William
F. Slater, III, PMP, CISA, CISSP, MCSE, MCITP Program Manager IT Consultant in Data Center Management and Change Management M.S. in Computer Information Systems 1337 N. Ashland Ave., #2 Chicago, IL 60622 United States of America Home: 773-235-3080 Cellular: 312-758-0307 |
Home
| Persistence
| The
last class I took
| Impressions of my Classes and Teachers and
Teams
My UoP MS CIS Schedule
| My
current grades | Examples of Course Work
| The Program Description: My UoP MS CIS
Class
Handbook | MyCampus.phoenix.edu
| Bio | Teamwork
| Gallery
| My Higher Education Timeline
My thoughts on working in an online
education program | Why work on a Master's Degree in
a Graduate program?
The
UoP contact if you decide online
education if for you |
Certifications - Present &
Planned
Graduating and Getting your Graduate Degree at UoP
- How Does It Feel? | billslater.com
Institute of Data Center
Professionals - Data Center Technology Certificate Program
*** Stolen Material Notice ***
For
Last
Updated on May 17, 2004
Abbey,
M., Corey, M. and Abramson, I. (1999). Oracle 8i: A Beginner’s Guide.
Berkeley, CA: Osborne McGraw-Hill.
Atre, A. (1980). Data Base: Structured Techniques for Design, Performance, and Management. New York: John Wiley.
Atzeni,
P. and De Antonellis, V. (1993). Relational Database Theory. Redwood City, CA:
Benjamin Cummings.
Auerbach
Publishers. (1981). Practical Data Base Management. Reston, VA: Prentice-Hall.
Balter,
A. (1997). Allison Balter’s Mastering Access 97 Development, second edition.
Indianapolis, IN: SAMS Publishing.
Celko,
J. (1995). Instant SQL Programming. Birmingham, U.K.: Wrox Press.
Chappell,
D. (2002). Understanding .NET: A Tutorial and Analysis. Boston: Addison-Wesley.
Chaturvedi,
D. and Pathak, P. (1999). Administering SQL Server 7: Complete Administration
Reference. Berkely, CA: McGraw-Hill.
Chorafas,
D. (1989). Handbook of Database Management and Distributed Relational Databases.
Blue Ridge Summit, PA: Tab Books.
Chou,
G. T. (1990). Using SQL. Carmel, IN: Que Corporation.
Corrigan,
P. H. (1994). LAN Disaster Prevention and Recovery. Englewood Cliffs, NJ:
Prentice Hall.
Date,
C. J. and Darwen, H. (1998). Foundation for Object/Relational Databases: The
Third Manifesto. Reading, MA: Addison-Wesley.
Date,
C. J. (2001). An Introduction to Database Systems, seventh edition. Reading, MA:
Addison-Wesley.
Date,
C. J. (2001). The Database Relational Model: A Retrospective Review and
Analysis. Reading, MA: Addison-Wesley.
Dillon,
S., et al. (2002). Beginning Oracle Programming. Birmingham, U.K.: Wrox Press.
England,
K. (1997). The SQL Server 6.5 Performance Optimization and Tuning Handbook.
Boston: Digital Press.
Fleming,
C. C. and von Halle, B. (1989). Handbook of Relational Database Design. Reading,
MA: Addison-Wesley.
Forte,
S., Howe, T., and Ralston, J. (1999). Microsoft Access 2000 Development.
Indianapolis, IN: SAMS Publishing.
Fowler,
M. and Scott, K. (1997). UML Distilled: Applying the Standard Object Modeling
Language. Reading, MA: Addison-Wesley.
Frank,
L. (1989). Database Theory and Practice. Wokingham, England: Addison-Wesley.
Greenwald,
R., et al. (2001). Oracle Essentials: Oracle 9i, Oracle 8i, Oracle 8. Beijing,
China: O’Reilly & Associates.
Glass,
R. L. (1999). Computing Calamities: Lessons learned from products, projects, and
companies that failed. Upper Saddle River, NJ: Prentice Hall.
Groff,
J. R. and Weinberg, P. N. (1990). Using SQL. Berkely, CA: Osborne McGraw-Hill.
Gruber,
M. (2000). Mastering SQL. San Francisco: Sybex.
Hackatorn,
R. H. (1993). Enterprise Database
Connectivity: The Key to Enterprise Applications on the Desktop. New York: John
Wiley & Sons.
Hares,
J. S. (1992). Information Engineering for the Advanced Practicioner. Chichester,
U.K.: John Wiley & Sons.
Hernandez,
M. (2003). Database Design for Mere Mortals, second edition. Boston:
Addison-Wesley.
Hobbs,
L. and England, K. (1991). Rdb/VMS: A Comprehensive Guide. Bedford, MA Digital
Press.
Hogan,
R. (1990). A Practical Guide to Data Base Design. Englewood Cliffs, NJ:
Prentice-Hall.
Hogue,
F. (2000). e-Enterprise: Business Models, Architectures and Components.
Cambridge, U.K.: Cambridge University Press.
Hubbard,
G. U. (1981). Computer Assisted Database Design. New York: Van Nostrand Reinhold
Company.
Humphries, M., et al. (1998). Data Warehousing: Architecture and Implementation. Upper Saddle River, NJ: Prentice Hall.
Hunt,
J. (2001). Java and Object Orientation: An Introduction. London: Springer.
Inmon,
W H. and Kelly, C. (1993). Rdb/VMS: Developing the Data Warehouse. Boston: QED
Publishing Group.
Inmon,
W H. and Hackathorn, R D. (1993). Using the Data Warehouse. New York: John Wiley
& Sons.
Inmon,
W H. (1981) Effective Data Base Design. Englewood Cliffs, NJ: Prentice-Hall.
Jagannathan,
S., Srinivasan, J., and Kalman, J. (2002). Internet Commerce Metrics and Models
in the New Era of Accountability. Upper
Saddle River, NJ: Prentice Hall.
Jennings,
R. (1999). Special Edition Using Access 2000. Indianapolis, IN: Que.
Khoshafian,
S. (1993). Object-Oriented Databases. New York: John Wiley & Sons.
Koshafian, S., et al. (1992). A Guide to Developing Client/Server SQL Applications. San Mateo, CA: Morgan Kaufmann.
Khoshafian,
S., et al. (1992). Intelligent Offices: Object-Oriented Multi-Media Information
Management in Client/Server Architectures. New York: John Wiley & Sons.
Klander,
L. M. (2000). Access 2000 Client/Server Solutions. Scottsdale, AZ: Coriolis
Group.
Kroha,
P. (1993). Objects and Databases. London: McGraw-Hill.
Lincthicum,
D. (2000). Enterprise Application Integration.
Boston: Addison-Wesley.
Lincthicum,
D. (1997). David Linthicum’s Guide to Client/Server and Intranet Development.
New York: John Wiley.
Loney,
K. and Koch, G. (2000). Oracle 8i: The Complete Reference. Berkeley, CA: Osborne
McGraw-Hill.
Lowe,
D. (1995). Client/Server Computing for Dummies. Foster City, CA: IDG Books
Worldwide.
Martin,
J. (1977). Computer Data-Base Organization. Englewood Cliffs, NJ: Prentice-Hall.
McFadden,
F. R. and Hoffer, J. A. (1991). Database Management, third edition. Redwood
City, CA: Benjamin Cummings.
McCullough-Dieter,
C. (1999). Oracle 8i for Dummies. Foster City, CA: IDG Books.
Microsoft
Corporation. (2003). Installing,
Configuring, and Administering Microsoft SQL Server 2000 Enterprise Edition:
Exam 70-228. Redmond, WA: Microsoft
Press.
Microsoft
Corporation. (2003). Microsoft SQL
Server 2000 Database Design and Implementation: Exam 70-229. Redmond, WA: Microsoft Press.
Mohr,
S. (1999). Designing Distributed Applications: with XML, ASP, IE5, LDAP, and
MSMQ. Birmingham, U.K.: Wrox Press.
Moniz,
J. (1999). Enterprise Application Architecture: with VB, ASP, and MTS.
Birmingham, U.K.: Wrox Press.
O’Donahue,
J. (2002). Java Database Programming. Indianapolis, IN: Wiley Publishing.
Orfali,
R., Harkey, D. and Edwards, J. (1994). Essential
Client/Server Survival Guide. New York: Van Nostrand Reinhold.
Pascal,
F. (2000). Practical Issues in Database Management: A Reference for the Thinking
Practitioner. Boston: Addsion-Wesley.
Pascal,
F. (1993). Understanding Relational
Databases with Examples in SQL-92. New
York: John Wiley & Sons.
Papa,
J., et al (1999). Professional ADO
RDS Programming with ASP. Birmingham,
U.K.: Wrox Press, Ltd.
Pender,
T. (2003). The UML Bible. Indianapolis, IN: Wiley Publishing.
Perkinson,
R. C. (1984). Data Analysis: The Key to Data Base Design. Wellesley, MA: QED
Information Sciences.
Reed,
P.R. (2002). Developing Applications with Java and UML. Boston: Addsion-Wesley.
Reingruber,
M.C. and Gregory, W. W. (1994). The Data Modeling Handbook: A Best Practice
Approach to Building Quality Data Models. New York: John Wiley & Sons.
Rob,
P. and Coronel, C. (2002). Database Systems: Design, Implementation, and
Management, Fifth Edition. Boston: Course Technology.
Ross,
R G. (1978). Data Base Systems: Design, Implementation and Management. New York:
AMACOM.
Rozenshtein,
D., Abrahamovich, A. and Birger, E. (1995). Optimizing Transact-SQL. Fremont,
CA: SQL Forum Press.
Rumbaugh,
J. et al. (1991). Object-Oriented Modeling and Design. Englewood Cliffs, NJ:
Prentice-Hall.
Sanders,
G. L. (1995). Data Modeling. Danvers, MA: Boyd & Fraser Publishing.
Saunders,
K. M. (1992). The Relational
Database Advisor: Elements of PC Database Design. Blueridge Summit, PA:Windcrest/McGraw-Hill.
Schur,
S. G. (1994). The Database Factory: Active Database for Enterprise Computing.
New York: John Wiley & Sons.
Sessions,
R. (2003). Software Fortresses: Modeling Enterprise Architectures. Boston:
Addison-Wesley.
Shapiro,
J. R. (2001). SQL Server 2000: The Complete Reference. Berkely, CA: Osborne
McGraw-Hill:
Shasha,
D. E. (1992). Database Tuning: A Principled Approach. Englewood Cliffs, NJ:
Prentice-Hall.
Shlaer,
S. and Mellor, S. (1988). Object-Oriented Systems Analysis: Modeling the World in Data.
Englewood Cliffs, NJ:
Prentice-Hall.
Teorey,
T. (1982). Design of Database Structures. Englewood Cliffs, NJ: Prentice-Hall.
Teorey,
T. (1999). Database Modeling and Design, third edition. San Francisco: Morgan
Kaufmann.
Tillman,
G. (1993). A Practical Guide to Logical Data Modeling. New York: McGraw-Hill.
Toigo,
J. W. (1989). Disaster Recovery Planning: Managing Risk & Catastrophe in
Information Systems. Englewood Cliffs, NJ: Prentice Hall.
Todman,
C. (2001). Designing a Data Warehouse: Supporting Customer Relationship
Management. Upper Saddle River, NJ: Prentice Hall.
Vaskevitch,
D. (1993). Client/Server Strategies: A Survival Guide for Corporate Engineers.
San Mateo, CA: IDG Books Worldwide.
Wampler,
B. E. (2002). The Essence of Object-Oriented Programming with Java and UML.
Boston: Addsion-Wesley.
Whalen,
E., et al. (2001). Microsoft SQl Server 2000 Performance Tuning Technical
Reference. Redmond, WA: Microsoft Press.
Willis,
T. (2000). Beginning Visual Basic
SQL Server 7.0. Birmingham, U.K.:
Wrox Press.
Zikopoulos,
P. C., et al. (2003). DB2 Version 8: The Official Guide. Upper Saddle River, NJ:
Prentice Hall.
CSS 558 / CSS 559
Alexander,
M. (1996). The Underground Guide to Computer Security. Reading, MA:
Addison-Wesley Publishing Company.
Allen,
J. H. (2001). The CERT Guide to System and Network Security Practices. Boston, MA: Addison-Wesley.
Anonymous.
(1997). Maximum Security: A Hacker’s Guide to Protecting Your Internet Site
and Network. Indianapolis, IN: SAMS.
Atkins,
D. et al. (1996). Internet Security Professional Reference. Indianapolis, IN:
New Riders.
Banks,
M. A. (1997). Web Psychos, Stalkers, and Pranksters: How to Protect Yourself in
Cyberspace. Scottsdale, AZ: Coriolis Group Books.
Bernstein,
T. (1996). Internet Security for Business. New York: John Wiley & Sons.
Bott,
E. and Siechert, C. (2003). Microsoft Windows Security for Windows XP and
Windows 2000 Inside Out. Redmond, WA: Microsoft Press.
Bragg,
R. (2001). Windows 2000 Security. Indianapolis, IN: New Riders Publishing.
Bragg,
R. (2003). Implementing and Administrating Security in a Windows 2000 Network.
Indianapolis, IN: Que Corporation.
Bragg,
R. (2004). MCSE Self-Paced Training Kit (Exam 70-298): Designing Security for a
Microsoft Windows Server 2003 Network:. Redmond, WA: Microsoft Press.
Brenton,
C. and Hunt, C. (2003). Mastering Network Security. Alameda, CA: SYBEX, Inc.
Brin,
D. (1998). The Transparent Society. Reading, MA: Addison-Wesley.
Burger,
R. (1988). Computer Viruses: A High-Tech Disease. Grand Rapids, MI: Abacus.
Casey,
E. (2000). Digital Evidence and Forensic Science, Computers and the Internet.
San Diego, CA: Academic Press.
Casey,
E. [Ed.]. (2002). Handbook of Computer Crime Investigation: Forensic Tools and
Technology. San Diego: Academic Press.
Cavazos,
E. and Morin, G. (1994). Cyber-Space and the Law: Your Rights and Duties in the
On-Line World. Cambridge, MA: MIT Press.
Chapman,
D. B. and Zwicky, E. D. (1995).
Building Internet Firewalls. Sebastopol, CA: O’Reilly & Associates.
Cheswick,
W. R. and Bellovin, S. M. (1994). Firewalls and Internet Security: Repelling the
Wily Hacker. Reading, MA:
Addison-Wesley Publishing Company.
Cohen,
F. B. (1994). A Short Course on Computer Viruses, second edition. New York: John
Wiley & Sons, Inc.
Cole,
E. (2002). Hackers Beware: Defending Your Network From the Wily Hacker. Indianapolis, IN: New Riders Publishing.
Cooper,
F., et al. (1995). Implementing Internet Security. Indianapolis, IN: New Riders.
Cox,
P. and Sheldon, T. (2001).
Windows 2000 Security Handbook. Berkely, CA: Osborne McGraw-Hill.
Crume,
J. (2000). Inside Internet Security: What Hackers Don’t Want You to Know.
Harlow, England: Addison-Wesley.
Davis,
P. T. (1994). Complete LAN Security and Control. New York: Windcrest/McGraw-Hill.
Denning,
P. J. [Ed.]. (1990). Computers Under Attack: Intruders, Worms and Viruses.
Reading, MA: Addison-Wesley Publishing Company.
Dunham,
K. (2000). Bigelow’s Virus
Troubleshooting Pocket Reference. New York: McGraw-Hill.
Dyson,
E. (1997). Release 2.0: A Design for Living in the Digital Age. New York:
Broadway Books.
Ellis,
J. and Speed, T. (2001). The Internet Security Guidebook. San Diego, CA:
Academic Press.
Escamilla,
T. (1998). Intrusion Detection:
Network Security Beyond the Firewall. New
York: John Wiley.
Fadia,
A. (2003). Network Security: A Hacker’s Perspective. Cincinnati, OH: Premier
Press.
Frackman,
A., Martin, R., and Ray, C. (2002). Internet and Online Privacy: A Legal and
Business Guide. New York: ALM Publishing.
Galbreath,
N. (2002). Crytography for Internet
and Database Applications. Indianapolis, IN: Wiley Publishing.
Garfinkel,
S. (1995). PGP: Pretty Good Privacy. Sebastopol, CA: O’Reilly &
Associates, Inc.
Gaskin,
J. (1997). Corporate Politics and the Internet: Connection Without Controversy.
Upper Saddle River, NJ: Prentice Hall.
Goncalves,
M. (1998). Firewalls Complete. New York: McGraw-Hill.
Goncalves,
M. et al. (1997). Internet Privacy Kit. Indianapolis, IN: Que.
Govanus,
G. and King, R. (2000). MCSE Windows 2000 Network Security Design Study Guide.
Alameda, CA: SYBEX, Inc.
Hafner,
K. and Markoff, J. (1991). Cyberpunk: Outlaws and Hackers on the Computer
Frontier. New York: Simon and Schuster.
Hall,
Eric A. (2000). Internet Core Protocols: The
Definitive Guide. Sebastopol, CA: O’Reilly
& Associates.
Hansche,
S., Berti, J. and Hare, C. (2004). Official (ISC)2
Guide to the CISSP Exam. Boca Raton, FL: Auerbach Publications.
Harris,
S. (2002). Mike Meyers’ CISSP
Certification Passport. Berkely, CA: Osborne McGraw-Hill.
Haynes,
C. (1990). The Computer Virus Protection Book. Alameda, CA: SYBEX, Inc.
Hills,
M. (1997). Intranet Business Strategies. New York: John Wiley & Sons, Inc.
Hoffman,
L. J. [Ed.] (1990). Rogue Programs: Viruses, Worms, and Trojan Horses. New York:
Van Nostrand Reinhold.
Hoffman,
L. J. (1977). Modern Methods for Computer Security and Privacy. Englewood
Cliffs, NJ: Prentice-Hall.
Honeypot Project, (2002). Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community. Boston, MA: Addison-Wesley.
Horton,
M, and Mugge, C. (2003). Hack Notes Network Security Portable Reference.
Berkeley, CA: Osborne McGraw-Hill.
Hughes,
L. J. (1995). Actually Useful
Internet Security Techniques. Indianapolis, IN: New Riders Publishing.
Icove,
D., et al. (1995). Computer Crime: A Crimefighter’s Handbook. Sebastopol, CA:
O’Reilly & Associates.
Internet
Security Systems, Inc. (2000). Microsoft Windows 2000 Security Technical
Reference. Redmond, WA: Microsoft Press.
Jaworski,
J. and Perrone, P. (2000). Java Security Handbook. Indianapolis, IN: SAMS.
Kaspersky,
K. (2003). Hacker Disassembling Uncovered. Wayne, PA: A-List, LLC.
Kelly,
K. (1994). Out of Control. Reading, MA: Addison-Wesley.
Knightmare.
(1994). Secrets of a Super Hacker. Port Townsend, WA: Loompanics Unlimited.
Krauss,
L. I. And McGahan, A. (1979). Computer
Fraud and Countermeasures. Englewood
Cliffs, NJ: Prentice-Hall.
Kruse,
W. G. and Heiser, J. G. (2002). Computer Forensics: Incident Response
Essentials. Boston, MA: Addison-Wesley Publishing Company.
LaMacchia,
B. A. and Sebastian, L. (2002). .NET Framework Security. Indianapolis, IN:
Addison-Wesley Publishing Company.
Landreth,
B. (1985). Out of the Inner Cirle: A Hacker’s Guide to Computer Security.
Bellvue, WA: Microsoft Press.
Lane,
C. A. (1997). Naked in Cyberspace. Wilton, CT: Pemberton, Press.
Larson,
E. and Stephens, B. (2000). Administrating Web Servers, Security, &
Maintenance. Upper Saddle River, NJ: Prentice Hall.
Levy,
S. (1984). Hackers: Heroes of the Computer Revolution. Garden City, NY: Anchor
Press/Doubleday.
Ludwig,
M.A. (1990). The Little Black Book of Computer Viruses: Volume One The Basic
Tehcnology. Tucson, AZ: American
Eagle Publishing, Inc.
Ludwig,
M.A. (1993). Computer Viruses, Artificial Life and Evolution: The Little Black
Book of Computer Viruses Volume II. Tucson,
AZ: American Eagle Publishing, Inc.
Lundell,
A. (1989). Virus! The Secret World of Computer Invaders that Breed and Destroy.
Chicago, IL: Contemporary Books.
Mandia,
K. and Prosise, C. (2001). Incident Response: Investigating Computer Crime.
Berkely, CA: Osborne McGraw-Hill.
Mao,
Wenbo. (2004). Modern Cryptography: Theory and Practice. Upper Saddle River, NJ:
Prentice Hall.
Marcella,
A. J. and Greenfield, R. S. [Editors]. (2002). Cyber Forensics: A Field Manual
for Collecting, Examining, and Preseving Evidence of Computer Crimes. Boca
Raton, FL: Auerbach Publications.
McAfee,
J. and Haynes, C. (1989). Computer Viruses, Worms, Data Diddlers, Killer
Programs and Other Threats to Your System: What They Are, How They Work, and How
To Defend Your PC, MAC, or Mainframe. New York: St. Martin’s Press.
McClure,
S., Scanbray, J. and Kurtz, G. (2003). Hacking Exposed: Network Security Secrets
and Solutions, fourth edition. Berkeley, CA: Osborne McGraw-Hill.
McClure,
S., Scanbray, J. and Kurtz, G. (2001). Hacking Exposed: Network Security Secrets
and Solutions, third edition. Berkeley, CA: Osborne McGraw-Hill.
McClure,
S., Scanbray, J. and Kurtz, G. (2001). Hacking Exposed: Network Security Secrets
and Solutions, second edition. Berkeley, CA: Osborne McGraw-Hill.
McLean,
I. (2000). Windows 2000 Security Little Black Book. Scottsdale, AZ:Coriolis
Group.
McNamara,
J. (2003). Secrets of Computer Espionage. Indianapolis, IN: Wiley Publishing,
Inc.
Meinel,
C. P. (1999). The Happy Hacker, third edition. Show Low, AZ: American Eagle
Publishing, Inc.
Mitnick,
K., and Simon, W. (2002). The Art of Deception: Controlling the Human Element of
Security. Indianapolis, IN: Wiley Publishing.
Nichols,
R. K., Ryan, D., and Ryan, J. C. H. (2000). Defending Your Digital Assets
Against Hackers, Crackers, Spies & Thieves. New York: McGraw-Hill.
Norberg,
S. (2001). Securing Windows 2000 Servers for the Internet. Beijing, China:
O’Reilly & Associates.
Northcutt,
S., et al. (2001). Intrusion
Signature and Analysis. Indianapolis, IN: New Riders Publishing.
Northcutt,
S., et al. (2003). Inside Network Perimeter Security.
Indianapolis, IN: New Riders.
Northrup,
T. and Thomas, O. (2004). MCSA/MCSE Self-Paced Training Kit (Exam 70-299):
Implementing and Administering Security in a Microsoft Windows Server 2003
Network. Redmond, WA: Microsoft Press.
O’Reilly
& Associates [Ed.]. (1997). The Harvard Conference on the Internet and
Society. Cambridge, MA: Harvard
University Press.
Peikari,
C. and Chuvakin, A. (2004). Security Warrior. Sebastopol, CA: O’Reilly &
Associates, Inc.
Peltier,
T. and Howard, P. D. (2002). The Total CISSP Exam Prep Book: Practice Questions,
Answers and Exam Taking Tips and Techiques.
Pfleeger, C. P. and Pfleeger, S. L. (2003). Security in Computing, Third Edition. Upper Saddle River, NJ: Prentice Hall.
Pistoia,
M., et al. (1999). Java 2 Network Security, second edition. Upper Saddle River,
NJ: Prentice Hall.
Power,
R, (2000). Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace.
Indianapolis, IN: Que Corporation.
Ranum,
M. J. (2004). The Myth of Homeland Security. Indianapolis, IN: Wiley Publishing,
Inc.
Roberts,
R. (1988). Computer Viruses. Greensboro, NC: Computer! Books.
Rose,
L. (1995). NetLaw: Your Rights in
the Online World. Berkely, CA: Osborne McGraw-Hill.
Rose,
L. and Wallace, J. (1992). SysLaw,
second edition. Winona, MN: PC
Information Group.
Russell,
R., et al. (2003). Stealing the Network: How to Own the Box. Rockland, MA:
Syngress Publishing.
Scanbray,
J. and McClure, S. (2001). Hacking Windows 2000 Exposed. Berkeley, CA: Osborne
McGraw-Hill.
Schiffman,
M. (2001). Hacker’s Challenge: Test Your Incident Response Skills Using 20
Useful Scenarios. New York: Osborne
McGraw-Hill.
Schiffman,
M., et al. (2003). Hacker’s Challenge 2: Test Your Network Security and
Forensic Skills. New York: Osborne
McGraw-Hill.
Schneier,
B. (2000). Secrets and Lies: Digital Security in a Networked World. New York:
John Wiley & Sons.
Schneir,
B. (1996). Applied Cryptography: Protocols, Algorithms, and Source Code in C,
second edition. New York: John Wiley & Sons.
Schneir,
B. (2003). Beyond Fear: Thinking Sensibly About Security In An Uncertain World.
New York: Copernicus Books.
Schwartau,
W. (2000). Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet
Terrorists and Weapons of Mass Disruption. New York: Thunder’s Mouth Press.
Sheldon,
T. (1997). Windows NT Security Handbook. Berkely, CA: Osborne McGraw-Hill.
Sherman,
C. and Price, G. (2001). The
Invisible Web: Uncovering Information Sources Serach Engines Can’t See .
Medford, NJ: Information Today, Inc.
Siyan,
K. and Hare, C. (1995). Internet Firewalls and Network Security. Indianapolis, IN: New Riders Publishing.
Skoudis,
E. (2002). Counter Hack: A Step-By-Step Guide to Computer Attacks and Effective
Defenses. Upper Saddle River, NJ: Prentice Hall.
Slade,
R. (1996). Robert Slade’s Guide to Computer Viruses: How to Avoid Them, How to
Get Rid of Them, and How to Get Help. New York: Springer-Verlag.
Slater,
W. F., III. (1979). Unauthorized Access: A Computer Security Problem. An
unpublished research paper submitted to Professor John D. Goebel, J.D., as part
of the fulfillment of the requirements of Business Law, ACCTG 973c, in an MA in
Business Management program, Fall Semester 1979 at then University of Nebraska
at Lincoln, Lincoln, NE.
Smith,
B. et al. (2003). Microsoft Security Resource Kit. Redmond, WA: Microsoft Press.
Smith,
R. E. (1997). Internet
Cryptography. Reading, MA: Addison-Wesley.
Solomon,
A. and Kay, T. (1994). Dr. Solomon’s PC Anti-Virus Book. Oxford, England:
New-Tech.
Sonnenreich,
W. and Yates, T. (2000). Building Linux and OpenBSD Firewalls. New York: John
Wiley & Sons.
Spitzner,
L. (2003). Honeypots: Tracking Hackers. Boston, MA: Addison-Wesley Publishing
Company.
Stallings,
W. (2000). Network Security Essentials: Applications and Standards. Upper Saddle
River, NJ: Prentice Hall.
Stang,
D. J. and Moon, S. (1994). Network Security Secrets. San Mateo, CA: IDG Books
Worldwide, Inc.
Stein,
L. D. (1998). Web Security: A
Step-by-Step Reference Guide. Reading, MA: Addison-Wesley Publishing Company.
Sterling,
B. (1992). The Hacker Crackdown. New York: Bantum Books.
Strebe,
M. and Perkins, C. (2002). Firewalls 24Seven, second edition. San Francisco:
Sybex.
Syngress.
[Ed.] (2000). E-Mail Virus Protection Handbook. Rockland, MA: Syngress.
Taylor,
E. (2000). Networking Handbook. New York: McGraw-Hill.
Tipton,
H. F. and Krause, M. [Editors]. (2004). Information Security Management
Handbook, fifth edition. Boca Raton, FL: Auerbach Publications, Inc.
Tittel,
E., Chapple, M., and Stewart, J. M. (2003). CISSP Certified Information System
Security Professional Study Guide. Alameda, CA: SYBEX, Inc.
Vacca,
J. (1996). Internet Security Secrets. Foster City, CA: IDG Books Worldwide.
Vacca,
J. (2002). Computer Forensics: Computer Crime Scene Investigation. Hingham, MA:
Charles River Media.
Van
Wyk, K. R. and Forno, R. (2001). Incident Response. Sebastopol, CA: O’Reilly
& Associates.
Wang,
W. (2003). Steal This Computer Book 3: What They Won’t Tell You About the
Internet. San Francisco: No Starch Press.
Wolff,
M. [Ed.]. (1996). Your Personal Netspy: How You Can Access the Facts and Cover
Your Tracks. New York: Wolff New Media.
Young, S. and Aitel, D. (2004). The Hacker’s Handbook: The Strategy Behind Breaking into and Defening Networks. Boca Raton, FL: Auerbach Publishing.
Zwicky, E. D., Chapman, D. B. and Cooper, S. (1995). Building Internet Firewalls, second edition. Sebastopol, CA: O’Reilly & Associates.
Home
| Persistence
| The
last class I took
| Impressions of my Classes and Teachers and
Teams
My UoP MS CIS Schedule
| My
current grades | Examples of Course Work
| The Program Description: My UoP MS CIS
Class
Handbook | MyCampus.phoenix.edu
| Bio | Teamwork
| Gallery
| My Higher Education Timeline
My thoughts on working in an online
education program | Why work on a Master's Degree in
a Graduate program?
The
UoP contact if you decide online
education if for you |
Certifications - Present &
Planned
Graduating and Getting your Graduate Degree at UoP
- How Does It Feel? | billslater.com
Institute of Data Center
Professionals - Data Center Technology Certificate Program
*** Stolen Material Notice ***
Last Updated on Sunday, September 16, 2007