|
| |  | |
| Class Location and Time: | MWF 8:30-9:20 EEB 125 |
| Section Location and Time: | Th 830-920 MGH 228 Th 930-1020 SAV 155 |
| Prerequisites (CSE 484): | CSE 326 and CSE 378. CSE 303 is highly recommended. |
| You should have maturity in both the mathematics of computer science and in the engineering of computer systems. This means that you should: have a good understanding of data structures and algorithms; be comfortable writing programs from scratch in C and Java; be comfortable writing and debugging assembly code; and be comfortable in a command-line Unix development environment (gdb, gcc, etc). You should also have a good understanding of computer architecture, operating systems, and computer networks. Most importantly, you should be eager to challenge yourself and learn more! |
| Prerequisites (CSE M 584): | CSE 378; one of CSE 451 or 461. |
| Required textbook: | Foundations of Security, Daswani, Kern, and Kesavan, ISBN 1-59059-784-2. |
| Further reading: | Handbook of Applied Cryptography, Menezes, van Oorschot, and Vanstone. Available online. |
| Security Engineering, Anderson. Available online. |
| Principles of Computer System Design, Chapter 11, Kaashoek and Saltzer. Available online only. This book has not yet been published, so do not redistribute. |
| Security in Computing, Fourth Edition, Pfleeger and Pfleeger, ISBN 0-13-239077-9. |
| Network Security, Second Edition, Kaufman, Perlman, and Speciner, ISBN 0-13-046019-2. |
| Information Security, Stamp, ISBN 978-0-471-73848-0. |
| Writing Security Tools and Exploits, Foster and Liu, ISBN 1-59749-997-8 |
| No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing, Long, ISBN 1597492159 |
|
No comments:
Post a Comment