CSE logo University of Washington Computer Science & Engineering
 CSE P 590 C / CSE M 590: Computer Security (Spring 2010)
  CSE Home   About Us    Search    Contact Info 

Course home
 Home
Administrivia
 Overview
 Using course email
 Forum
Schedule
 Schedule
Assignments
 Homework
 Labs
Lab information
 Getting lab accounts
 Unix tutorials
   


Who Office Hours
Tadayoshi Kohno, Instructor
yoshi@cs
Thursdays 5:30-6:20pm (beginning April 8)
Tamara Denning, TA
tdenning@cs
Thursdays 5:30-6:20pm, CSE 216
Karl Koscher, TA
supersat@cs
Thursdays 5:30-6:20pm, CSE 216
Best email address to reach course staff csep590c_sp10-staff@cs


Class Location and Time: Thursdays 6:30-9:20pm EEB 037

Prerequisites: You should have maturity in both the mathematics of computer science and in the engineering of computer systems. This means that you should: have a good understanding of data structures and algorithms; be comfortable writing programs from scratch in C and Java; be comfortable writing and debugging assembly code; and be comfortable in a command-line Unix development environment (gdb, gcc, etc). You should also have a good understanding of computer architecture, operating systems, and computer networks. Most importantly, you should be eager to challenge yourself and learn more!

Required textbook: Foundations of Security, Daswani, Kern, and Kesavan, ISBN 1-59059-784-2.
Cryptography Engineering, Ferguson, Schneier, and Kohno, ISBN 978-0470474242.
Note: MyUW may list the incorrect title for one book.
Further reading: Handbook of Applied Cryptography, Menezes, van Oorschot, and Vanstone. Available online.
Security Engineering, Anderson. Available online.
Principles of Computer System Design, Chapter 11, Kaashoek and Saltzer. Available online only. This book has not yet been published, so do not redistribute.
Security in Computing, Fourth Edition, Pfleeger and Pfleeger, ISBN 0-13-239077-9.
Network Security, Second Edition, Kaufman, Perlman, and Speciner, ISBN 0-13-046019-2.
Information Security, Stamp, ISBN 978-0-471-73848-0.
Writing Security Tools and Exploits, Foster and Liu, ISBN 1-59749-997-8
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing, Long, ISBN 1597492159

Acknowledgements: We thank Intel for donating hardware used in this course.

Anonymous feedback can be sent to the course instructor or TA using this form.

CSE logo Computer Science & Engineering
University of Washington
Box 352350
Seattle, WA  98195-2350
(206) 543-1695 voice, (206) 543-2969 FAX