Sylaby předmětu: Opravená 1. přednáška (bit1pr02.ps), sylaby1.zip (bit2pr02.ps, bit3pr02.ps), sylaby2.zip (bit4pr02.ps, bit5pr02.ps),
prng.pdf,
ask.pdf,
ask2.ps,
bit_doplnek.ppt,
hash_ds_HS.ps, ,
bit10.zip,
bit11.zip,
hash.zip
aut1.ppt
aut2.ppt
Stallings, W.: Cryptography and Network Security, Prentice Hall, 1999
Pfleeger Ch.P.: Security Computing, Prentice Hall, 1997
Gollmann D.: Computer Security , Wiley 2000
Schneier B.: Applied Cryptography, John Wiley & Sons, New York, 1995 (2nd
edition)
Grošek O., Porubský Š.: Šifrovanie, algoritmy, metódy, prax, GRADA 1992
Garfinkel S., Spafford G.:Bezpečnost v UNIXu a Internetu v praxi , Computer
Press 1998
Date C.J.: An Introduction to Database Systems, Volume 1, Addison-Wesley, 1985.
Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone: Handbook of Applied Cryptography, CRC
Press, ISBN: 0-8493-8523-7 , October 1996, 816 pages
http://cacr.math.uwaterloo.ca/hac/
Staudek J., Hanáček P.: Bezpečnost informačních systémů,ÚSIS Praha 2000,
http://www.uvis.cz/cz/dokumenty/domaci/bezpecnost.html
Nechvátal J.: Public-Key Cryptography, NIST Special Publication 800-2,
http://csrc.nist.gov/publications/nistpubs/800-2/800-2.txt
Rivest R.L.: Cryptography and Security,
http://theory.lcs.mit.edu/~rivest/crypto-security.html
Ritter T.: Ciphers By Ritter: Cryptography and Technology,
http://www.ciphersbyritter.com/
Savard J.: A Cryptograhpic Compendium,
http://fn2.freenet.edmonton.ab.ca/~jsavard/jscrypt.htm
Diffuse -- Information Security Standards,http://www.diffuse.org/secure.html
Dostálek L. a kol.: Velký průvodce protokoly TCP/IP: Bezpečnost, Computer Press, Praha 2001