[BACARD 95]  

Andr‚ Bacard:

The Computer Privacy Handbook:

A practical guide to E-mail encryption, Data protection and PGP privacy software

Berkeley, Peachpit Press, 1995.

[BAKE 91]

R. H. Baker:

Computer Security Handbook

Mc Graw Hill, New York, 1991.

[BAKE 95]

R. H. Baker:

Network security. How to plan for it and achieve it

Mc Graw Hill, New York, 1995.

[BAMF 83]

J. Bamford:

The puzzle Palace

Pinguin Books, 1983.

[BATE 91]

R. J. Bud Bates:

Disaster Recovery Planning Networks,                                      Telecommunication and Data Communications McGraw-Hill, 1991.

[BAUE 95]

F. L. Bauer:

Entzifferte Geheimnisse: Methoden und Maximen der Kryptologie.

Springer – Verlag, Heidelberg, 1995.

[BECK 88]

Brian Beckett:

Introduction to Cryptology

Oxford: Blackwell Scientific Publication, 1988.

[BEK 82]

Henry Beker,

Fred Piper:

Cipher Systems: The Protection of Communications

New York, John Wiley & Sons, 1982.

 

[BENS 96]

R. L. Benson,

M. Warner (eds.):

Venona

Aegean Park Press,    1996.

[BETH 92]

Thomas Beth, M.Frish, G.J.Simmons eds.:

Public-Key Cryptography

State of the Art and Future Directions

Berlin, Springer-Verlag, 1992.

[BEUT 91]

A.     Beutelspacher, A. Kersten,

B.     A. Pfau:

Chipkarten als Sicherheitswerkzeug

Springer-Verlag, Heidelberg, 1991.

 

[BEUT 94]

A. Beutelspacher:

Cryptology

An Introduction to the Art and Science

of Enciphering, Encrypting 

Washington, The Mathematical Association of America, 1994.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

[BIHA 93]

Eli Biham,

Adi Shamir:

Differential Cryptanalysis of the Data Encryption Standard

Springer Verlag, Berlin 1993.

[BONE 99]

Dan Boneh:

Twenty years of attack on the RSA cryptosystem

Notices of the AMS, February 1999, 203-213.

[BORA 98]

S. Boran: 

IT Security Cookbook

Htttp://www.boran.ie./security/, 1998.

[BORO 95]

Boros és társai:

Rendészet, vagyonvédelem

BKKE –Közgazdasági Továbbképző Intézet, 1995.

[BRASS 88]

Gilles Brassard:

Modern Cryptology: A Tutorial

New York, Springer/Verlag, 1988.

[BUTL 94]

J. Butler:

Contingency Planning and Disaster Recovery Strategies  Computer Technology Research Corp., 1994.

[BUTL 95]

Janet G. Butler:

Enterprisewide Network Management

Computer Technology Research Corp., 1995.