  Indianapolis, IN: New Riders Publishing.

Skoudis, E. (2002). Counter Hack: A Step-By-Step Guide to Computer Attacks and Effective Defenses. Upper Saddle River, NJ: Prentice Hall.

Slade, R. (1996). Robert Sladeís Guide to Computer Viruses: How to Avoid Them, How to Get Rid of Them, and How to Get Help. New York: Springer-Verlag.

Slater, W. F., III. (1979). Unauthorized Access: A Computer Security Problem. An unpublished research paper submitted to Professor John D. Goebel, J.D., as part of the fulfillment of the requirements of Business Law, ACCTG 973c, in an MA in Business Management program, Fall Semester 1979 at then University of Nebraska at Lincoln, Lincoln, NE.

Smith, B. et al. (2003). Microsoft Security Resource Kit. Redmond, WA: Microsoft Press.

Smith, R. E. (1997).  Internet Cryptography. Reading, MA: Addison-Wesley.

Solomon, A. and Kay, T. (1994). Dr. Solomonís PC Anti-Virus Book. Oxford, England: New-Tech.

Sonnenreich, W. and Yates, T. (2000). Building Linux and OpenBSD Firewalls. New York: John Wiley & Sons.

Spitzner, L. (2003). Honeypots: Tracking Hackers. Boston, MA: Addison-Wesley Publishing Company.

Stallings, W. (2000). Network Security Essentials: Applications and Standards. Upper Saddle River, NJ: Prentice Hall.

Stang, D. J. and Moon, S. (1994). Network Security Secrets. San Mateo, CA: IDG Books Worldwide, Inc.

Stein, L. D. (1998).  Web Security: A Step-by-Step Reference Guide. Reading, MA: Addison-Wesley Publishing Company.

Sterling, B. (1992). The Hacker Crackdown. New York: Bantum Books.

Strebe, M. and Perkins, C. (2002). Firewalls 24Seven, second edition. San Francisco: Sybex.

Syngress. [Ed.] (2000). E-Mail Virus Protection Handbook. Rockland, MA: Syngress.

Taylor, E. (2000). Networking Handbook. New York: McGraw-Hill.

Tipton, H. F. and Krause, M. [Editors]. (2004). Information Security Management Handbook, fifth edition. Boca Raton, FL: Auerbach Publications, Inc.

Tittel, E., Chapple, M., and Stewart, J. M. (2003). CISSP Certified Information System Security Professional Study Guide. Alameda, CA: SYBEX, Inc.

Vacca, J. (1996). Internet Security Secrets. Foster City, CA: IDG Books Worldwide.

Vacca, J. (2002). Computer Forensics: Computer Crime Scene Investigation. Hingham, MA: Charles River Media.

Van Wyk, K. R. and Forno, R. (2001). Incident Response. Sebastopol, CA: OíReilly & Associates.

Wang, W. (2003). Steal This Computer Book 3: What They Wonít Tell You About the Internet. San Francisco: No Starch Press.

Wolff, M. [Ed.]. (1996). Your Personal Netspy: How You Can Access the Facts and Cover Your Tracks. New York: Wolff New Media.

Young, S. and Aitel, D. (2004). The Hackerís Handbook: The Strategy Behind Breaking into and Defening Networks. Boca Raton, FL: Auerbach Publishing.

Zwicky, E. D., Chapman, D. B. and  Cooper, S. (1995). Building Internet Firewalls, second edition. Sebastopol, CA: OíReilly & Associates.

 


Home  |  Persistence  |  The last class I took  | Impressions of my Classes and Teachers and Teams
My UoP MS CIS Schedule  |  My current grades  |  Examples of Course Work  | The Program Description: My UoP MS CIS Class
 Handbook
  | 
MyCampus.phoenix.edu  |  Bio  | Teamwork  |  Gallery   |  My Higher Education Timeline  
My thoughts on working in an online education program  |  Why work on a Master's Degree in a Graduate program? 
The UoP contact if you decide online education if for you  |  Certifications - Present & Planned 
Graduating and Getting your Graduate Degree at UoP - How Does It Feel? billslater.com

Institute of Data Center Professionals - Data Center Technology Certificate Program
*** Stolen Material Notice ***

 

 


Last Updated on Sunday, September 16, 2007