Jeroen's blog

About Me

Name: Jeroen van de Graaf

View my complete profile

Previous Posts

  • gnuplot
  • DLREP
  • The end of privacy
  • there is soooo much on line
  • coin or change problem
  • Derangements
  • Chapter A and B from "Combinatorics, a problem-ori...
  • Approximation from Concrete Mathematics [111]
  • birthday paradox
  • test

Archives

  • 2005/02/13 - 2005/02/20
  • 2005/02/20 - 2005/02/27
  • 2005/02/27 - 2005/03/06
  • 2005/03/06 - 2005/03/13
  • 2005/03/20 - 2005/03/27
  • 2005/06/05 - 2005/06/12
  • 2005/07/10 - 2005/07/17
  • 2006/04/16 - 2006/04/23
  • 2006/05/07 - 2006/05/14
  • 2006/07/02 - 2006/07/09
  • 2006/07/09 - 2006/07/16
  • 2007/09/02 - 2007/09/09
  • 2007/11/25 - 2007/12/02
  • 2007/12/02 - 2007/12/09
  • 2008/02/03 - 2008/02/10
  • 2008/08/17 - 2008/08/24

Powered by Blogger

2005/06/05

Links Segurança de Informação

NIST, pub 800-12 por exemplo
http://csrc.nist.gov/publications/nistpubs/

http://www.blacksheepnetworks.com/security/info/misc/handbook/ewtoc.html

Pfleeger&Pfleeger
http://www.phptr.com/bookstore/product.asp?isbn=0130355488&rl=1#

Kaufman Perlman Speciner
http://vig.prenhall.com:8081/catalog/academic/product/0,1144,0130460192-IS,00.html

Stallings
http://williamstallings.com/Crypto3e.html

posted by Jeroen van de Graaf @ Sunday, June 05, 2005