Network Security
- Piet De Vaere, Stefan Frei, Kenneth Paterson, Adrian Perrig
- Autumn Semester
- Location: rack 11, shelf 4 VVZ-ID: 263-4640-00L Lecture homepage
Some of today's most damaging attacks on computer systems involve exploitation of network infrastructure, either as the target of attack or as a vehicle to attack end systems.
This course provides an in-depth study of network attack techniques and methods to defend against them.
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
Firewalls and Internet securityRepelling the Wily hacker William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin
|
||||||||||||||||||||||||||||||||||||||||||
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
CodebreakersThe inside story of Bletchley Park ed. by F. H. Hinsley, Alan Stripp
|
||||||||||||||||||||||||||||||||||||||||||
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
Cryptography and network securityPrinciples and practice William Stallings
|
||||||||||||||||||||||||||||||||||||||||||
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
Secrets and liesDigital security in a networked world Bruce Schneier
|
||||||||||||||||||||||||||||||||||||||||||
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
Why things bite backTechnology and the revenge of unintended consequences Edward Tenner
|
||||||||||||||||||||||||||||||||||||||||||
AVAILABLE
READING ROOM ONLY
NOT AVAILABLE
ONLINE VERSION
Foundations of securityWhat every programmer needs to know Neil Daswani, Christoph Kern and Anita Kesavan
|