Categories
Uncategorized

For Sale: Deadbeat Ex-Housemate’s Cryptography and Security Books, $5 each

As I mentioned in the previous article — in which I announced that I had a Symbolics XL1200 Lisp Machine for sale — I also have a number of my deadbeat ex-housemate’s books. After having held onto them for five years in the expectation that I would send them to him once he paid me back, I have decided to sell his books.

All of them, regardless of original price, are going for five bucks apiece. If you live in Toronto, come pick ’em up (I live in the High Park area). If you need them shipped to you, you’ll have to cover shipping. All are in decent to good condition, all with their covers intact.

Want one? Want ’em all? Contact me at joey@joeydevilla.com.

It’s going to take me a while to catalogue all the books for sale, so I’m going to do them in installments. Here’s the first installment: books on cryptography and information security.

The Cryptography and Information Security Books

Among the books is a set of silver-and-red paperbacks of Lecture Notes in Computer Science. This set features proceedings from various information security and cryptography conferences in 1999, suitable for citations in you upcoming dissertation:

  • Lecture Notes in Computer Science 1560: Public Key Cryptography – Hideki Imai and Yulian Zheng (Eds.)

    Second International Workshop on Practice and Theory in Public Key Cryptography, PKC ’99, Kamakura, Japan, March 1999 – Proceedings [Paperback][Springer]

  • Lecture Notes in Computer Science 1648: Financial Cryptography – Matthew Franklin (Ed.)

    Third Internation Conference, FC ’99, Anguilla, British West Indies, February 1999 – Proceedings [Paperback][Springer]

  • Lecture Notes in Computer Science 1726: Information and Communication Security – Vijay Varadharajan and Yi Mu (Eds.)

    Second International Conference, ICICS ’99, Sydney, Australia, November 1999 – Proceedings [Paperback][Springer]

  • Lecture Notes in Computer Science 1729: Information Security – Masahiro Mambo and Yulian Zheng (Eds.)

    Second International Workshop, ISW ’99, Kuala Lumpur, Malaysia, November 1999 – Proceedings [Paperback][Springer]

  • Lecture Notes in Computer Science 1787: Information Security and Cryptology ICISC ’99 – JooSeok Song (Ed.)

    Second International Conference, Seoul, Korea, December 1999 – Proceedings [Paperback][Springer]

  • Lecture Notes in Computer Science 1796: Security Protocols – Bruce Christianson et. al. (Eds.)

    7th International Workshop, Cambridge, UK, April 1999, – Proceedings [Paperback][Springer]

There are also the following security books:

Intrusion Signatures and Analysis by Stephen Northcutt, Mark Cooper, Matt Fearnow and Karen Frederick [Paperback][New Riders 2001]

Network Intrusion Detection: An Analyst’s Handbook, Second Edition by Stephen Northcutt and Judy Novak [Paperback][New Riders 2001]

Modelling and Analysis of Security Protocols by Peter Ryan and Steve Schneider [Paperback][Pearson 2001]

Information Security Management Handbook, 4th Edition (here’s the Amazon link for the 5th edition) by Harold F. Tipton and Micki Krause (Eds.) [Hardcover][Auerbach 2000]

Cryptography Theory and Practice [First Edition] (here’s the Amazon link for the 2nd edition) by Douglas R. Stinson [Hardcover][CRC 1995]

Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy by Stefan A. Brands [Hardcover][MIT Press 2000]

Cryptography in C and C++ [First Edition] (here’s the Amazon link to the second edition) by Michael Welschenbach [Paperback][Apress 2001]

As I said earlier, if you want to buy any of these, contact me!

Leave a Reply