Note: These books are available online through the Ohio Library. How you access each book will vary:
For O'Reilly I will list the URL of the book on the O'Reilly (formerly Safari) web site. Before you access an O'Reilly title for the first time, please go to these instructions provided by the library. Once you get the initial access via your email, I encourage you to create an account on the site (it is free) - that makes subsequent access much faster. Remember that this is not you Ohio ID - use a different password at least.
Books published by Springer seem a bit easier. I will list them with a link leading to the Library record in ALICE which will have links for both on-campus and off-campus access. Here you do simply use your Ohio ID
Andress, Jason. Foundations of Information Security: A Straightforward Introduction. San Francisco, CA: No Starch Press, 2019. https://learning.oreilly.com/library/view/foundations-of-information/9781098122546/.
Chapple, Mike, James Michael Stewart, and Darril Gibson. n.d. ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, 10th Edition. Accessed August 19, 2025. https://learning.oreilly.com/library/view/isc2-cissp-certified/9781394254699/.
Dooley, John. History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms. History of Computing, 2nd Edition. Switzerland: Springer, 2024.
https://ebooks-ohiolink-edu.proxy.library.ohio.edu/content/703f5068-9407-11ef-ac30-0a9b31268bf5
Duplys, Paul, and Roland Schmitz. TLS Cryptography In-Depth. Accessed October 5, 2024. https://learning.oreilly.com/library/view/tls-cryptography-in-depth/9781804611951/.
Caramouche, James Henry. IPsec Virtual Private Network Fundamentals. Accessed November 5, 2024. https://learning.oreilly.com/library/view/ipsec-virtual-private/1587052075/.
Tiller, James. 2017. A Technical Guide to IPSec Virtual Private Networks. Auerbach Publications. https://learning.oreilly.com/library/view/a-technical-guide/9780203997499/.
Desmond, Brian, Joe Richards, Robbie Allen, and Alistair Lowe-Norris. n.d. Active Directory, 5th Edition. Accessed April 5, 2022. https://learning.oreilly.com/library/view/active-directory-5th/9781449361211/.
Note that these RFCs, while current, have been updated by a number of newer RFCs that among other things update acceptable hash functions and encryption methods.
Lonvick, Chris M., and Tatu Ylonen. 2006. The Secure Shell (SSH) Protocol Architecture. Request for Comments RFC 4251. Internet Engineering Task Force. https://doi.org/10.17487/RFC4251.
Lonvick, Chris M., and Tatu Ylonen. 2006. The Secure Shell (SSH) Authentication Protocol. Request for Comments RFC 4252. Internet Engineering Task Force. https://doi.org/10.17487/RFC4252.
Lonvick, Chris M., and Tatu Ylonen. 2006. The Secure Shell (SSH) Transport Layer Protocol. Request for Comments RFC 4253. Internet Engineering Task Force. https://doi.org/10.17487/RFC4253.
Lonvick, Chris M., and Tatu Ylonen. 2006. The Secure Shell (SSH) Connection Protocol. Request for Comments RFC 4254. Internet Engineering Task Force. https://doi.org/10.17487/RFC4254.
Rescorla, Eric. “The Transport Layer Security (TLS) Protocol Version 1.3.” Request for Comments. Internet Engineering Task Force, August 2018. https://doi.org/10.17487/RFC8446.
Microsoft Windows "Schannel" TLS Registry settings
https://learn.microsoft.com/en-us/windows-server/security/tls/tls-registry-settings?tabs=diffie-hellman
Windows 11 v22H2 and later TLS Cipher Suites
https://learn.microsoft.com/en-us/windows/win32/secauthn/tls-cipher-suites-in-windows-11-v22h2
Schinazi, David, and Tommy Pauly. 2017. Happy Eyeballs Version 2: Better Connectivity Using Concurrency. Request for Comments RFC 8305. Internet Engineering Task Force. https://doi.org/10.17487/RFC8305.
Thomson, Martin, and Cory Benfield. 2022. HTTP/2. Request for Comments RFC 9113. Internet Engineering Task Force. https://doi.org/10.17487/RFC9113.
Bishop, Mike. 2022. HTTP/3. Request for Comments RFC 9114. Internet Engineering Task Force. https://doi.org/10.17487/RFC9114.
Iyengar, Jana, and Martin Thomson. 2021. QUIC: A UDP-Based Multiplexed and Secure Transport. Request for Comments RFC 9000. Internet Engineering Task Force. https://doi.org/10.17487/RFC9000.
Thomson, Martin, and Sean Turner. 2021. Using TLS to Secure QUIC. Request for Comments RFC 9001. Internet Engineering Task Force. https://doi.org/10.17487/RFC9001.
“HTTP/3 Check.” n.d. Accessed October 13, 2025. https://http3check.net/.
“IPsec VPNs vs. SSL VPNs.” n.d. Accessed November 2, 2025. https://www.cloudflare.com/learning/network-layer/ipsec-vs-ssl-vpn/.
“OpenVPN Community Documentation.” n.d. Accessed November 2, 2025. https://openvpn.net/community-docs/index.html?lang=en.
Palo Alto Networks. n.d. “SSL VPN vs. IPSec: What Are the Differences?” Accessed November 2, 2025. https://www.paloaltonetworks.com/cyberpedia/ipsec-vs-ssl-vpn.
IPsec vs TLS: What Are the Differences - wolfSSL. 2025. Uncategorized. February 12. https://www.wolfssl.com/ipsec-vs-tls-what-are-the-differences/.
Description of the NIST Series Publications
NIST SP 800-63 Digital Identity Guidelines (Links to the four volumes)
NIST FIPS 186-5 Digital Signature Standard (DSS)
https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-5.pdf
Dang, Quynh H. 2015. “Secure Hash Standard.” NIST FIPS 180-4. National Institute of Standards and Technology.
https://doi.org/10.6028/NIST.FIPS.180-4.
The "openssl" command is not terribly well documented. The resources below should help to get you started.
Viega, John, Matt Messier, and Pravir Chandra. 2002. Network Security with OpenSSL. https://learning.oreilly.com/library/view/network-security-with/059600270X/.
262588213843476. n.d. “OpenSSL Cheatsheet.” Gist. Accessed March 30, 2022. https://gist.github.com/davewongillies/7050080.
“OpenSSL Command Cheatsheet.” 2018. FreeCodeCamp.Org. January 10, 2018. https://www.freecodecamp.org/news/openssl-command-cheatsheet-b441be1e8c4a/.
“OpenSSL Commands Cheat Sheet: The Most Useful Commands.” 2018. Hashed Out by The SSL StoreTM (blog). May 1, 2018. https://www.thesslstore.com/blog/openssl-commands-cheat-sheet/.
Hardt, Dick. 2012. “The OAuth 2.0 Authorization Framework.” Request for Comments RFC 6749. Internet Engineering Task Force. https://doi.org/10.17487/RFC6749.
Moriarty, Kathleen, Magnus Nystrom, Sean Parkinson, Aneas Rusch, and Michael Scott. 2014. “PKCS #12: Personal Information Exchange Syntax v1.1.” Request for Comments RFC 7292. Internet Engineering Task Force. https://doi.org/10.17487/RFC7292.
“OAuth 2.0 Playground.” n.d. Accessed April 13, 2022. https://www.oauth.com/playground/.
“Authentication.” 2022. Twitch Developers. April 12, 2022. https://dev.twitch.tv/authentication/.
Ruane, J., Kiesow, E., Galatsanos, J., Dukatz, C., Blomquist, E., Shukla, P., “The Quantum Index Report 2025”, MIT Initiative on the Digital Economy, Massachusetts Institute of Technology, Cambridge, MA, May 2025. (https://qir.mit.edu/)
Keumars Afifi-Sabet. 2025. “IBM Unveils Two New Quantum Processors — Including One That Offers a Blueprint for Fault-Tolerant Quantum Computing by 2029.” Live Science, November 14. https://www.livescience.com/technology/computing/ibm-unveils-two-new-quantum-processors-including-one-that-offers-a-blueprint-for-fault-tolerant-quantum-computing-by-2029.
Dargan, James. 2025. “Quantum Computing Companies in 2025 (76 Major Players).” The Quantum Insider, September 23. https://thequantuminsider.com/2025/09/23/top-quantum-computing-companies/.
Programming Quantum Computers. n.d. Accessed November 15, 2025. https://learning.oreilly.com/library/view/programming-quantum-computers/9781492039679/.
“Code Engine - Programming Quantum Computers.” n.d. Accessed November 17, 2025. https://oreilly-qc.github.io/#.
Amazon Web Services, Inc. n.d. “Cloud Quantum Computing Service - Amazon Braket - AWS.” Accessed November 17, 2025. https://aws.amazon.com/braket/.
Boeyen, Sharon, Stefan Santesson, Tim Polk, Russ Housley, Stephen Farrell, and David Cooper. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Request for Comments RFC 5280. Internet Engineering Task Force. https://doi.org/10.17487/RFC5280.
Barnes, Richard, Jacob Hoffman-Andrews, Daniel McCarney, and James Kasten. 2019. Automatic Certificate Management Environment (ACME). Request for Comments RFC 8555. Internet Engineering Task Force. https://doi.org/10.17487/RFC8555.
Moriarty, Kathleen, Burt Kaliski, Jakob Jonsson, and Aneas Rusch. 2016. PKCS #1: RSA Cryptography Specifications Version 2.2. Request for Comments RFC 8017. Internet Engineering Task Force. https://doi.org/10.17487/RFC8017.
Neuman, C., S. Hartman, and K. Raeburn. n.d. “Rfc4120.” The Kerberos Network Authentication Service (V5). Accessed January 6, 2022. https://datatracker.ietf.org/doc/html/rfc4120.
Frankel, Sheila, and Suresh Krishnan. 2011. “IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap.” Request for Comments RFC 6071. Internet Engineering Task Force. https://doi.org/10.17487/RFC6071.
Seo, Karen, and Stephen Kent. “Security Architecture for the Internet Protocol.” Request for Comments. Internet Engineering Task Force, December 2005. https://doi.org/10.17487/RFC4301.
Eronen, Pasi, Yoav Nir, Paul E. Hoffman, and Charlie Kaufman. 2010. “Internet Key Exchange Protocol Version 2 (IKEv2).” Request for Comments RFC 5996. Internet Engineering Task Force. https://doi.org/10.17487/RFC5996.
Vollbrecht, John, James D. Carlson, Larry Blunk, Bernard D. Aboba, and Henrik Levkowetz. 2004. “Extensible Authentication Protocol (EAP).” Request for Comments RFC 3748. Internet Engineering Task Force. https://doi.org/10.17487/RFC3748.
Santesson, Stefan, Michael Myers, Rich Ankney, Ambarish Malpani, Slava Galperin, and Carlisle Adams. 2013. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. Request for Comments RFC 6960. Internet Engineering Task Force. https://doi.org/10.17487/RFC6960.
Project, The People of the GnuPG. 2021. “The GNU Privacy Guard.” The GnuPG Project. October 13, 2021. https://gnupg.org/.
“Index - GnuPG Wiki.” n.d. Accessed February 27, 2022. https://wiki.gnupg.org/Index.
262588213843476. n.d. “Signing Someone’s GPG Key.” Gist. Accessed February 27, 2022. https://gist.github.com/F21/b0e8c62c49dfab267ff1d0c6af39ab84.
“Tools 4 Noobs - Tools You Didn’t Even Know You Needed.” n.d. Accessed January 12, 2022. https://www.tools4noobs.com/.
Hash functions, encryption, and decryption demos
NIST COMPUTER SECURITY RESOURCE CENTER - https://csrc.nist.gov/publications
Neuman, Clifford, Sam Hartman, Kenneth Raeburn, and Taylor Yu. 2005. “The Kerberos Network Authentication Service (V5).” Request for Comments RFC 4120. Internet Engineering Task Force. https://doi.org/10.17487/RFC4120.
“Kerberos: The Network Authentication Protocol.” n.d. Accessed January 6, 2022. https://web.mit.edu/kerberos/.
JasonGerend. n.d. “Kerberos Authentication Overview.” Accessed January 6, 2022. https://docs.microsoft.com/en-us/windows-server/security/kerberos/kerberos-authentication-overview.
“Implementation of Diffie-Hellman Algorithm.” 2017. GeeksforGeeks (blog). June 24, 2017. https://www.geeksforgeeks.org/implementation-diffie-hellman-algorithm/.
daveba. n.d. “Active Directory Domain Services.” Accessed April 6, 2022. https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/active-directory-domain-services.