|
|
|
|
Who |
Office Hours |
Tadayoshi
Kohno, Instructor
yoshi@cs |
Mon 10:30-11:20am None on 1/12; 1/19 office hour moved to 1/21;
1/26 office hour moved to 1/28 (from 10:30 to 11am)
|
Jonathan Beall, TA
jibb@cs |
Wednesday 1:30-2:20PM, CSE 345 |
Alexei Czeskis, TA
aczeskis@cs |
By Appointment |
Tamara Denning, TA
tdenning@cs |
Monday 1:30-2:20PM, CSE 345
Monday (2/23) moved to Thursday (2/26) 1:30-2:20
Monday (3/2) moved to Friday (3/6) 12-1 |
Class Location and Time: |
MW 9:00-10:20 BAG 260
|
Section Location and Time: |
Th 830-920 GUG 204
Th 930-1020 MEB 248
|
Prerequisites (CSE 484): |
CSE 326 and CSE 378. CSE 303 is highly recommended. |
|
You should have maturity in both
the mathematics of computer science and in the engineering of computer systems. This means that you should:
have a good understanding of data structures and algorithms;
be comfortable writing programs from scratch in C and Java;
be comfortable writing and debugging assembly code; and
be comfortable in a command-line Unix development environment (gdb, gcc, etc).
You should also have
a good understanding of computer architecture, operating systems, and computer networks.
Most importantly, you should be eager to challenge yourself and learn more!
|
Prerequisites (CSE M 584): |
CSE 378; one of CSE 451 or 461. |
Required textbook: |
Foundations of Security, Daswani, Kern, and Kesavan, ISBN 1-59059-784-2.
|
Further reading: |
Handbook of Applied Cryptography, Menezes, van Oorschot, and Vanstone. Available online.
|
|
Security Engineering, Anderson. Available online.
|
|
Principles of Computer System Design, Chapter 11, Kaashoek and Saltzer. Available online only. This book has not yet been published, so do not redistribute.
|
|
Security in Computing, Fourth Edition, Pfleeger and Pfleeger, ISBN 0-13-239077-9.
|
|
Network Security, Second Edition, Kaufman, Perlman, and Speciner, ISBN 0-13-046019-2.
|
|
Information Security, Stamp, ISBN 978-0-471-73848-0.
|
|
Writing Security Tools and Exploits, Foster and Liu, ISBN 1-59749-997-8
|
|
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing, Long, ISBN 1597492159
|
Anonymous
feedback can be sent to the course instructor or TA using this
form. |
|