Segurança da Informação
Principais Livros e Artigos
- GARFINKEL, Simson; SPAFFORD, Gene.
Practical UNIX and Internet Security.
3ª ed. Sebastopol, CA: O’Reilly, 2003.
- SINGH, Simon.
The Code Book: The Evolution of Secrecy from Mary Queen of Scots to Quantum Cryptography.
3ª ed. New York: Anchor Books, 2000. 411 p.
[Excelente livro não-técnico sobre criptografia e criptoanálise.]
Outros Livros e Artigos Interessantes
- ALLMAN, Eric.
E-mail Authentication - What, Why, How?
Queue, New York, v. 4, nº 9, p. 30-34, Nov. 2006.
[Discute as vantagens da adoção de autenticação de mensagens de correio eletrônico.]
- ARQUILLA, John.
Hacking the Axis.
Communications of the ACM, New York, v. 63, nº 8, p. 6-7, Aug. 2020. DOI 10.1145/3403958.
[Como a quebra de códigos criptográficos ajudou a acabar com a Segunda Guerra Mundial.]
- BACON, Dave; LEUNG, Debbie.
Toward a World with Quantum Computers.
Communications of the ACM, New York, v. 50, nº 9, p. 55-59, Sep. 2007.
- BUCHMANN, Johannes; MAY, Alexander; VOLLMER, Ulrich.
Perspectives for Cryptographic Long-Term Security.
Communications of the ACM, New York, v. 49, nº 9, p. 50-55, Sep. 2006.
[Discute os algoritmos atuais de criptografia e examina alternativas que não possam ser quebradas facilmente por algumas décadas.]
- CHESWICK, William.
Rethinking Passwords.
Communications of the ACM, New York, v. 56, nº 2, p. 40-44, Feb. 2013.
- CHESWICK, William R.; BELLOVIN, Steven M.
Firewalls and Internet Security: Repelling the Wily Hacker.
Reading, MA: Addison-Wesley, 1994.
- CYMRU, Team.
Cybercrime - An Epidemic.
Queue, New York, v. 4, nº 9, p. 24-28, Nov. 2006.
[Discute os crimes pela Internet e as dificuldades crescentes para impedi-lo e combatê-lo.]
- DIFFIE, Whitfield.
Information Security: 50 Years Behind, 50 Years Ahead.
Communications of the ACM, New York, v. 51, nº 1, p. 55-57, Jan. 2008.
- DINEV, Tamara.
Why Spoofing is Serious Internet Fraud.
Communications of the ACM, New York, v. 49, nº 10, p. 76-82, Oct. 2006.
- EDWARDS, Chris.
Hidden Messages Fool AI.
Communications of the ACM, New York, v. 62, nº 1, p. 13-14, Jan. 2019. DOI 10.1145/3290412.
- GARFINKEL, Simson.
Web Security and Commerce.
2ª ed. Sebastopol, CA: O’Reilly, 2002.
- GEER, Daniel E.
Playing for Keeps.
Queue, New York, v. 4, nº 9, p. 42-48, Nov. 2006.
[Discute o impacto da crescente complexidade de um software para aumentar sua confiabilidade e segurança.]
- GHOSH, Anup K.
Securing Internet Commerce: Weak Links, Practical Solutions.
[s.l.]: John Wiley and Sons, 1998.
- GREENGARD, Samuel.
Deep Insecurities: The Internet of Things Shifts Technology Risk.
Communications of the ACM, New York, v. 62, nº 5, p. 20-22, May 2019. DOI 10.1145/3317675.
- GREENGARD, Samuel.
The New Face of War.
Communications of the ACM, New York, v. 53, nº 12, p. 20-22, Dec. 2010.
- GURSES, Seda.
Can You Engineer Privacy?
Communications of the ACM, New York, v. 57, nº 8, p. 20-23, Aug. 2014.
- HOEPMAN, Jaap-H.; JACOBS, Bart.
Increased Security Through Open Source.
Communications of the ACM, New York, v. 50, nº 1, p. 79-83, Jan. 2007.
[Afirma que softwares abertos são mais seguros que os proprietários por terem seu código-fonte examinado e corrigido mais frequentemente.]
- JAGATIC, Tom et al.
Social Phishing.
Communications of the ACM, New York, v. 50, nº 10, p. 94-100, Oct. 2007.
- KUGLER, Logan.
How a Supervillain (or a Hacker in His Basement) Could Destroy the Internet.
Communications of the ACM, New York, v. 59, nº 2, p. 18-20, Feb. 2016.
- KUGLER, Logan.
How the Internet Spans the Globe.
Communications of the ACM, New York, v. 63, nº 1, p. 14-16, Jan. 2020. DOI: 10.1145/3371411.
[Trata dos cabos submarinos que permitem o alcance mundial da Internet.]
- KUGLER, Logan.
Why GPS Spoofing is a Threat to Companies, Countries.
Communications of the ACM, New York, v. 60, nº 9, p. 18-19, Sep. 2017.
- LU, Chao-Y.; PENG, Cheng-Z.; PAN, Jian-W.
Quantum Communication at 7,600 km and Beyond.
Communications of the ACM, New York, v. 61, nº 11, p. 42-43, Nov. 2018. DOI 10.1145/3239536.
- LUOTONEN, Ari.
Web Proxy Servers.
Englewood Cliffs, NJ: Prentice Hall, 1997.
- MARKS, Paul.
Dark Web's Doppelgängers Aim to Dupe Antifraud Systems.
Communications of the ACM, New York, v. 63, nº 2, p. 16-18, Feb. 2020. DOI 10.1145/3374878.
[Descreve métodos de simulações de identidades para realizar fraudes bancárias.]
-
MAXIMUM Security: A Hacker’s Guide to Protecting Your Internet Site and Network.
4ª ed. [s.l.]: SAMS, 2002.
- MONE, Gregory.
The Quantum Threat.
Communications of the ACM, New York, v. 63, nº 7, p. 12-15, Jul. 2020. DOI 10.1145/3398388.
- MOREIRA, Nilton S.
Segurança Mínima.
Rio de Janeiro: Axcel, 2001.
- NEVILLE-NEIL, George V.
Peerless P2P.
Queue, New York, v. 4, nº 10, p. 12-13, Dec. 2006-Jan. 2007.
[Propõe vários modelos de arquitetura para aplicações que permitem o compartilhamento de arquivos de forma segura.]
- PASQUIER, Thomas; EYERS, David; BACON, Jean.
Personal Data and the Internet of Things.
Communications of the ACM, New York, v. 62, nº 6, p. 32-34, Jun. 2019. DOI 10.1145/3322933.
- RANUM, Marcus J.
Security: The Root of the Problem.
Queue, New York, v. 2, nº 4, p. 44-49, Jun. 2004.
- SIMONS, Barbara; JONES, Douglas W.
Internet Voting in the U.S.
Communications of the ACM, New York, v. 55, nº 10, p. 68-77, Oct. 2012.
- SOMPOLINSKY, Yonatan; ZOHAR, Aviv.
Bitcoin's Underlying Incentives.
Communications of the ACM, New York, v. 61, nº 3, p. 46-53, Mar. 2018. DOI 10.1145/3152481.
- STAPLETON-GRAY, Ross; WOODCOCK, William.
National Internet Defense - Small States on the Skirmish Line.
Communications of the ACM, New York, v. 54, nº 3, p. 50-55, Mar. 2011.
- STEIN, Lincoln D.
Web Security: A Step-by-step Reference Guide.
Reading, MA: Addison-Wesley, 1997.
- TEXEN, Bob.
The NSA and Snowden: Securing the All-Seeing Eye.
Communications of the ACM, New York, v. 57, nº 5, p. 44-51, May 2014.
- VIEGA, John; MESSIER, Matt.
Security is Harder You Think.
Queue, New York, v. 2, nº 5, p. 60-65, Jul./Aug. 2004.
- WADLOW, Thomas A.
The Answer is 42, of Course.
Queue, New York, v. 3, nº 5, p. 34-39, Jun. 2005.
[Pontos a verificar sobre segurança em redes.]
- WADLOW, Thomas.
Who Must You Trust?
Communications of the ACM, New York, v. 57, nº 7, p. 42-49, Jul. 2014.
- WANG, Huaiqing; WANG, Shuozhong.
Cyber Warfare: Steganography vs. Steganalysis.
Communications of the ACM, New York, v. 47, nº 10, p. 76-82, Oct. 2004.
[Panorama sobre as técnicas modernas de esteganografia (ocultamento de informação) e esteganálise.]
- WEAVER, Nicholas.
Risks of Cryptocurrencies.
Communications of the ACM, New York, v. 61, nº 6, p. 20-24, Jun. 2018. DOI 10.1145/3208095.
- YOUNG, Adam L.; YUNG, Moti.
Cryptovirology: The Birth, Neglect, and Explosion of Ransomware.
Communications of the ACM, New York, v. 60, nº 7, p. 24-26, Jul. 2017.
- ZIELIŃSKA, Elżbieta et al.
Trends in Steganography.
Communications of the ACM, New York, v. 57, nº 3, p. 86-95, Mar. 2014.
- ZWICKY, Elizabeth D.; COOPER, Simon; CHAPMAN, D. Brent.
Building Internet Firewalls.
2ª ed. Sebastopol, CA: O’Reilly, 2000.