Network Security

Some of today's most damaging attacks on computer systems involve exploitation of network infrastructure, either as the target of attack or as a vehicle to attack end systems.
This course provides an in-depth study of network attack techniques and methods to defend against them.

AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
cover image

Cryptography and network security

Principles and practice

William Stallings

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.M.154.02.1 2011 11 / 4 Network Security Available
Textbook.B.072.09.1 2011 6 / 1 Information Security Available
IT.11.8 2011 Available
IT.06.5 2006 Available
IT.03.1 2003 Available
Textbook.B.072.09.2 2011 6 / 1 Information Security On-site use only
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
cover image

The complete guide to SCION

From design principles to formal verification

Laurent Chuat, Markus Legner, David Basin, David Hausheer, Samuel Hitz, Peter Müller, Adrian Perrig

Signature Year Rack/Shelf Lecture Return Date Status
Textbook.M.154.01.1 2022 11 / 4 Network Security Unavailable
Textbook.M.154.01.2 2022 11 / 4 Network Security Unavailable
Textbook.M.154.01.3 2022 11 / 4 Network Security Unavailable