next up previous contents
Next: Prolog for Artificial Intelligence Up: Lent Term 2002: Part Previous: Digital Communication I   Contents

Introduction to Security

Lecturer: Mr M.G. Kuhn (mgk25@cl.cam.ac.uk)

No. of lectures: 6

Prerequisite courses: Discrete Mathematics, Operating Systems

This course is a prerequisite for Security (Part II).


Aims


This course is a broad introduction to both computer security and cryptography. It covers important basic concepts and techniques.


Lectures

Objectives


By the end of the course students should


Recommended books


Gollmann, D. (1999). Computer Security. Wiley.
Schneier, B. (1995). Applied Cryptography: Protocols, Algorithms, and Source in C. Wiley (2nd ed.).


Further reading:


Anderson, R. (2001). Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley.
Kahn, D. (1996). The Codebreakers. Scribner (2nd ed.).
Cheswick, W.R. & Bellovin, S.M. (2001). Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley (2nd ed.).
Garfinkel, S. & Spafford, G. (1996). Practical Unix and Internet Security. O'Reilly (2nd ed.).
Amoroso, E. (1994). Fundamentals of Computer Security Technology. Prentice-Hall.



next up previous contents
Next: Prolog for Artificial Intelligence Up: Lent Term 2002: Part Previous: Digital Communication I   Contents
Christine Northeast
Tue Sep 4 09:34:31 BST 2001