Security Books

  • Bidgoli, Hossein; et al. (2008). The Handbook of Computer Networks. Wiley. ISBN 978-0-471-78460-9. Volume 3, “E-Mail Threats and Vulnerabilities.”
  • Baccas, Paul; et al. (2008). OS X Exploits and Defense. Syngress. ISBN 978-1-59749-254-6. Chapter 3: “Malicious Macs: Malware and the Mac.” Chapter 4: “Malware Detection and the Mac.”
  • Harley, David; et al. (2007). AVIEN Malware Defense Guide for the Enterprise. Syngress. ISBN 978-1-59749-164-8. (Editor, technical editor, author of several chapters.)
  • Schiller, Craig A.,, Binkley, Jim; et al. (2007). Botnets: the Killer Web App. Syngress. ISBN 1-59749-135-7. Co-wrote Chapter 5, “Botnet Detection: Tools and Techniques” with Jim Binkley.
  • Bidgoli, Hossein; et al. (2006). Handbook of Information Security. Wiley. ISBN 0-471-64833-7. Volume 3, “E-Mail Threats and Vulnerabilities.”
  • Paulus, S., Pohlmann N., Reimer, H.; et al. (2004). ISSE 2004: Securing Electronic Business Processes. Vieweg. ISBN 978-3-528-05910-1. Massmailers: New Threats Need Novel Anti-Virus Measures.
  • Bosworth, Seymour, Kabay M.E.; et al. (2002). Computer Security Handbook. John Wiley. ISBN 0-471-41258-9. Co-wrote Chapter 49, “Medical Records Security” with Paul Brusil.
  • Anonymous; et al. (2002). Maximum Security Fourth Edition. SAMS. ISBN 0-672-32459-8. Revised Chapter 17 “Viruses and Worms”, Chapter 18 “Trojans.”
  • Anonymous; et al. (2001). Maximum Security Third Edition. SAMS. ISBN 0-672-31871-7. Chapter 17 “Viruses and Worms”, Chapter 18 “Trojans.”
  • Harley, David, Robert Slade and Urs E. Gattiker (2001). Viruses Revealed. McGraw-Hill Companies. ISBN 0-07-213090-3. Co-Author.
Advertisement