Aims and Scope

The eSECURITY BOOKSTORE provides an overview and a possibility to directly order books that are recommended by Rolf Oppliger on various topics related to computer security. The bookstore is operated by, Inc.

In each section, the books are sorted alphabetically (according to the first author's name).

Table of Contents


  • Buchmann, J., Introduction to Cryptography, Second Edition, ISBN 0387207562, Springer, 2004 (order book)
  • Delfs, H., and H. Knebl, Introduction to Cryptography: Principles and Applications, Second Edition, ISBN 3540492437, Springer, 2007 (order book)
  • Dent, A.W., and C.J. Mitchell, User's Guide to Cryptography and Standards, ISBN 1580535305, Artech House, Norwood, MA, 2004 (order book)
  • Ferguson, N., Schneier, B., and T. Kohno, Cryptography Engineering, ISBN 0470474246, John Wiley & Sons, New York, NY, 2010 (order book)
  • Garrett, P.B., Making, Breaking Codes: Introduction to Cryptology, ISBN 0130303690, Prentice Hall PTR, Upper Saddle River, NJ, 2000 (order book)
  • Goldreich, O., Foundations of Cryptography: Volume 1, Basic Tools, ISBN 0521791723, Cambridge University Press, 2001 (order book)
  • Goldreich, O., Foundations of Cryptography: Volume 2, Basic Applications, ISBN 0521830842, Cambridge University Press, 2004 (order book)
  • Goldreich, O., Foundations of Cryptography: A Primer, ISBN 1933019026, Now Publishers, 2005 (order book)
  • Hankerson, D., Menezes, A.J., and S.A. Vanstone, Guide to Elliptic Curve Cryptography, ISBN 038795273X, Springer, 2004 (order book)
  • Hoffman, J., Pipher, J., and J.H. Silverman, An Introduction to Mathematical Cryptography, ISBN 0387779930, Springer, 2008 (order book)
  • Katz, J., and Y. Lindell, Introduction to Modern Cryptography, ISBN 1584885513, Chapman & Hall/CRC Press, Boca Raton, FL, 2007 (order book)
  • Koblitz, N.I., A Course in Number Theory and Cryptography, Second Edition, ISBN 0387942939, Springer, 1994 (order book)
  • Luby, M., Pseudorandomness and Cryptographic Applications, ISBN 0691025460, Princeton Computer Science Notes, Princeton, NJ, 1996 (order book)
  • Luther, M., Introduction to Identity-Based Encryption, ISBN 1596932384, Artech House, Norwood, MA, 2008 (order book)
  • Mao, W., Modern Cryptography: Theory and Practice, ISBN 0130669431, Prentice Hall PTR, Upper Saddle River, NJ, 2003 (order book)
  • Menezes, A.J., van Oorschot, P.C., and S.A. Vanstone, Handbook of Applied Cryptography, ISBN 0849385237, CRC Press, Boca Raton, FL, 1996 (order book)
  • Mollin, R.A., RSA and Public-Key Cryptography, ISBN 1584883383, Chapman & Hall/CRC Press, Boca Raton, FL, 2002 (order book)
  • Mollin, R.A., An Introduction to Cryptography, Second Edition, ISBN 1584886188, Chapman & Hall/CRC Press, Boca Raton, FL, 2006 (order book)
  • Oppliger, R., Contemporary Cryptography, Second Edition, ISBN 1608071456, Artech House, Norwood, MA, 2011 (order book)
  • Paar, C., and J. Pelzl, Understanding Cryptography: A Textbook for Students and Practitioners, ISBN 3642041000, Springer, 2009 (order book)
  • Schneier, B., Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition, ISBN 0471117099, John Wiley & Sons, New York, NY, 1996 (order book)
  • Smart, N., Cryptography, An Introduction, ISBN 0077099877, McGraw-Hill, 2002 (order book)
  • Stinson, D., Cryptography: Theory and Practice, Third Edition, ISBN 1584885084, Chapman & Hall/CRC, 2005 (order book)
  • van Tilborg, H.C.A. (Ed.), Encyclopedia of Cryptography and Security, ISBN 038723473X, Springer, 2005 (order book)
  • Vaudenay, S., A Classical Introduction to Cryptography: Applications for Communications Security, ISBN 0387254641, Springer, 2005 (order book)

Cryptographic Protocols

Computer Security

  • Anderson, R., Security Engineering: A Guide to Building Dependable Distributed Systems, Second Edition, ISBN 0470068523, John Wiley & Sons, New York, NY, 2008, (order book)
  • Bishop, M., Computer Security: Art and Science, ISBN 0201440997, Addison-Wesley Professional, 2002 (order book)
  • Bishop, M., Introduction to Computer Security, ISBN 0321247442, Addison-Wesley Professional, 2004 (order book)
  • Biskup, J., Security in Computing Systems: Challenges, Approaches and Solutions, ISBN 3540784411, Springer, 2009 (order book)
  • Coyne, E.J., and J.M. Davis, Role Engineering for Enterprise Security Management, ISBN 159693218X, Artech House Publishers, Norwood, MA, 2007 (order book)
  • Ferraiolo, D.F., D.R. Kuhn, and R. Chandramouli, Role-based Access Control, Second Edition, ISBN 1596931132, Artech House Publishers, Norwood, MA, 2007 (order book)
  • Garfinkel, S., E.H. Spafford, and A. Schwartz, Practical Unix and Internet Security, Third Edition, ISBN 0596003234, O'Reilly & Associates, Sebastopol, CA, 2003 (order book)
  • Lopez, J., S. Furnell, S. Katsikas, and A. Patel (Eds.), Securing Information and Communication Systems: Principles, Technologies and Applications, ISBN 1596932287, Artech House Publishers, Norwood, MA, 2008 (order book)
  • Gollmann, D., Computer Security, Second Edition, ISBN 0470862939, John Wiley & Sons, New York, NY, 2006, (order book)
  • Nazario, J., Defense and Detection Strategies Against Internet Worms, ISBN 1-58053-537-2, Artech House Publishers, Norwood, MA, 2003 (order book)
  • Pfleeger, C.P., and S.L. Pfleeger, Security in Computing, Fourth Edition, ISBN 0132390779, Prentice Hall, 2007, (order book)
  • Pieprzyk, J., Hardjono, T., and J. Seberry, Fundamentals of Computer Security, ISBN 3540431012, Springer, 2003, (order book)
  • Szor, P., The Art of Computer Virus Research and Defense, ISBN 0321304543, Addison-Weseley Professional, 2005, (order book)

Network and Internet Security

Public Key Infrastructures

Secure Messaging

Web Security

Electronic Commerce

Application Development

Intellectual Property Protection

Computer Forensics


  • Ashbourne, J., Practical Biometrics: From Aspiration to Implementation, ISBN 1852337745, Springer-Verlag, 2003, (order book)
  • Bolle, R., Connell, J., Pankanti, S., Ratha, N., and A. Senior, Guide to Biometrics, ISBN 0387400893, Springer-Verlag, 2003, (order book)
  • Chirillo, J., and S. Blaul, Implementing Biometric Security, ISBN 0764525026, Wiley, 2003, (order book)
  • Jain, A.K., Flynn, P., and A.A. Ross (Eds.), Handbook of Biometrics, ISBN 038771040X, Springer-Verlag, 2007, (order book)
  • Ratha, N.K., and V. Govindaraju (Eds.), Advances in Biometrics: Sensors, Algorithms and Systems, ISBN 1846289203, Springer-Verlag, 2007, (order book)
  • Ross, A.A., Nandakumar, K., and A.K. Jain, Handbook of Multibiometrics, ISBN 0387222960, Springer-Verlag, 2006, (order book)
  • Vacca, J.R., Biometric Technologies and Verification Systems, ISBN 0750679670, Butterworth-Heinemann, 2007, (order book)
  • Wayman, J., Jain, A., Maltoni, D., and D. Maio (Eds.), Biometric Systems: Technology, Design and Performance Evaluation, ISBN 1852335963, Springer-Verlag, 2004, (order book)

Security Management


In Association with

© 1999-2014 eSECURITY Technologies Rolf Oppliger