Information Security

This course provides an introduction to Information Security. The focus
is on fundamental concepts and models, basic cryptography, protocols and system security, and privacy and data protection. While the emphasis is on foundations, case studies will be given that examine different realizations of these ideas in practice.

AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
cover image

Computer security

Dieter Gollmann

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.B.072.08.2 2011 6 / 1 Information Security Available
Textbook.B.072.08.3 2011 6 / 1 Information Security Available
IT.99.1 1999 Available
Textbook.B.072.08.1 2011 6 / 1 Information Security On-site use only
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
cover image

Security in computing

Charles P. Pfleeger, Shari Lawrence Pfleeger

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.M.023.04.1 2007 8 / 4 Applied Security Laboratory Available
Textbook.M.023.04.2 2007 8 / 4 Applied Security Laboratory Available
Textbook.B.072.07.1 2007 6 / 1 Information Security Available
Textbook.B.072.07.2 2007 6 / 1 Information Security Available
IT.89.1 1989 Available
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
cover image

Network security essentials

Applications and standards

William Stallings

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.B.072.06.1 2007 6 / 1 Information Security Available
Textbook.B.072.06.2 2007 6 / 1 Information Security Available
Textbook.M.069.07.1 2003 / VLSI 2: From Netlist to Complete System on Chip Available
Textbook.M.069.07.2 2003 / VLSI 2: From Netlist to Complete System on Chip Available
Textbook.M.069.07.3 2003 / VLSI 2: From Netlist to Complete System on Chip Available
IT.07.1 2007 Available
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
cover image

Network security

Private communication in a public world

Charlie Kaufman, Radia Perlman, Mike Speciner

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.B.072.11.1 2011 6 / 1 Information Security Available
Textbook.B.072.11.2 2011 6 / 1 Information Security Available
IK.10.21 2010 Available
IK.02.4 2002 Available
Textbook.B.072.11.3 2011 6 / 1 Information Security 11.12.2024 Unavailable
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
cover image

Cryptography and network security

Principles and practice

William Stallings

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.M.154.02.1 2011 11 / 4 Network Security Available
Textbook.B.072.09.1 2011 6 / 1 Information Security Available
IT.11.8 2011 Available
IT.06.5 2006 Available
IT.03.1 2003 Available
Textbook.B.072.09.2 2011 6 / 1 Information Security On-site use only
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
cover image

The algorithmic foundations of differential privacy

Cynthia Dwork, Aaron Roth

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.B.072.12.1 2014 6 / 1 Information Security Available
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
cover image

Handbook of applied cryptography

Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.M.096.01.1 1997 10 / 2 Formal Methods for Information Security Available
Textbook.M.096.01.2 1997 10 / 2 Formal Methods for Information Security Available
Textbook.B.072.02.1 1997 6 / 1 Information Security Available
Textbook.B.072.02.2 1997 6 / 1 Information Security Available
Textbook.B.072.02.3 1997 6 / 1 Information Security Available
Textbook.B.072.02.4 1997 6 / 1 Information Security Available
Textbook.B.072.02.5 1997 6 / 1 Information Security Available
Textbook.M.069.03.1 1997 / VLSI 2: From Netlist to Complete System on Chip Available
Textbook.M.069.03.2 1997 / VLSI 2: From Netlist to Complete System on Chip Available
Textbook.M.069.03.3 1997 / VLSI 2: From Netlist to Complete System on Chip Available
Textbook.M.069.03.4 1997 / VLSI 2: From Netlist to Complete System on Chip Available
Textbook.M.069.03.5 1997 / VLSI 2: From Netlist to Complete System on Chip Available
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
cover image

Computer security

Art and science

Matt Bishop

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.M.136.02.1 2003 12 / 2 Security Engineering Available
Textbook.M.136.02.2 2003 12 / 2 Security Engineering Available
Textbook.B.072.03.1 2003 6 / 1 Information Security Available
Textbook.B.072.03.2 2003 6 / 1 Information Security Available
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
cover image

Haskell

The craft of functional programming

Simon Thompson

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.B.072.10.1 2011 6 / 1 Information Security Available
Textbook.B.072.10.2 2011 6 / 1 Information Security Available
Textbook.B.072.10.3 2011 6 / 1 Information Security Available
Textbook.B.072.10.4 2011 6 / 1 Information Security Available
Textbook.B.072.10.5 2011 6 / 1 Information Security Available
Textbook.B.129.07.3 2011 4 / 3 Formal Methods and Functional Programming Available
Textbook.B.129.07.4 2011 4 / 3 Formal Methods and Functional Programming Available
Textbook.B.129.07.6 2011 4 / 3 Formal Methods and Functional Programming Available
IE.99.23 1999 Available
Textbook.B.129.07.1 2011 4 / 3 Formal Methods and Functional Programming On-site use only
Textbook.B.129.07.5 2011 4 / 3 Formal Methods and Functional Programming 11.12.2024 Unavailable
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
cover image

Cryptography

Theory and practice

Douglas R. Stinson

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.B.072.05.1 2006 6 / 1 Information Security Available
Textbook.B.072.05.2 2006 6 / 1 Information Security Available
Textbook.B.072.05.3 2006 6 / 1 Information Security Available
IT.02.4 2002 Available
IT.95.3 1995 Available
Textbook.B.072.05.4 2006 6 / 1 Information Security On-site use only
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
cover image

Applied cryptography

Protocols, algorithms, and source code in C

Bruce Schneier

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.B.072.01.2 1996 6 / 1 Information Security Available
Textbook.B.072.01.3 1996 6 / 1 Information Security Available
Textbook.B.072.01.4 1996 6 / 1 Information Security Available
Textbook.M.069.01.1 1996 / VLSI 2: From Netlist to Complete System on Chip Available
Textbook.M.069.01.2 1996 / VLSI 2: From Netlist to Complete System on Chip Available
Textbook.M.069.01.3 1996 / VLSI 2: From Netlist to Complete System on Chip Available
IT.96.1k 1996 Available
IT.94.1 1994 Available
Textbook.B.072.01.1 1996 6 / 1 Information Security On-site use only
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
cover image

Modern cryptography

Theory and practice

Wenbo Mao

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.B.072.04.1 2004 6 / 1 Information Security Available
Textbook.B.072.04.2 2004 6 / 1 Information Security Available