Securing the Campus: Books, Websites, Whitepapers, Webinars

Resources for physical and data security on higher ed campuses

The following books, websites, whitepapers, and webinars are all geared to assist you in your quest to devise truly actionable plans for strategically sound protection of the campus, its community, and its information assets.

Books

Physical Security

  • Crime Prevention Through Environmental Design by Timothy Crowe ( Butterworth-Heinemann, 2000)
  • Critical Infrastructure: Homeland Security and Emergency Preparedness by Robert Radvanovsky ( CRC Press, 2006)
  • Homeland Security: A Complete Guide to Understanding, Preventing, and Surviving Terrorism by Mark Sauter and James Jay Carafano ( McGraw-Hill, 2005)
  • Homeland Security Field Guide by Jan Glarum and Eric Swanson ( Informed Publishing, 2006)
  • Homeland Security Law and Policy by William C. Nicholson and Joseph Biden (C. C. Thomas, 2005)
  • Introduction to Homeland Security by Jane Bullock and George Haddow ( Butterworth-Heinemann, 2006)
  • National Strategy for Homeland Security by the Office of Homeland Security (Pavilion Press, 2004)
  • Safe Schools: A Security and Loss Prevention Plan by J. Barry Hylton ( Butterworth-Heinemann, 1996)
  • Security Planning and Design: A Guide for Architects and Building Design Professionals by the American Institute of Architects (Wiley, 2003)
  • Terrorism and Disaster, Volume 11: New Threats, New Ideas by Lee Clarke, ed. ( JAI Press, 2003)
  • Terrorism, Risk, and the City: The Making of a Contemporary Urban Landscape by Jon Coaffee ( Ashgate Publishing, 2003)

Data Security

  • The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick, William L. Simon, and Steve Wozniak (Wiley, 2002)
  • Building Internet Firewalls by Elizabeth D. Zwicky, Simon Cooper, and D. Brent Chapman (O’Reilly Media, 2000)
  • Building Secure Wireless Networks With 802.11 by Jahanzeb Khan and Anis Khwaja ( Wiley, 2003)
  • Computer Security Handbook by Seymour Bosworth and Michel E. Kabay, eds. (Wiley, 2002)
  • The Executive Guide to Information Security: Threats, Challenges, and Solutions by Mark Egan and Tim Mather (Addison-Wesley Professional, 2004)
  • Firewalls and Internet Security: Repelling the Wily Hacker by William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin (Addison-Wesley Professional, 2003)
  • Hacker’s Challenge 3 by David Pollino, Bill Pennington, Tony Bradley, and Himanshu Dwivedi (McGraw-Hill Osborne Media, 2006)
  • Halting the Hacker: A Practical Guide to Computer Security by Donald L. Pipkin (Prentice Hall PTR, 2002)
  • Incident Response: Computer Forensics Toolkit by Douglas Schweitzer (Wiley, 2003)
  • Information Security Management Handbook by Harold F. Tipton and Micki Krause, eds. (Auerbach, 2007)
  • Internet and Intranet Security by Rolf Oppliger (Artech House Publishers, 2006)
  • Malware: Fighting Malicious Code by Ed Skoudis and Lenny Zeltser (Prentice Hall PTR, 2003)
  • Network Intrusion Detection: An Analyst’s Handbook by Stephen Northcutt and Judy Novak (New Riders Publishing, 2000)
  • Practical Unix and Internet Security by Simson Garfinkel, Gene Spafford, and Alan Schwartz (O’Reilly Media, 2003)
  • Real World Linux Security by Bob Toxen (Prentice Hall PTR, 2002)
  • Security and Loss Prevention by Philip Purpura (Butterworth-Heinemann, 2002)
  • Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks by Michal Zalewski ( No Starch Press, 2005)
  • Web Hacking: Attacks and Defense by Stuart McClure, Saumil Shah, and Shreeraj Shah (Addison-Wesley Professional, 2002)
  • Web Security, Privacy, and Commerce by Simson Garfinkel (O’Reilly Media, 2002)

Websites/Organizations

Physical Security

Information Security

White Papers/Articles

Physical Security

Data Security

Plus, don’t miss these white papers at www.campustechnology.com:

On-Demand Webinars

Physical Security

Data Security

Plus, don’t miss these webinars at www.campustechnology.com:

Featured

  • student reading a book with a brain, a protective hand, a computer monitor showing education icons, gears, and leaves

    4 Steps to Responsible AI Implementation

    Researchers at the University of Kansas Center for Innovation, Design & Digital Learning (CIDDL) have published a new framework for the responsible implementation of artificial intelligence at all levels of education.

  • glowing digital brain interacts with an open book, with stacks of books beside it

    Federal Court Rules AI Training with Copyrighted Books Fair Use

    A federal judge ruled this week that artificial intelligence company Anthropic did not violate copyright law when it used copyrighted books to train its Claude chatbot without author consent, but ordered the company to face trial on allegations it used pirated versions of the books.

  • server racks, a human head with a microchip, data pipes, cloud storage, and analytical symbols

    OpenAI, Oracle Expand AI Infrastructure Partnership

    OpenAI and Oracle have announced they will develop an additional 4.5 gigawatts of data center capacity, expanding their artificial intelligence infrastructure partnership as part of the Stargate Project, a joint venture among OpenAI, Oracle, and Japan's SoftBank Group that aims to deploy 10 gigawatts of computing capacity over four years.

  • laptop displaying a phishing email icon inside a browser window on the screen

    Phishing Campaign Targets ED Grant Portal

    Threat researchers at cybersecurity company BforeAI have identified a phishing campaign spoofing the U.S. Department of Education's G5 grant management portal.