|
|
|
|
Email everyone: cse484-tas@cs.washington.edu.
Class Location and Time: |
MWF 2:30-3:20 JHN 175
|
Section Location and Time: |
Th 1:30-2:20 EEB 125
Th 2:30-3:20 EEB 125
|
Anonymous Feedback |
Comments can be sent to the instructor or TAs using this anonymous feedback form. |
Prerequisites: |
(CSE 326 or CSE 332) and (CSE 351 or CSE 378). |
|
You should have maturity in both
the mathematics of computer science and in the engineering of computer systems. This means that you should:
have a good understanding of data structures and algorithms;
be comfortable writing programs from scratch in C and Java;
be comfortable writing and debugging assembly code; and
be comfortable in a command-line Unix development environment (gdb, gcc, etc).
You should also have
a good understanding of computer architecture, operating systems, and computer networks.
Most importantly, you should be eager to challenge yourself and learn more!
|
Required textbook: |
Foundations of Security, Daswani, Kern, and Kesavan, ISBN 1-59059-784-2.
|
Further reading: |
Handbook of Applied Cryptography, Menezes, van Oorschot, and Vanstone. Available online.
|
|
Cryptography Engineering, Ferguson, Schneier, and Kohno, ISBN 978-0470474242.
|
|
Security Engineering, Anderson. Available online.
|
|
Principles of Computer System Design, Chapter 11, Kaashoek and Saltzer. Available online only. This book has not yet been published, so do not redistribute.
|
|
Security in Computing, Fourth Edition, Pfleeger and Pfleeger, ISBN 0-13-239077-9.
|
|
Network Security, Second Edition, Kaufman, Perlman, and Speciner, ISBN 0-13-046019-2.
|
|
Information Security, Stamp, ISBN 978-0-471-73848-0.
|
|
Writing Security Tools and Exploits, Foster and Liu, ISBN 1-59749-997-8
|
|
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing, Long, ISBN 1597492159
|
Acknowledgements: |
We thank Intel for donating hardware used in this course.
|
Anonymous
feedback can be sent to the course instructor or TA using this
form. |
|