In Association with The Process of Network Security by Thomas Wadlow. Targeting this work at computer/network security administrator at a reasonably large organization (described as an organization that finds it necessary to have a security team), Wadlow covers such topics as the nature of computer attacks, setting security goals, creating security network designs, team building, fortifying network components, implementing personnel security, monitoring networks, discovering and handling attacks, and dealing with law enforcement authorities.
-- Book News, Inc., Portland, OR.

Memory Resident Programming on the IBM PC by Thomas Wadlow. A tutorial on writing Terminate and Stay Resident assembly language programs. The technology itself is now obsolete, but the book serves as a great lesson on how to program, especially in those cases where you are working at a very low level. This book has been used as a textbook in several university-level courses. Out of print, the book continues to sell on the used market, and often commands a higher price now than it did when new.

Who Must You Trust?. You must have some trust if you want to get anything done. But how to do so safely and wisely? Originally published in ACM Queue, May 30, 2014 and a shortened version in Communications of the ACM, July 2014.

The Answer is 42, of Course. If you want your networks to be sufficiently secure, you've got to ask the right questions. Originally published in the June 2005 Security issue of ACM Queue Magazine from the venerable and respected Association for Computing Machinery. Thomas Wadlow was the guest expert and advisor to the editorial board for that issue. Founded in 1947, ACM is a major force in advancing the skills of information technology professionals and students worldwide.

Criminal Code. How do the bad guys think and live? ACM Queue's first-ever narrative chronicles one man's transition from small-time hacker to big-time crook. Published in the November 2006 issue.

Security in the Browser. Web browsers leave users vulnerable to an ever-growing number of attacks. What can be done to make them secure while preserving their usability? Published in the February 2009 issue of ACM Queue Magazine.

The Xerox Alto. We take PCs for granted today. But the first machine that actually looked and worked like modern PC was hand-built as a research project by Xerox. It was a well-kept secret, until this article appeared in the September 1981 issue of BYTE Magazine, giving the world its first look at the future. The Xerox Alto inspired the Macintosh, which was copied by Microsoft Windows, and the rest was history.