|
|
|
|
Prerequisites: |
CSE 326 and CSE 378. CSE 303 is highly recommended. |
|
You should have maturity in both
the mathematics of computer science and in the engineering of computer systems. This means that you should:
have a good understanding of data structures and algorithms;
be comfortable writing programs from scratch in C and Java;
be comfortable writing and debugging assembly code; and
be comfortable in a command-line Unix development environment (gdb, gcc, etc).
You should also have
a good understanding of computer architecture, operating systems, and computer networks.
Most importantly, you should be eager to challenge yourself and learn more!
|
Required
textbooks: |
Security in Computing, Fourth Edition, Pfleeger and Pfleeger, ISBN 0-13-239077-9.
(Primary text.)
|
|
Network Security, Second Edition, Kaufman, Perlman, and Speciner, ISBN 0-13-046019-2.
(Secondary text.)
|
Supplementary
textbooks: |
Handbook of Applied Cryptography, Menezes, van Oorschot, and Vanstone. Available online.
|
|
Security Engineering, Anderson. Available online.
|
|
Principles of Computer System Design, Chapter 11, Kaashoek and Saltzer. Available online only. This book has not yet been published, so do not redistribute.
|
|
Information Security, Stamp, ISBN 978-0-471-73848-0.
|
|
Foundations of Security, Daswani, Kern, and Kesavan, ISBN 1-59059-784-2.
|
|
Writing Security Tools and Exploits, Foster and Liu, ISBN 1-59749-997-8
|
Anonymous
feedback can be sent to the course instructor or TA using this
form. |
|