Useful References
The Carleton library has a lot of material under category QA76.9. Articles on Security are published in several journals and conference proceedings. The most important ones include
  1. NETWORKS
  2. CRYPTOGRAPHY AND SECURITY
    1. Computer System and Network Security
      1. M. Bishop, Computer Security: Art and Science (Addison-Wesley, 2002). ISBN: 0-201-44099-7
      2. U. Black, Internet Security Protocols, Prentice Hall, 2000, ISBN: 0-13-014249-2
      3. L. Jean Camp, Trust and Risk in Internet Commerce, MIT Press, 2001.
      4. D. W. Davies and W. L. Price, Security for Computer Networks, John Wiley and Sons, 2nd edition, 1988.
      5. A. Perrig, J. D. Tygar, Secure Broadcast Communication in Wired and Wireless Networks, Kluwer Academic Publishers, 2003. ISBN: 0-7923-7650-1
      6. Pfleeger and Pfleeger, Security in Computing, third edition (Prentice Hall, 2002).
      7. Man Young Rhee, CDMA Cellular Mobile Communication Network Security, Prentice Hall, 1998. ISBN: 0-13598418-1
      8. A. Rubin, D. Geer, and M. Ranum, WEB Security Sourcebook, John Wiley and Sons, 1997.
      9. W. Stallings, NETWORK SECURITY ESSENTIALS: Applications and Standards, Prentice Hall, 1999, ISBN 0-13-016013-08.
      10. W. Stallings, CRYPTOGRAPHY AND NETWORK SECURITY: Principles and Practice, Prentice Hall, 1888, ISBN 0-13-86-9017-0.
    2. Cryptography
      1. E. Biham and A. Shamir, Differential Cryptanalysis of DES, Springer Verlag, 1993.
      2. Brands, S., Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy, MIT Press, 2000, ISBN 0-262-02491-8.
      3. J. Daemen, V. Rijmen, The Design of Rijndel: AES-The Advanced Encryption Standard, Springer, ISBN 3-540-42580-2
      4. H. Delfs, H. Knebl, Introduction to Cryptography: Priciples and Applications, Springer Verlag, 2002.
      5. A. J. Menezes, P. C. van Oorchoot, and S. A. Vanstone, Hanbook of Applied Cryptology CRC Press, 1996
      6. C. H. Meyer and S. M. Matyas, Cryptography: A New Dimension in Computer Security, John Wiley and Sons, 1982.
      7. A. Salomaa, Public-Key Cryptography, EATCS Monographs, Springer Verlag, 1990.
      8. B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley and Sons, 2nd Rev edition, 1996.
      9. D. Stinson, CRYPTOGRAPHY: Theory and Practice, CRC Press Inc., 1885, ISBN 0-8493-8521-0
    3. General/Applications
      1. J. Ashbourn, Biometrics: Advanced Identity Verification, Springer, 2000, ISBN: 1-85233-243-3.
      2. W. Rankl and W. Effing, Smartcard Handbook, John Wiley and Sons, 1997 (translated from the German).
      3. Contemporary Cryptology: The Science of Information Integrity, G. J. Simmons, ed., IEEE Press, 1992.
      4. Information Security: An Integrated Collection of Essays, IEEE Press, 1995.
    4. General/Historical Interest
      1. Aegean Park Press
      2. W. Diffie, and S. Landeau, Privacy on the Line: The Politics of Wiretapping and Encryption, MIT Press, 1998.
      3. F. L. Bauer, Decrypted Secrets: Methods and Maxims of Cryptology, Springer Verlag, 1997. This publisher has numerous classical books on Cryptology, intelligence, and Security
      4. P. Himanen, The Hacker Ethic, Random Haouse, New York, 2001. ISBN: 0-375-50566-0
      5. D. Kahn, The Codebreakers, Macmillan, New York, 1967.
      6. B. Schneier, Secrets and Lies: Digital Security in a Networked World, John Wiley and Sons, 2000, ISBN: 0471253111
      7. S. Singh, The Code Book, Doubleday, 1999.
      8. A. Sinkov, Elementary Cryptanalysis: A Mathematical Approach, MAA, New Mathematical Library, Vol 22, 1966, ISBN: 0-88385-622-0
      9. The history of Non-Secret Encryption
      10. The Alan Turing Home Page
  3. NUMBER THEORY
    1. Electronic Links
    2. Specialized
      1. S. Lang, Elliptic Functions, 2nd edition, Springer Verlag, 1986
      2. J. H. Silverman, The Arithmetic of Elliptic Curves, Springer Verlag, 1986.
    1. Elementary
      1. W. J. LeVeque, Elementary Theory of Numbers, Addison-Wesley, 1962.
      2. I. M. Vinogradov, Elements of Number Theory, Dover, 1954.
      3. Andre Weil, Number Theory for Beginners, Springer Verlag, 1979.
    2. Classical
      1. K. Ireland and M. Rosen, A Classical Introduction to Modern Number Theory, Springer Verlag, 1990, 2nd edition,
      2. W. Sierpinski, Elementary Theory of Numbers, North-Holland, PWN-Polish Scientific Publishers, 1988.
    3. Computational
      1. E. Bach and J. Shallit, Algorithmic Number Theory, Vol. 1: Efficient Algorithms, MIT Press, 1996.
      2. D. M. Bressoud, Factorization and Primality Testing, Springer Verlag, 1989.
      3. H. Cohen, A Course in Computational Number Theory, Springer Verlag, 1995.
      4. N. Koblitz, A Course in Elementary Number Theory and Cryptography, Springer Verlag, 1987.
      5. E. Kranakis, Primality and Cryptography, Wiley-Teubner, 1986.
      6. M. Pohst and H. Zassenhaus, Algorithmic Algebraic Number Theory, Cambridge University Press, 1989.
      7. D. Shanks, Solved and Unsolved Problems in Number Theory, Chelsea, 1976.
  4. ALGEBRA AND GROUP THEORY
    1. Classical
      1. M. H. Hall, The Theory of Groups, Chelsea Publ. Co., 1976.
      2. J. J. Rotman, The Theory of Groups: An Introduction, Allyn and Bacon, Boston, 3rd edition, 1984.
      3. B. L. van der Waerden, Algebra, Two Volumes, Frederick Ungar Publishing Co, New York 1970.
    2. Elementary
      1. M. A. Armstrong, Groups and Symmetry, Springer Verlag, 1988.
    3. C. R. Hadlock, Field Theory and Its Classical Problems, The Carus Mathematical Monographs, Vol. 19, MAA, 1978.
  5. ELECTRONIC POINTERS
    1. An Extensive searchable bibliography on Networks.
    2. Bibliography in Computer Science.
    3. Index of Cryptography Papers Available Online:
    4. CASIS: Canadian Association for Security and Information Studies
    5. Alta Vista Link to Cryptography.
    6. Cryptography Courses
    7. eCOMPANY: Security Technology
    8. Cryptography Resources
    9. An Extensive searchable bibliography on Networks, Cryptography and Security Sources
    10. Electronic Commerce
    11. ICAR
    12. List of Free Cryptolibraries
    13. SunSITE
    14. NIST
    15. The Security Portal for Information System Security Professionals
    16. Security Focus
    17. Security Portal
    18. DoS Attack Resources
    19. SANS Institute
    20. Packet Storm
    21. Internet Security Systems
    22. CONFERENCES IN NETWORK SECURITY
      1. ACM Conference on Computer and Communication Security (CCS)
      2. Network and Distributed System Security Symposium (NDSS).
      3. USENIX
    23. CONFERENCES
      1. CRYPTO, EUROCRYPT, ASIACRYPT, AUSCRYPT (Springer Verlag Proceedings)
      2. ESA: European Symposium on Algorithms
      3. FOCS: IEEE Symposium on Foundations of Computer Science
      4. ICALP: International Colloquium on Automata Languages and Programming
      5. SODA: Symposium on Discrete Algorithms
      6. STACS: Symposium on Theory and Aplications of Computer Science
      7. STOC: ACM Symposium on Theory of Computing
    24. JOURNALS
      1. Cryptologia
      2. Designs, Codes, and Cryptography
      3. IEEE Transactions on Computers, Information Theory, Networks, etc
      4. Information and Computation
      5. Journal of the ACM
      6. Journal of Computer Security
      7. Journal of Cryptology
      8. Proceedings of the IEEE
      9. SIAM Journal on Computing
    25. Special Issues
      1. Network Security, IEEE Computer, Vol 31, Number 8, Sepyember 1998.
      2. How Hackers Break In, Scientific American, October, 1998.