TeSSA [suomeksi] | Internal | Publications | Links | Contact | Jory
Books
- Java
- Security and crypto
- Usability
- Social theory
- Other
- Proceedings
Java
- Justin Couch: Java2 Networking
- Published 1999
- McGraw-Hill Companies, Inc
- ISBN 0-07-134813-1
- Acquired 31.5.1999
- David M. Geary: Graphic Java 2 - Mastering the JFC
- 3rd Edition
- Volume II Swing
- Published 1999
- Sun Microsystems Press - A Prentice Hall Title
- ISBN 0-13-079667-0
- Acquired 31.5.1999
- Rob Gordon: Essential JNI Java native interface
- Published 1998
- Prentice-Hall, Inc.
- ISBN 0-13-679895-0
- Acquired 29.6.1999
- Mark Grand: Patterns in Java - volume 1
- Published 1998
- John Wiley & Sons, Inc
- ISBN 0-471-25839-3
- Acquired 27.7.1999
- Mark Grand: Patterns in Java - volume 2
- Published 1999
- John Wiley & Sons, Inc
- ISBN 0-471-25841-5
- Acquired 31.5.1999
- Gary McGrad, Edward W. Felten: Securing Java
- 2nd Ed.
- Published 1999
- John Wiley & Sons, Inc
- ISBN 0-471-31952-X
- Acquired 31.5.1999
- Cay S. Horstmann, Gary Cornell: Core Java 2 Volume I - Fundamentals
- Published 1999
- Sun Microsystems Press - A Prentice Hall Title
- ISBN 0-13-081933-6
- Acquired 29.6.1999
- Jonathan Knudsen: Java Cryptography
- First Edition
- Published 1998
- O'Reilly & Associates, Inc
- ISBN 1-56592-402-9
- Acquired 31.5.1999
- Marco Pistoia, Duane F. Reller, Deepak Gupta, Milind Nagnur, Ashok K. Ramani: Java 2: network security
- Second Edition
- Published 1999
- Prentice Hall
- ISBN 0-13-015592-6
- Acquired 7.9.1999
- Nigel Warren, Philip Bishop: Java in Practice, Design Styles and idioms for Effective Java
- Published 1999
- Addison Wesley Longman Limited
- ISBN 0-201-36065-9
- Acquired 27.7.1999
- Mark Allen Weiss: Data Structures & Algorithm Analysis In Java
- Published 1999
- Addison Wesley Longman, Inc
- ISBN 0-201-35754-2
- Acquired 31.5.1999
Security
- James Bamford: The Puzzle Palace
- Published 1983
- Penguin Books
- ISBN 0-14-006748-5
- Acquired 7.9.1999
- I.F. Blake, G. Seroussi, N P. Smart: Elliptic curves in cryptography
- Published 1999
- Cambridge University Press
- ISBN 0-521-65374-6
- Acquired 21.9.1999
- Stefan A. Brands: Rethinking Public Key Infrastructures and Digital Certificates. Building in Privacy
- Published 2000
- The MIT Press, Cambridge Massachusetts/ London England
- ISBN 0-262-02491-8
- Acquired May 2001
- Andreas Enge: Elliptic curves and their applications to cryptography, an introduction
- Published 1999
- Kluwer Academic publishers
- ISBN 0-7923-8589-6
- Acquired 1.2.2000
- Jalal Feghhi, Jalil Feghhi, Peter Williams: Digital Certificates, Applied Internet Security
- Published 1999
- Addison Wessley Longman, Inc.
- ISBN 0-201-30980-7
- Acquired 7.9.1999
- Simson Garfinkel: Database Nation
- Published 2000
- O'Reilly
- ISBN 1-56591-653-6
- Acquired 8.1.2001
- Dieter Gollmann: Computer Security
- Published 1999
- John Wiley & Sons
- ISBN 0-471-97844-2
- Acquired 25.2.2000
- Stefan Katzenbeisser, Fabien A. P. Petitcolas (editors): Information hiding: techniques for steganography and digital watermarking
- Published 2000
- arteck house, inc.
- ISBN 1-58053-035-4
- Acquired 8.2.2000
- Esa Kerttula: Tietoverkkojen tietoturva
- Published 1998
- Edita - Liikenneministeriö
- ISBN 951-37-2672-X
- Acquired 31.5.1999
- Micki Krause, Harold F. Tipton: Handbook of Information Security Management 1999
- Published 1999
- CRC Oress, Auerbach
- ISBN 1-8493-9974-2
- Acquired 7.9.1999
- Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone: Handbook of applied cryptography
- Published 1997
- CPC Press
- ISBN 0-8493-8523-7
- Acquired 12.10.1999
- Richard Power: Tangled Web
- Published 2000
- QUE Corporation (A Division of Macmillan USA)
- ISBN 0-7897-2443-x
- 8.1.2001
- Michael Rosing: Implementing Elliptic Curve Cryptography
- Published 1999
- Manning Publications Co.
- ISBN 1-884777-69-4
- Acquired 29.6.1999
- Bruce Schneier: Applied cryptography, Protocols, Algorithms, and Source Code in C
- Second edition
- Published 1996
- John Wiley & Sons, Inc.
- ISBN 0-471-11709-9
- Acquired 12.10.1999
- Bruce Schneier: Secrets and lies
- published 2000
- John Wiley
- ISBN 0-471-25311-1
- Acquired 8.1.2001
- Bruce Schneier, David Banisar: The Electronic Privacy Papers
- Published 1997
- John Wiley & Sons, Inc
- ISBN 0-471-12297-1
- Acquired 7.9.1999
- Simon Singh: The Code Book, the evolution of secrecy from Mary Queen of Scts to Quantum Cryptography
- Published 1999
- Doubleday a division of Random House, Inc
- ISBN 0-385-49531-5
- Acquired 25.2.2000
Usability and design
- Hugh Beyer, Karen Holtzblatt: Contextual Design Defining Customer-Centered Systems
- Published 1998
- Morgan Kaufmann Publishers, Inc.
- ISBN1-55860-411-1
- Acquired 18.6.1999
- Stuart K. Card, Jock D. Mackinlay, Ben Shneiderman: Readings in Information Visualization using vision to think
- Published 1999
- Morgan Kaufmann Publishers, Inc.
- ISBN 1-55860-533-9
- Acquired 18.6.1999
- Alan Cooper: The Inmates are Running the Asylum. Why Hish-Tech Products Drive Us Crazy and How to Restore the Sanity
- Published 1999
- SAMS, Macmillan Computer Publishing, Indiana
- ISBN 0-672-31649-8
- Acquired May 2001
- Donald L. Day and Diane K. Kovach (eds.): Computers, Communication and Mental Models
- Published 1996
- Taylor & Francis Ltd
- ISBN 0-7484-0543-7
- Acquired 12.10.1999
- JoAnn T. Hackos, Janice C. Redish: User and Task Analysis for Interface Design
- Published 1998
- John Wiley & Sons, Inc
- ISBN0-471-17831-4
- Acquired 16.6.1999
- Brenda Laurel: Computers as Theatre
- Published 1992/2000
- Addison-Wesley Publishing Company
- ISBN 0-201-55060-1
- Acquired 2000
- Jacob Nielsen: Designing Web Usability
- Published 1999
- New Riders Publishing
- ISBN 1-56205-810-X
- Acquired 3.5.2000
- Jacob Nielsen: Usability engineering
- Published 1993
- ISBN 0-12-518506-9
- Morgan Kaufmann , Academic Press
- Acquired 26.9.2000
- Donald A. Norman: The Design of Everyday Things
- Published 1990
- Bantam Doubleday Dell Publishing Group, Inc
- ISBN 0-385-26774-6
- Acquired 16.6.1999
- Jenny Preece (ed.): Human-Computer Interaction
- Published 1994
- Addison-Wesley Longman Limited
- ISBN 0-201-62769-8
- Acquired 16.6.1999
- Jenny Preece: Online Communities. Designing Usability, Supporting Sociability
- Published 2000/2001
- Wiley & Sons Ltd
- ISBN 0-471-80599-8
- Acquired May 2001
- Byron Reeves and Clifford Nass: The Media Equation. How People Treat Computers, Television, and New Media Like Real People and Places
- Published 1998
- ISBN 1-57586-053-8
- Cambridge University Press
- Acquired 2000
- Nathan Shedroff: Experience Design 1
- Published 2001
- New Riders, Indiana
- ISBN 0-7357-1078-3
- Acquired May 2001
- Ben Shneiderman: Designing the User Interface: Strategies for Effective Human-Computer Interaction
- 3rd Edition
- Published 1998
- Addisson Wesley Longman, Inc
- ISBN 0-201-69497-2
- Acquired 18.6.1999
- Dennis Wixon, Judith Ramey: Field Methods Casebook for Software Design
- Published 1996
- John Wiley & Sons, Inc
- ISBN 0-471-14967-5
- Acquired 16.6.1999
Social theory
- David Boucher and Paul Kelly (eds.): The Social Contract from Hobbes to Rawls.
- published 1994
- Routledge, London
- ISBN 0-415-10846-2
- Acquired 2000
- Manuel Castells: The Information Age 1-3
- published 2000
- Blackwell
- ISBN 0-631-22139-5, 0-631-22140-9, 1-557-86874-3
- Acquired 2000
- Francis Fukuyama: Trust. The Social Virtues and the Creation of Prosperity
- published 1995/1996
- Free Press Paperbacks, Simon & Schuster, New York
- ISBN 0-684-82525-2
- Acquired May, 2001
- Christopher W. Morris (ed.): The Social Contract Theorists. Critical Essays on Hobbes, Locke, and Rousseau
- Published 1999
- ISBN 0-8476-8907-7
- Rowman & Littlefield Publishers, Inc
- Acquired 2000
- Rousseau, Jean-Jacques: The Social Contract
- published 1994
- ISBN
- Acquired 2000
- John R. Searle: The Construction of Social Reality
- Published 1995
- ISBN 0-14-023590-6
- Penguin Books, England
- Acquired 2000
Other
- Morton Benson, Evelyn Benson, Robert Ilson: The BBI Dictionary of Englis7h Word Combinations
- Published 1997
- John Benjamins Publishing Company
- ISBN 90 272 2166 9 (eur)/ 1-55619-520-6 (us)
- Acquired 29.2.2000
- Morton Benson, Evelyn Benson, Robert Ilson, Richard Young: Using the BBI
- Published 1991
- John Benjamins Publishing Company
- ISBN 90 272 2068 9 (eur)/ 1-55619-094-8 (us)
- William J. Brown, Raphael C. Malveau, Hays W. "Skip" MsCormick III, Thomas J Mowbray
- Anti Patterns Refactoring Software, Architectures, and Projects in Crisis
- Published 1998
- John Wiley & Sons, Inc
- ISBN 0-471-19713-0
- Acquired 29.6.1999
- Raija Hurme, Riitta-Leena Malin, Olli Syväoja: uusi suomi-englanti suursanakirja
- Published 1998
- wsoy
- ISBN 951-0-18435-7
- Acquired 25.2.2000
- Raija Hurme, Maritta Pesonen, Olli Syväoja: englanti-suomi suursanakirja
- Published 1998
- wsoy
- ISBN 951-0-18434-9
- Acquired 25.2.2000
- Irja ja Mikko Mattila: Lukion englannin kielioppi
- Published 1997
- otava
- ISBN 951-1-07185-8
- Acquired 25.2.2000
- Erich Gamma, Richard Helm, Ralph Johnson, John Vlissides: Design Patters, Elements of Reuasble Object-Oriented Software
- Published 1995
- Addison-Wesley Publishing Company
- ISBN 0-201-63361-2
- Acquired 12.10.1999
- Goossens, Mittelbach, Samarin: The LaTeX Companion
- Published 1994
- Addison Wesley
- ISBN 0-201-54199-8
- Acquired 21.3.2000
- Mark Herkommer: Number Theory: a programmer's guide
- Published 1999
- McGraw-Hill
- ISBN 0-07-913074-7
- Acquired 25.2.2000
- Uwe Hansmann, Martin S. Nicklous, Thomas Schäck, Frank Seliger: Smart Card Application Development Using Java
- include an IBM smart card
- published 2000
- Springer
- ISBN 3-540-65829-7
- Acquired 16.6.2000
- Robert Eckstein, David Collier-Brown, Peter Kelly: Using Samba
- include cd
- published 2000
- O'Reilly
- ISBN 1-56592-449-5
- Acquired 16.6.2000
- Martin Fowler (with Kendall Scott): UML Distilled 2nd ed.
- published 1999
- Addison-Wesley
- 0-201-65783-X
- Acquired 8.1.2001
Proceedings
- Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard'99), May 10-11, 1999, Chigago, Illinois, USA
- Published 1999
- USENIX Association
- ISBN 1-880446-34-0
- Acquired 7.9.1999
- Proceedings of the 9th USENIX Security Symposium, Denver, Colorado, USA, August 14-17, 2000
- Published 2000
- USENIX Association
- ISBN 1-880446-18-9
- Acquired 13.9.2000
- Proceedings of the Eighth USENIX Security Symposium (Security'99), August 23-26, 1999, Washington, D.C., USA
- Published 1999
- USENIX Association
- ISBN 1-880446-28-6
- Acquired 7.9.1999
- Proceedings of the Seventh USENIX Security Symposium, January 26-29, 1998, SanAntonio, Texas
- Published 1998
- USENIX Association
- ISBN 1-880446-92-8
- Acquired 7.9.1999
- The Sixth USENIX Security Symposium Proceedings
- Published 1996
- USENIX Association
- ISBN 1-880446-79-0
- Acquired 10.12.1999
- Proceedings of the 3rd USENIX Workshop on Electronic Commerce, August 31-September 3, 1998, Boston, Massachusetts
- Published 1998
- USENIX Association
- ISBN 1-880446-97-9
- Acquired 7.9.1999
- Hideki Imai, Yuliang Zheng (eds.) Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98. Pacifico Yokohama, Japan, February 1998
- Published 1998
- Springer
- ISBN 3-540-64693-0
- Acquired 7.9.1999
- Internet society: proceedings of network and distributed system security symposium 2000
- Published 2000
- Internet Society
- ISBN 1-891562-07-X
- Acquired 2.2.2000
- Internet society: proceedings of network and distributed system security symposium 2000 - cd-rom
- Published 2000
- Internet Society
- ISBN 1-891562-08-8
- Acquired 2.2.2000
- Josep Domingo-Ferrer, David Chan, Anthony Watson (eds.): Smart card research and advanced applications
- Published 2000
- IFIP, Kluver Academic Publishers
- ISBN 0-7923-7953-5
- Acquired 1.10.2000
- Proceedings of the 7th ACM Conference on Computer and Communications Security CCS 2000
- Published 2000
- ACM Press
- ISBN 1-58113-203-4
- Acquired 1.11.2000
- Have NOT BEEN in the CS-library!!
This page is maintained by TeSSA, Email: tessa-int@tml.hut.fi (26-4-2001).
URL: http://www.tml.hut.fi/Research/TeSSA/Internal/books.html