JEFF HOWELL
  • Home
  • About
  • Cyber Security Fundementals
    • Threats and Vulnerabilities
    • Reference Monitor
    • Links to Additional Resources
  • Cryptography
    • Block Ciphers
    • Hash Functions
    • Message Authentication Codes (MAC's)
    • Kerberos Key Management (Single sign-on)
    • Public Key Infrastructure (PKI)
    • Links to Additional Resources
  • Secure Architecture
    • Architecture Strategy
    • Contextual Security Architecture
    • Conceptual Security Architecture
    • Logical Security Architecture
    • Physical Security Architecture
    • Component Security Architecture
    • Operations
    • Supporting Materials
  • Reference Link Library
    • Industry Websites
    • Government Resources
    • Cyber Security News
    • Certification and Training
    • Books
    • Cyber Security Tools
  • Risk Management
    • Supporting Materials
  • Operational Policy
    • Laws and Regualations
    • Data Classification
    • Policy Implementation and Enforcement
    • Supporting Materials
  • Management and Cyber Security
    • Contingency Planning
    • ROI of Cyber Security
    • Staffing Models
    • Links to Additional Resources
  • Secure Software Design and Development
    • Heartbleed Details
    • Mobile Device Vulnerabilities
    • Links to Additional Resources
  • Network Visualization and Vulnerability Detection
    • Visualizing the Network
    • Protecting the Perimeter
    • Vulnerability Detection
    • Sniffing Wireless Networks
    • Links to Additional Resources
  • Cyber Threat Intelligence
    • Links to Additional Resources
  • Incident Response and Computer Network Forensics
    • Links to Additional Resources

BOOKS

Foundations of Cyber Security
  • Bosworth; Kabay, M. E.; and Whyne, . (2014). Computer Security Handbook, Set, 6th ed. Hoboken, NJ: John Wiley & Sons, Inc.
Cyber Security & Management
  • Drucker, P. (2011). Management: Tasks, Responsibilities, Practices. New York, NY: Routledge Publishing.
  • Iannarelli, J. G., & O’Shaughnessy, M. (2015). Information Governance and Security: Protecting and Managing Your Company’s Proprietary Information (1st ed.). Amsterdam, Netherlands: Elsevier.
  • Touhill, G. J., & Touhill, C. J. (2014). Cybersecurity for Executives: A Practical Guide. Hoboken, NJ: John Wiley & Sons.
Applied Cryptography
  • Ferguson, N., Schneier, B. & Kohno, T. (2010). Cryptography Engineering: Design Principles and Practical Applications. Hoboken, NJ: John Wiley & Sons. 2010.
Secure Systems Architecture
  • Clark, A., Lynas, D., and Sherwood, A. (2005). Enterprise Security Architecture: A Business Driven Approach. Boca Raton. FL: Taylor and Francis.
  • National Institute of Standards and Technology. (2017). Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems.Washington, D.C.: National Institute of Standards and Technology.
Cyber Security & Management
  • Drucker, P. (2011). Management: Tasks, Responsibilities, Practices. New York, NY: Routledge Publishing.
  • Iannarelli, J. G., & O’Shaughnessy, M. (2015). Information Governance and Security: Protecting and Managing Your Company’s Proprietary Information (1st ed.). Amsterdam, Netherlands: Elsevier.
  • Touhill, G. J., & Touhill, C. J. (2014). Cybersecurity for Executives: A Practical Guide. Hoboken, NJ: John Wiley & Sons.
Operational Policy
  • Johnson, R. (2015). Security Policies and Implementation Issues, 2nd Edition. Burlington, MA: Jones & Bartlett Learning.
  • Bosworth, S; Kabay, M. E.; and Whyne, E. (2014). Computer Security Handbook, Set, 6th ed. Hoboken, NJ: John Wiley & Sons, Inc.
Cyber Intelligence
  • Jensen, C.; McElreath, D.; Graves, M. (2013). Introduction to Intelligence Studies. Boca Raton. FL: Taylor and Francis.
  • Gourley, B. (2016). The Cyber Threat. San Bernardino, CA.
Network Visualization
  • McGuerty, J. (2018). Network Field Survival Guide. ​
Jeff Howell  -  San Carlos, CA  -  Privacy Statement - email Jeff
  • Home
  • About
  • Cyber Security Fundementals
    • Threats and Vulnerabilities
    • Reference Monitor
    • Links to Additional Resources
  • Cryptography
    • Block Ciphers
    • Hash Functions
    • Message Authentication Codes (MAC's)
    • Kerberos Key Management (Single sign-on)
    • Public Key Infrastructure (PKI)
    • Links to Additional Resources
  • Secure Architecture
    • Architecture Strategy
    • Contextual Security Architecture
    • Conceptual Security Architecture
    • Logical Security Architecture
    • Physical Security Architecture
    • Component Security Architecture
    • Operations
    • Supporting Materials
  • Reference Link Library
    • Industry Websites
    • Government Resources
    • Cyber Security News
    • Certification and Training
    • Books
    • Cyber Security Tools
  • Risk Management
    • Supporting Materials
  • Operational Policy
    • Laws and Regualations
    • Data Classification
    • Policy Implementation and Enforcement
    • Supporting Materials
  • Management and Cyber Security
    • Contingency Planning
    • ROI of Cyber Security
    • Staffing Models
    • Links to Additional Resources
  • Secure Software Design and Development
    • Heartbleed Details
    • Mobile Device Vulnerabilities
    • Links to Additional Resources
  • Network Visualization and Vulnerability Detection
    • Visualizing the Network
    • Protecting the Perimeter
    • Vulnerability Detection
    • Sniffing Wireless Networks
    • Links to Additional Resources
  • Cyber Threat Intelligence
    • Links to Additional Resources
  • Incident Response and Computer Network Forensics
    • Links to Additional Resources