Skip to main content

NSEI 6841 Information Security Challenges and Solutions: Welcome & Course Readings

Welcome to your course guide

Please find your required library readings below. If you have problems with the links below, please contact the Library. If you have APA questions about these materials, please contact the Writing Center.

NSEI 6841 Required Course Readings

The links are for required readings found in the Walden databases ONLY. For all other readings, see your course resources.

Please enter your myWalden user name and password at the prompt.

Andress, M. (2001). CISSP. Scottsdale, AZ: The Coriolis Group, LLC.   NOTE:  this book is now out of print, and no longer available. Instead, please use this:

Stewart, James Michael, Ed Tittel, Mike Chapel. (2008)  CISSP: Certified Information Systems Security Professional Study Guide.  Wiley Publishing.

 Babbin, J., Kleiman, D., Carter (Skip), E. F., Jr., Faircloth, J., Burnett, M., & Gutierrez, E. (Ed.). (2006). Security log management: Identifying patterns in the chaos. Rockland, MA: Syngress Publishing, Inc.

Bradley, T., & Carvey, H. (2006). Essential computer security. Rockland, MA: Syngress Publishing, Inc.

Brown, C. L. T. (2006). Computer evidence: Collection and preservation. Hingham, MA: Charles River Media, Inc.

Cache, J., & Liu, V. (2007). Hacking exposed wireless: Wireless security secrets and solutions. New York: McGraw-Hill/Osborne.

Cole, E., Krutz, R. L., & Conley, J. W. (2005). Network security bible. Indianapolis , IN: Wiley Publishing, Inc.

Cross, M. (2007). Developer’s guide to Web application security. Rockland, MA: Syngress Publishing, Inc.

Long, J. (2005). Google hacking for penetration testers. Rockland, MA: Syngress Publishing, Inc.

Long, J., Bayles, A. W., Foster, J. C., Hurley, C., Liu, V., Petruzzi, M., et al. (2006). Penetration tester's open source toolkit. Rockland, MA: Syngress Publishing, Inc.

Preetham, V. V. (2002). Internet security and firewalls. Cincinnati, OH: Premier Press.

Prosise, C., & Mandia, K. (2003). Incident response and computer forensics (2nd ed.). New York: McGraw-Hill/Osborne.

Slade, Rob. (2006).  Dictionary of Information Security.  Rockland, MA:  Syngress Publishing.

Stewart, James Michael, Ed Tittel, Mike Chapel. (2008)  CISSP: Certified Information Systems Security Professional Study Guide.  Wiley Publishing.

Strebe, M. (2002). Network security jumpstart: Computer and network security basics. Alameda, CA: Sybex Inc.

Vacca, J. R. (2005). Computer forensics: Computer crime scene investigation (2nd ed.). Boston, MA: Charles River Media, Inc.

Warkentin, M., & Vaughn, R. B. (Eds.). (2006). Enterprise information systems assurance and system security: Managerial and technical issues. Hershey, PA: Idea Group Publishing.

Woodward, J. D., Jr., Orlans, N. M., & Higgins, P. T. (2003). Biometrics. Berkeley, CA: McGraw-Hill/Osborne.

Wyler, N. R. (Ed.). (2005). Aggressive network self-defense. Rockland, MA: Syngress Publishing, Inc.

Other Readings

Optional or supplemental readings may or may not be available in the library. Find further information about optional readings here.

If you have questions about your required course textbooks, please contact Customer Care at support@waldenu.edu