Find the Smexy Juicy STUFF! For This Blog

Saturday, May 20, 2017

University of Washington

CSE logoUniversity of Washington Computer Science & Engineering

 CSE 484 / CSE M 584: Computer Security (Winter 2010)
  CSE Home  About Us   Search   Contact Info 
Course home
 Home
Administrivia
 Overview
 Using course email
 Context Forum
 Assignment Forum
Schedule
 Schedule
Assignments
 Homework
 Labs
Lab information
 Getting lab accounts
 Unix tutorials


WhoOffice Hours
Tadayoshi Kohno, Instructor
yoshi@cs
Mondays 9:30-10:20am 
Slava Chernyak, TA
chernyak@cs
Wednesdays 9:30-10:20am, Room CSE 220
Alexei Czeskis, TA
aczeskis@cs
Miro Enev, TA
miro@cs
Thursdays 10:30-11:20am, Room CSE 220


Class Location and Time:MWF 8:30-9:20 EEB 125
Section Location and Time:Th 830-920  MGH 228
Th 930-1020  SAV 155

Prerequisites (CSE 484):CSE 326 and CSE 378. CSE 303 is highly recommended.
You should have maturity in both the mathematics of computer science and in the engineering of computer systems. This means that you should: have a good understanding of data structures and algorithms; be comfortable writing programs from scratch in C and Java; be comfortable writing and debugging assembly code; and be comfortable in a command-line Unix development environment (gdb, gcc, etc). You should also have a good understanding of computer architecture, operating systems, and computer networks. Most importantly, you should be eager to challenge yourself and learn more!
Prerequisites (CSE M 584):CSE 378; one of CSE 451 or 461.

Required textbook:Foundations of Security, Daswani, Kern, and Kesavan, ISBN 1-59059-784-2.
Further reading:Handbook of Applied Cryptography, Menezes, van Oorschot, and Vanstone. Available online.
Security Engineering, Anderson. Available online.
Principles of Computer System Design, Chapter 11, Kaashoek and Saltzer. Available online only.  This book has not yet been published, so do not redistribute.
Security in Computing, Fourth Edition, Pfleeger and Pfleeger, ISBN 0-13-239077-9.
Network Security, Second Edition, Kaufman, Perlman, and Speciner, ISBN 0-13-046019-2.
Information Security, Stamp, ISBN 978-0-471-73848-0.
Writing Security Tools and Exploits, Foster and Liu, ISBN 1-59749-997-8
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing, Long, ISBN 1597492159

No comments:

Post a Comment