SE-610 Software System Security

Wednesday 4:30-7:15PM
 HH B1

 
 
bullet Syllabus       Class Notes
bullet

Home Work Assignments

Assignment 1  (Due Wednesday, Oct. 4)
Assignment 2  (Due Wednesday, Oct. 25)
Assignment 3  (Due Wednesday, Nov. 8)
Assignment 4  (Due Wednesday, Nov. 29)

bullet

Useful Links

The Textbook Page

Information Security Magazine

FAQs on Cryptography

Security and Encryption Resources

Online Tutorial on Eliptic Curve Cryptography

Kerberos

CERT* Coordination Center on Internet Security

National Cryptologic Museum

bullet

Supplementary Reading Materials

Applied Cryptography, by Bruce Schneier, John Wiley & Sons, 1996.

Cryptography Theory and Practice, by Doug Stinson, CRC Press, 1996.

Security in Computing, by Charles Pfleeger and Shari Pfleeger, 3rd Edition, 2001.
Network Security - Private Communication in a Public World, by Charlie Kaufman,
      Radia
Perlman and Mike Speciner, 2nd Edition, Prentice Hall, 2002.
Computer Networking: A Top Down Approach Featuring the Internet,  by
     
J. Kurose and Keith Ross, Third Edition,  Addison-Wesley, 2004.

 
 
Back                                                       Last modified: 04/21/2009