Used bibliography

Introduction
  • Network Security Essentials (William Stallings) Caps 1
  • Computer Security (Dieter Gollmann) Caps 1
Code Vulnerabilities and Secure Applications
  • Writing Secure Code (Michael Howard) Caps 4, 5, 10, 11, 12, 13
Code Certification
  • Introduction to computer security (Matt Bishop) Caps 17, 18
Network Vulnerabilities
  • Segurança Informática em Redes (André Zúquete) Caps 4, 5
Firewalls, Intrusion Detection Systems
  • Segurança em Redes Informáticas (André Zúquete) Caps 6, 7
  • Network Security Essentials (William Stallings) Caps 9, 11
Cryptography: Cipher Types and Modes, Hash Functions
  • Segurança Informática em Redes (André Zúquete) Caps 2
  • Applied Cryptography (Bruce Schneier) Caps 2,9,10,18
Secret Key Management, Public Key Management
  • Segurança Informática em Redes (André Zúquete) Caps 3
  • Network Security Essentials (William Stallings) Caps 2, 3
  • Computer Security (Dieter Gollmann) Cap 15
  • Applied Cryptography (Bruce Schneier) Caps 7,8,22
Authentication
  • Network Security Essentials (William Stallings) Cap 4
Authorization
  • Computer Security (Dieter Gollmann) Caps 3, 4
IEEE 802.11 (WiFi)
  • Segurança Informática em Redes (André Zúquete) Caps 9
  • Network Security Essentials (William Stallings) Caps 7
GSM/UMTS
  • Segurança Informática em Redes (André Zúquete) Caps 2.7, 10.3
Bluetooth Secure Channels, IPSec
  • Segurança em Redes Informáticas (André Zúquete) Cap 8
  • Network Security Essentials (William Stallings) Caps 6,7