Marc Sel's booklist
Free books
Math books
- A course in Galois theory, D.J.H. Garling, Cambridge University Press, covering groups, fields, vector spaces, rings, and the soubility of polynomials by radicals, ISBN 0-521-31249-3
- Book of Proof, Richard Hammack, Third Edition, ISBN: 978-0-9894721-2-8
- Computational complexity, Sanjeev Arora and Boaz Barak, Cambridge University Press, 2009 - hardness, interactive proofs, complexity, quantum computing, ...
- The description logic handbook: theory, implementation, and applications, F. Baader, Cambridge University Press, ISBN 0-521-78176-0
- Elliptic Tales: Curves, Counting, and Number Theory, Avner Ash and Robert Gross, an elegant introduction to elliptic curves and their applications, ISBN 9781400841714
- God Created the Integers: The Mathematical Breakthroughs That Changed History, Stephen Hawking, ISBN 9780762430048 (second edition)
- Introduction to Algorithms, by Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest and Clifford Stein, ISBN 9780262033848
- Introduction to finite fields and their applications, Rudolf Lidl and Harald Niederreiter, Cambridge University Press, linking finite fields to cryptography, ISBN 0-521-46-094-8
- Introduction to the practice of statistics, Moore, McCabe and Craig, W.H. Freeman and Company, ISBN-13 978-1-4292-1622-7.
- Logic in Computer Science, M. Huth and M. Ryan, Cambridge University Press, ISBN-13 978-0-521-54310-1
- Methodological Developments in Data Linkage, Katie Harron, Harvey Goldstein and Chris Dibben, Wiley Series in Probability and Statistics, John Wiley & Sons, September 2015, ISBN 1119072468, 9781119072461
- Naming and Necessity, Saul Kripke, Harvard University Press, 1980, ISBN 0674598466, 9780674598461.
- P, NP, and NP-Completeness: The Basics of Complexity Theory Oded Goldreich, Cambridge, ISBN 978-0-521-12254-2, 2010
- Subjective Logic: A Formalism for Reasoning Under Uncertainty, Audun Jøsang, , Springer Verlag, ISBN 978-3-319-42337-1
- The Z Notation - a Reference Manual, J.M. Spivey
Cryptography
- A Graduate Course in Applied Cryptography, Dan Boneh and Victor Shoup
- Algebraic Aspects of the Advanced Encryption Standard, Carlos Cid, Sean Murphy and Matthew Robshaw, Springer, ISBN 978-0-387-36842-9
- Cryptography - theory and practice, D. Stinson, an introduction to the mathematics of cryptography, ISBN 0-8493-8521-0
- Elliptic Curves in Cryptography, I. Blake, G. Seroussi, N. Smart, London Mathematical Society Lecture Note Series) 1999
- Elliptic Curves: Number Theory and Cryptography, Second Edition Lawrence C. Washington, ISBN-13: 978-1420071467
-
Encyclopedia of Cryptography and Security, Editors: Henk C. A. van Tilborg, Sushil Jajodia
- Everyday Cryptography, Keith M. Martin, Oxford University Press, ISBN 978-0-19-969559-1
- Handbook of Applied Cryptography, A. Menezes, P. van Oorschot and S. Vanstone, the foundations of cryptography, freely downloadable in pdf from
the University of Waterloo (Canada), ISBN 0-8493-8523-7
- Handbook of Elliptic and Hyperelliptic Curve Cryptography, Roberto M. Avanzi, Henri Cohen, Christophe Doche, Gerhard Frey, Tanja Lange, Kim Nguyen, Frederik Vercauteren, freely downloadable from
the UC Santa Barbara (US), ISBN 1584885181
- Handbook of Financial Cryptography and Security, edited by Burton Rosenberg, authors include a.o. Jianying Zhou, 2010, ISBN-13 978-1420059816
- Introduction to Identity Based Encryption, Luther Martin, Artechhouse, ISBN 978-1-596-93238-8
-
An introduction to Quantum Computing, Phillip Kaye, Raymond Laflamme, Michele Mosca
-
Java Cryptography: Tools and Techniques (Bouncy Castle), David Hook and Jon Eaves
-
Mathematics of Public Key Cryptography, Steven Galbraith (2018 update)
- Non-repudiation in Electronic Commerce, Jianying Zhou, Artechhouse, 2001, ISBN: 9781580532471
- Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign, Jeff Hoffstein, Nick Howgrave-Graham, Jill Pipher, William Whyte, Springer, ISBN 978-3-642-02294-4
- Practical Signcryption, Dent - Zheng (Eds.), Springer, ISBN 978-3-540-89409-4
- Proofs, arguments and zero-knowledge, Justin Thaler, freely downloadable from Justin Thaler's homepage. includes a taxonomy of the snark zoo
- The Laws of Cryptography with Java Code, Neal R. Wagner
- Rethinking Public Key Infrastructures and Digital Certificates, S. Brands, about selective disclosure, anonymous credentials and blinding, see Credentica , ISBN 0-262-02491-8.
- The design of Rijndael, J. Daemen and V. Rijmen, Springer-Verlag, the history and design of AES, the Advanced Encryption Standard (the DES replacement), ISBN 3-540-42580-2.
- User's Guide to Cryptography and Standards , A. Dent and C. Mitchell, Artech House, ISBN 1-58053-530-5
Blockchain
-
Bitcoin and beyond, edited by Malcolm Campbell-Verduyn, Taylor Francis Group, ISBN 9781351814089 (Open Access)
- Bitcoin and Blockchain Security, Ghassan Karame and Elli Androulaki, Artech House, ISBN-13: 978-1630810139
- Centrally Governed Blockchains: Optimizing Security, Cost, and Availability, Leif-Nissen Lundbæk, Andrea Callia D’Iddio, Michael Huth, ISBN 978-3-319-63120-2
- Distributed Programming, by Cachin, Guerraoui, and Rodrigues - covers crash and BFT
- Mastering Bitcoin, Andreas Antonopoulos, O'Reilly, Ebook ISBN 978-1-4493-7403-7
- Mastering Ethereum, by Andreas M. Antonopoulos, Gavin Wood
AI and learning
- Deep learning book, Ian Goodfellow, Yoshua Bengio and Aaron Courville, MIT Press, ISBN-13 978-0-521-54310-1
-
Foundations of Statistical Natural Language Processing, Chris Manning and Hinrich Schütze, MIT Press, partially available on-line
- Fundamentals of Neural Networks: Architectures, Algorithms and Applications, Laurene V. Fausett, Prentice Hall, ISBN-13: 978-0133341867
- Governing Lethal Behavior in Autonomous Robots, Ronald Arkin, CRC Press, ISBN-13: 978-1420085945
-
Interpretable machine learning, Christoph Molnar
- Machine learning, Tom Mitchell, McGraw-Hill, ISBN-13: 978-0070428072
-
NLP with Python, the NLTK handbook, Steven Bird, Ewan Klein, and Edward Loper, available on-line
-
Taming Text, Grant S. Ingersoll, Thomas S. Morton, and Andrew L. Farris, Manning Publications, ISBN 9781933988382
Organisation and finance
- Balanced Scorecard, R. Kaplan and D. Norton, Harvard Business School Press, ISBN 0-87584-651-3
- Capital in the Twenty-First Century, Thomas Piketty, the Belknap Press of Harvard University Press, ISBN 978-0-674-43000-6
- The competitive advantage of nations, M. Porter, The Free Press, the value chain and competitive advantage, ISBN 0-02-925361-6
- Competitive strategy, M. Porter, The Free Press, techniques for analysing industries and competitors, ISBN 0-02-925360-8
- Goal Directed Project Management, E. Andersen, K. Grude and T. Haug, Kogan Page - the professional paperback series, ISBN 0-7494-2615-2
- The Sprint Book, Jake Knapp, Google Ventures
- The Strategy Reader, S. Segal-Horn - editor, Blackwell Business, essential reading on strategy (Mintzberg, Hamel, Porter, Prahalad, etc), ISBN 0-631-20901-8
- Structure in fives: designing effective organizations, H. Mintzberg, Prentice Hall, a view on the structuring of organisations
- Safe or Free? Comparative Analysis of Media Discourses on Security, Petra Guasti, Zdenka Mansfeldova (eds.), ISBN 978-3-8474-0684-6
- Unified financial analysis, Willi Brammertz, Ioannis Akkizidis, Wolfgang Breymann, Rami Entin, Marco Rustmann, Wiley
Legal matters
- Concise European IT Law, Alfred Buellesbach, Yves Poullet, J.E.J. Prins, Wolters Kluwer, ISBN 9041123792
- Electronic signature in law, Stephen Mason, Cambridge, ISBN 978-1-107-01229-5
-
Electronic signature in law (pdf), Stephen Mason, Cambridge
- EU law, text, cases and materials, Paul Craig and Grainne de Burca, Oxford University Press, ISBN 0-19-924943-1
-
Identificación Electrónica y Confianza en las Transacciones Electrónicas: la Regulación Jurídico-Administrativa de las Instituciones
de Acreditación de la Actuación Electrónica , Ignacio Alamillo, PhD thesis (2018)
-
Identificación firma y otras pruebas electrónicas , Ignacio Alamillo, ISBN: 978-84-1309-903-3
- Legal and economic aspects of telecommunication, S. Schaff - editor, ISBN 0-444-88387-8
- Promoting confidence in electronic commerce: legal issues on international use of electronic authentication and signature methods
, United Nations publication, ISBN 978-92-1-133663-4
- Recht en electronische handel, Patrick van Eecke (editor), Larcier (in Dutch), ISBN 978-2-44-4819-6
-
Virtual currencies: a legal framework, Niels Vandezande, KU-Leuven, ISBN 978-1-78068-675-2
Applications
- Designing and Managing the Supply Chain, David Simchi-Levi, Philip Kaminsky, Edith Simchi-Levi, McGraw-Hill, ISBN 0-07-249256-2
- Introduction to GPS, Ahmed El-Rabbany, Artech House, ISBN-13 978-1-59693-016-2
- Road User Charging and Electronic Toll Collection, Andrew T.W. Pickford and Philip T. Blythe, Artech House, ISBN 1-58053-858-4
ICT books
Management
- Business/IT Fusion, Peter Hinssen, Mach Media, ISBN 978-908-132-4236, 2009
- IT Service Management volgens ITIL, Peter Janssen, Pearson/Addision Wesley, ISBN 90-430-0676-9
- Kennzahlen in der IT, Martin Kütz, dpunkt.verlag (in German), ISBN 3-89864-225-9
- PRINCE2 Agile, Axelos, ISBN 978-0-113-31467-6
Application development
- Applied software measurement, global analysis of productivity and quality, Jones, Capers, third edition, McGraw-Hill, New York, 2008
- Demystifying OWL for the Enterprise, Michael Uschold, Synthesis Lectures on the Semantic Web: Theory and Technology, Morgan and Claypool, 2018
- Enterprise Patterns and MDA (Model Driven Architecture), Jim Arlow and Ila Neustad, Addison-Wesley / Pearson Education, 2004, ISBN 0-321-11230-X
- Estimating software costs, bringing realism to estimating, Jones, Capers, second edition, McGraw-Hill, New York 2007
- Foundations of Semantic Web technologies, Pascal Hitzler, Markus Kroetzsch and Sebastian Rudolph, CRC Press, ISBN 978-1-4200-9050-5
- JavaScript: The Good Parts, Douglas Crockford, ISBN 978-0-596-51774-8
- Learning SPARQL, Bob DuCharme, O'Reilly, ISBN-13: 978-1449371432
- Object-oriented analysis and design, Grady Booch, Addison-Wesley, ISBN 0-8053-5340-2
- RESTful Web Services Cookbook, Allamaraju, Subbu, O'Reilly, 2010, ISBN 978-0-596-80168-7
-
Requirements Engineering, Ian Sommerville and Pete Sawyer, John Wiley and Sons, ISBN 0-471-97444-7
- Semantic web for the working ontologist: effective modelling in RDFS and OWL, Dean Allemang and James Hendler, Elsevier, 2011, ISBN 978-0-12-385965-5
- Software Measurement and estimation: a practical approach, Laird, M., Linda & Brennan, M., Carol, IEEE Computer Society 2006
-
Thinking in C++, Bruce Eckel, free ebook
- UML 2 and the Unified Process, Jim Arlow and Ila Neustadt, Addison-Wesley / Pearson Education, ISBN 0-321-32127-8
Distributed computing, networks and infrastructure
- Introduction to Reliable and Secure Distributed Programming, Cachin, Guerraoui, Rodrigues, Springer, ISBN 978-3-642-15259-7
- Introduction to 4G Mobile Communications, Juha Korhonen, Artech House, ISBN 978-1-60807-699-4
- Structured computer organization, Andrew S. Tanenbaum, Pearson Prentice Hall, ISBN 0-13-148251-0
- TCP/IP illustrated - 2nd edition, Kevin R. Fall and Richard Stevens, Pearson Education, ISBN-13 978-0-321-33631-6
- Unix network programming, W. Richard Stevens, Prentice Hall Software Series, a treatment of Unix networking and its programming, ISBN 0-13-949876-1
Security books
Security management
- Implementing the ISO/IEC 27001 ISMS, E. Humphreys, Artech House, ISBN-13 978-1-59693-172-5
- Information security management principles, Third edition, Andy Taylor, David Alexander, Amanda Finch and David Sutton, BCS
- Israel's silent defender, an inside look at sixty years of Israeli intelligence, edited by Amos Gilboa and Ephraim Lapid, Gefen Publishing House, ISBN 978-965-229-528-6
- Supply Chain Risk Management, J. Manners-Bell, Kogan Page
General security topics
- Aviation Security Engineering, a holistic approach, Rainer Kölle, Garik Markarian and Alex Tarter, Artech House, ISBN-13: 978-1-60807-072-5
- Computer security, D. Gollman, John Wiley & Sons, an overview of the computer security field, ISBN 0-471-97844-2
- Computer Security and the Internet: Tools and Jewels (from malware to Bitcoin), PDF freely available, P. C. van Oorschot, Springer ISBN 978-3-030-33649-3
- Core security patterns, C. Steel, R. Nagappan and R. Lai, Prentice Hall, ISBN 0-13-146307-1
- Database security, S. Castano, M. Fugini, G. Martella and P. Samarati, ACM Press, ISBN 0-201-59375-0
- DCE Security Programming, Wei Hu, O'Reilly & Associates, ISBN 1-56592-134-8
- Enterprise Security Architecture - a business driven approach, John Sherwood, Andrew Clark and David Lynas, CMPBooks, ISBN-13 978-1-57820-318-5
- Hacking exposed, S. McClure, J. Scambray, Gkurtz, Osborne, ISBN 0-07-212127-0
- Handbook of the Secure Agile Software Development Life Cycle, University of Oulu, 2014, ISBN 978-952-62-0341-6
- Phishing and Countermeasures, edited by Markus Jakobsson and Steven Myers, 2007, Wiley-Interscience, ISBN 0-471-78245-9
- Inside Java 2 Platform Security, Li Gong, ISBN 0-201-31000-7
- Security Architecture for Open Distributed Systems, S. Muftic, A. Patel, P. Sanders, R. Colon, J. Heijnsdijk and U. Pulkkinen, 1993, Wiley Series in Communications and Distributed Systems, ISBN 0-471-93472-0
- Security engineering, R. Anderson, covering challenges, solutions and defeats, John Wiley & Sons, ISBN 0-471-38922-6
- Trust, Complexity and Control: Confidence in a Convergent World, P. Cofta, Wiley, ISBN 978-0-470-06130-5
- Understanding public perceptions: trust and engagement in ICT-mediated services, H. Lacohée, P. Cofta, A. Phippen, and S. Furnell, International Engineering Consortium, ISBN 978-1-931695-95-4
Identity, authentication and access control
- Access Control Systems, M. Benantar, Springer Science+Business Media, about access control and identity models, including MAC/DAC, RBAC and SAML, ISBN-13 978-0-387-00445-7
- Role-Based Access Control (second edition), D. Ferraiolo, D. Kuhn and R. Chandramouli, Artech House Publishers, ISBN-13 978-1-59693-113-8
- SAP Berechtigungswesen, IBM Business Consulting Services, 2003, SAP Press (in German), ISBN 3-89842-312-3
Biometric recognition and document security
- Biometrics in Identity Management: Concepts to Applications, Shimon K. Modi, Artech House, ISBN-13 978-1-60807-017-6
- Handbook of Biometric Anti-Spoofing - The first definitive study of biometric anti-spoofing ,
Editors: Marcel, Sébastien, Nixon, Mark S., Li, Stan Z., ISBN 978-1-4471-6524-8
- Handbook of Face Recognition, Stan Z. Li and Anil K. Jain, editors, Springer, 2011, ISBN: 978-0-85729-931-4
- Handbook of Iris Recognition, Mark J. Burge and Kevin W. Bowyer, editors, Springer, 2013, ISBN: 978-1-4471-4401-4
- Iris Recognition: From Segmentation to Template Security, C. Rathgeb, A. Uhl, and P. Wild, volume 59 of Advances in Information Security. Springer, New York, 2012, ISBN: 978-1461455707
- Optical Document Security, Rudolf L. van Renesse, Artech House Publishers, ISBN 1-58053-258-6
- Reliable Face Recognition Methods, Harry Wechsler, Springer, ISBN 978-0-387-38464-1
- Guide to Biometric Reference Systems and Performance Evaluation, editors: Bernadette Dorizzi, Gérard Chollet, Dijana Petrovska-Delacrétaz, ISBN: 978-1-84800-291-3 (Print) 978-1-84800-292-0 (Online)
Telecom, networking and related security
- Cellular Authentication for Mobile and Internet Services, Silke Holtmanns, Valtteri Niemi, Philip Ginzboorg, Pekka Laitinen and N. Asokan, Wiley, ISBN 978-0-470-72317-3
- Firewalls and Internet Security (repelling the wily hacker), W. Cheswick and S. Bellovin, Addison-Wesley, ISBN 0-201-63357-4
- Network Security Through Data Analysis - Building situational awareness, Michael Collins , O'Reilly, ISBN 978-1-449-35790-0
- Voice over IP Security, Alan B. Johnston and David M. Piscitello, Artech House, ISBN 1-59693-050-0
Smart cards
Smart card technology
- RFID Handbuch, Klaus Finkenzeller, a rather complete overview of RFID technology including NFC (in German), ISBN 978-3-446-41200-2
- Handbuch der Chipkarten, Wolfgang Rankl & Wolfgang Effing, a rather complete overview of smart card technology (in German), ISBN 3-446-22036-4
Smart card security
- Smart Cards, Tokens, Security and Applications, Keith Mayes & Konstantinos Markantonakis (editors, RHUL Smart Card Centre), a cross-discipline overview of the field (2008), ISBN 978-0-387-72197-2
- Smart Card Security and Applications, Mike Hendry, 2001, ISBN 1-58053-156-3
Auditing
- Montgomery's Auditing, V. O'Reilly, M. Hirsch, Ph. Defliese and H. Jaenicke, John Wiley and Sons, ISBN 0-471-50522-6
- ITAF, a professional practices framework for IT Assurance, ISACA, ISBN 978-1-60420-036-2