Return to class page

Topics and Readings

end page div end content div end wrapper div
Drinking from the Firehose
Topic Book and Chapter Required Readings Related Readings
Cryptography PUIS Chapter 7 - Cryptography Basics Security Engineering - Chapter 5 - Cryptography
Secure Design Principles The Protection of Information in Computer Systems, up to part B. Engineering Principles for Information Technology Security

Managing and Understanding Entropy Usage
Passwords Security Engineering, Chapter 2 Section 4

PUIS pages 67-90
Enough With the Rainbow Tables: What You Need to Know About Secure Password Schemes

Enough With the Salts: Updates on Secure Password Schemes
Authentication Security Engineering Chapter 15 RFID Hacking
Software Security Smashing the Stack for Fun and Profit
Format String Attacks
Hardware Security Security Engineering, Chapter 16

Security Engineering, Chapter 17

Intel x86 Considered Harmful

Revisiting the Black Sunday Hack

From the Eye of a Legal Storm, Murdoch’s Satellite-TV Hacker Tells All

Hardware Security and Trusted Systems PUIS Chapter 26 - Who do you trust? Reflection on Trusting Trust Trusted Computer System Evaluation Criteria
Malware Wikipedia on Malware How to 0wn the Internet in Your Spare Time To Kill a Centrifuge
Penetration Testing / Backups PUIS Chapter 18 - Backups Data Backup Options
Personnel Security PUIS Chapter 9 - Personnel Security

PUIS Chapter 18 - Backups

Employment Background Checks: A Jobseeker's Guide
Physical Security Security Engineering - Chapter 11

PUIS Chapter 8 - Physical Security for Servers