Categories: Uncategorized

For Sale: Deadbeat Ex-Housemate’s Cryptography and Security Books, $5 each

As I mentioned in the previous article — in which I announced that I had a Symbolics XL1200 Lisp Machine for sale — I also have a number of my deadbeat ex-housemate’s books. After having held onto them for five years in the expectation that I would send them to him once he paid me back, I have decided to sell his books.

All of them, regardless of original price, are going for five bucks apiece. If you live in Toronto, come pick ’em up (I live in the High Park area). If you need them shipped to you, you’ll have to cover shipping. All are in decent to good condition, all with their covers intact.

Want one? Want ’em all? Contact me at joey@joeydevilla.com.

It’s going to take me a while to catalogue all the books for sale, so I’m going to do them in installments. Here’s the first installment: books on cryptography and information security.

The Cryptography and Information Security Books

Among the books is a set of silver-and-red paperbacks of Lecture Notes in Computer Science. This set features proceedings from various information security and cryptography conferences in 1999, suitable for citations in you upcoming dissertation:

  • Lecture Notes in Computer Science 1560: Public Key Cryptography – Hideki Imai and Yulian Zheng (Eds.)

    Second International Workshop on Practice and Theory in Public Key Cryptography, PKC ’99, Kamakura, Japan, March 1999 – Proceedings [Paperback][Springer]

  • Lecture Notes in Computer Science 1648: Financial Cryptography – Matthew Franklin (Ed.)

    Third Internation Conference, FC ’99, Anguilla, British West Indies, February 1999 – Proceedings [Paperback][Springer]

  • Lecture Notes in Computer Science 1726: Information and Communication Security – Vijay Varadharajan and Yi Mu (Eds.)

    Second International Conference, ICICS ’99, Sydney, Australia, November 1999 – Proceedings [Paperback][Springer]

  • Lecture Notes in Computer Science 1729: Information Security – Masahiro Mambo and Yulian Zheng (Eds.)

    Second International Workshop, ISW ’99, Kuala Lumpur, Malaysia, November 1999 – Proceedings [Paperback][Springer]

  • Lecture Notes in Computer Science 1787: Information Security and Cryptology ICISC ’99 – JooSeok Song (Ed.)

    Second International Conference, Seoul, Korea, December 1999 – Proceedings [Paperback][Springer]

  • Lecture Notes in Computer Science 1796: Security Protocols – Bruce Christianson et. al. (Eds.)

    7th International Workshop, Cambridge, UK, April 1999, – Proceedings [Paperback][Springer]

There are also the following security books:

Intrusion Signatures and Analysis by Stephen Northcutt, Mark Cooper, Matt Fearnow and Karen Frederick [Paperback][New Riders 2001]

Network Intrusion Detection: An Analyst’s Handbook, Second Edition by Stephen Northcutt and Judy Novak [Paperback][New Riders 2001]

Modelling and Analysis of Security Protocols by Peter Ryan and Steve Schneider [Paperback][Pearson 2001]

Information Security Management Handbook, 4th Edition (here’s the Amazon link for the 5th edition) by Harold F. Tipton and Micki Krause (Eds.) [Hardcover][Auerbach 2000]

Cryptography Theory and Practice [First Edition] (here’s the Amazon link for the 2nd edition) by Douglas R. Stinson [Hardcover][CRC 1995]

Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy by Stefan A. Brands [Hardcover][MIT Press 2000]

Cryptography in C and C++ [First Edition] (here’s the Amazon link to the second edition) by Michael Welschenbach [Paperback][Apress 2001]

As I said earlier, if you want to buy any of these, contact me!

Joey deVilla

Recent Posts

Let the ritual humilation begin!

There’s a good chance you’ve seen this photo by now: Pictured seated from left to…

7 hours ago

Sunday picdump for November 17, 2024

Here’s a collection of interesting memes, pictures, an cartoons floating around the internet that I…

2 days ago

U.S. post-election post #7: Don’t worry, it’ll trickle down…

Tap to see the source. This is yesterday’s daily New Yorker cartoon, created by Brendan…

7 days ago

U.S. post-election post #6: One key election is still undecided…

C’mon, let it not be Asians this time. Last time was pretty bad. Here’s the…

1 week ago

U.S. post-election post #5: Come bend the arc with me!

Jon Stewart’s right, and we’ve been here before. Where we are now, I’ve been before…

1 week ago

Veteran’s Day, Remembrance Day, and “In Flanders Fields”

Poppies thrive in overturned soil, which is why they bloom in battlefields. I’m in the…

1 week ago