Course material 2010–11
I wrote up my lecture notes for this course into a book the first edition of which is now available online without charge. Another free book is the Handbook of Applied Cryptography which covers crypto algorithms, protocols and theory in more detail, while the information security chapter from Jerry Saltzer and Frans Kaashoek's MIT Computer System Design course is also definitely worth a look.
Guest lecture slides
November 5 (Sergei Skorobogatov on physical security of crypto processors): the slides are here, and you can also read book chapters 16 and 17 (second edition) or 14 and 15 (first edition). You might also look at our survey of cryptographic processors.
November 17 (Joe Bonneau on web authentication): slides.
Lectures 1-4 (security policy): see book chapters 1, 8, 9 and 10 (second edition) or 1, 7, 8 and 9 (first edition). A US report tells the history of classifications and clearances, with a discussion of its technical shortcomings; on the policy front, an article in the Washington Post describes the hypertrophy of US intelligence agencies since 9/11. The UK government's security policy framework is here; its predecessor is here. Here's the snooping dragon paper, and a news article on the use of targeted malware in fraud (more from the FBI, and here). The statistical disclosure control documents for the 2011 census can be found here while one critique can be found here.
Lecture 6 (physical security, psychology): see book chapters 2 and 11, and a Google tech talk I gave on searching for covert communities and villains online. The most detailed security psychology tutorial is probably a set of five book chapters by Peter Gutmann. You might also find the blog of our recent security psychology workshop interesting.
Lecture 7 (telecomms security, malware and firewalls): see book chapters 20 and 21 (second edition) or 17 and 18 (first edition). Cheswick and Bellovin's Firewalls and Internet Security: Repelling the Wily Hacker is a classic, while Howard and Leblanc's Writing Secure Code is also well worth a look. In the lecture I said I wasn't aware of any cases of slamming in the UK; well, I am now. The mobile phone industry's lack of concern about security is documented here. Finally, the latest on Stuxnet is here, here, here, here and here.
Lecture 9 (cryptography revision, with basics of stream and block ciphers): see book chapter 5, and do browse other crypto books too. Stinson is maybe the best introduction to block cipher design while Menezes, van Oorschot and Vanstone is a handy reference.
Lecture 8, 10 (shared-key authentication protocols): book chapter 3 (second edition) or 2 (first edition); and there's material on API attacks at chapter 18 of my book. You might also look at the BAN logic.
Lecture 14-15 (crypto engineering and public-key protocols): again look at book chapter 5. You might also enjoy the original Diffie-Hellman and RSA papers. For the fancy protocols such as secret sharing, zero knowledge, digital cash and so on you can get a gentle introduction in Schneier; the mathematically-inclined might prefer books with more proofs such as Stinson or Koblitz. For the protocols side of things you can look at our papers on Programming Satan's Computer and Robustness principles for public key protocols.