[BACARD 95]
|
Andr‚
Bacard:
|
The Computer
Privacy Handbook: A practical
guide to E-mail encryption, Data protection and
PGP privacy software Berkeley, Peachpit Press,
1995.
|
[BAKE 91]
|
R. H. Baker:
|
Computer Security Handbook Mc Graw Hill, New York, 1991.
|
[BAKE 95]
|
R. H. Baker:
|
Network security. How to
plan for it and achieve it
Mc Graw Hill, New York, 1995.
|
[BAMF 83]
|
J. Bamford:
|
The puzzle Palace
Pinguin Books, 1983.
|
[BATE 91]
|
R. J. Bud Bates:
|
Disaster Recovery Planning
Networks, Telecommunication and Data
Communications McGraw-Hill, 1991.
|
[BAUE 95]
|
F. L. Bauer:
|
Entzifferte Geheimnisse: Methoden und Maximen
der Kryptologie.
Springer
– Verlag, Heidelberg, 1995.
|
[BECK 88]
|
Brian
Beckett:
|
Introduction
to Cryptology Oxford: Blackwell
Scientific Publication, 1988.
|
[BEK 82]
|
Henry Beker,
Fred Piper:
|
Cipher Systems: The Protection of
Communications New
York, John Wiley & Sons, 1982. |
[BENS 96]
|
R. L. Benson,
M. Warner (eds.):
|
Venona Aegean Park Press, 1996.
|
[BETH 92]
|
Thomas Beth,
M.Frish, G.J.Simmons eds.:
|
Public-Key Cryptography
State of the Art and Future Directions
Berlin, Springer-Verlag,
1992.
|
[BEUT 91]
|
A.
Beutelspacher, A. Kersten,
B. A. Pfau:
|
Chipkarten als SicherheitswerkzeugSpringer-Verlag,
Heidelberg, 1991. |
[BEUT 94]
|
A. Beutelspacher:
|
Cryptology An Introduction to the Art and Science
of Enciphering, Encrypting Washington, The Mathematical Association of America, 1994. |
[BIHA 93] |
Eli Biham, Adi Shamir: |
Differential Cryptanalysis of the Data Encryption Standard Springer Verlag, Berlin 1993. |
[BONE 99] |
Dan Boneh: |
Twenty years of attack
on the RSA cryptosystem
Notices of the AMS,
February 1999, 203-213. |
[BORA 98] |
S. Boran: |
IT Security Cookbook
Htttp://www.boran.ie./security/,
1998. |
[BORO 95] |
Boros és társai: |
Rendészet,
vagyonvédelem BKKE –Közgazdasági Továbbképző Intézet, 1995. |
[BRASS 88] |
Gilles Brassard: |
Modern
Cryptology: A Tutorial New York, Springer/Verlag, 1988. |
[BUTL 94] |
J. Butler: |
Contingency Planning and Disaster Recovery
Strategies Computer Technology Research Corp., 1994. |
[BUTL 95] |
Janet G. Butler: |
Enterprisewide Network Management Computer Technology
Research Corp., 1995. |