Ensuring Security and Privacy

Master's degree programme Leadership in Open Education (second cycle) / School of Engineering and Management

• Layton, T.P. (2007). Information Security: Design, Implementation, Measurement, and Compliance. Boca Raton, Auerbach publications, 2007.
• Bishop, M. (2003). Computer Security, Art and Science, AddisonaWesley, 2003. Pfleeger, C.F. E-version
• Kovačič, M. (2006). Nadzor in zasebnost v informacijski družbi : filozofski, sociološki, pravni in tehnični vidiki nadzora in zasebnosti na internetu. Fakulteta za družbene vede, 2006. E-version
• Schneier, B. (2003). Beyond Fear. Copernicus Books, 2003. Catalogue E-version
• Schneier, B. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W. W. Norton & Company, 2015. E-version
• Schneier, B. (2012). Liars and Outliers: Enabling the Trust that Society Needs to Thrive. Wiley, 2012. E-version