HOME   •   OVERVIEW   •   LAB DEVELOPMENT   •   LOGIN   •   DOWNLOAD   •   CONTACTS
 

 

Click on the links below to access the available Resources :

 

GENERAL LINKS

Top

MANAGEMENT OF SECURITY

Top

LEGAL AND ETHICAL ISSUES IN COMPUTER SECURITY

Top

INTRODUCTION TO COMPUTER SECURITY

Books

  • Bishop, Matt. Computer Security: Art and Science. Addison Wesley, 2002.
  • Pfleeger, Charles P, Shari Lawrence Pfleeger, and Willis H. Ware. Security in Computing, Third Edition. Prentice Hall, 2002.
  • Pfleeger, Charles P.   Security in Computing, 2nd Edition. Prentice Hall.  1997.
  • Pistoia, Marco, Duane F. Reller, Deepak Gupta, Milind Nagnur, and Ashok Ramani. Java 2 Network Security, 2nd Edition. Prentice Hall, 2000. 
  • Rescorla, Eric. SSL and TLS: Designing and Building Secure Systems. Addison Wesley Professional, 2001. 
  • Schneier, Bruce. Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition. Wiley, 1996.
  • Viega, John and Gary McGraw.  Building Secure Software: How to Avoid Security Problems the Right Way. Addison Wesley.  2002.

Articles

  • Andrews, Gregory R., "Partitions and principles for secure operating systems", Proceedings of the 1975 ACM annual conference, January 1975. 
  • Bashir, Imran, Enrico Serafini, and Kevin Wall, "Securing network software applications: introduction", Communications of the ACM, Volume 44 Issue 2, February 2001.
  • Viega, John, Tadayoshi Kohno, and Bruce Potter, "Trust (and mistrust) in secure applications", Communications of the ACM, Volume 44 Issue 2, February 2001. 

Web Sites

Top

MALICIOUS PROGRAMS AND SECURE PROGRAMMING

Some Useful Links

Unix Related

Perl Related

Top

DATABASE SECURITY

Books

  • Bishop, Matt. Computer Security: Art and Science. Addison Wesley, 2002.
  • Pfleeger, Charles P, Shari Lawrence Pfleeger, and Willis H. Ware. Security in Computing, Third Edition. Prentice Hall, 2002.
  • Rescorla, Eric. SSL and TLS: Designing and Building Secure Systems. Addison Wesley Professional, 2001.
  • Viega, John and Gary McGraw. Building Secure Software: How to Avoid Security Problems the Right Way. Addison Wesley. 2002.

Articles

  • Dorothy E. Denning, Peter J. Denning: Data Security. ACM Computing Surveys 11(3): 227-249 (1979) 
  • David P. Dobkin, Anita K. Jones, Richard J. Lipton: Secure Databases: Protection Against User Influence. TODS 4(1): 97-106 (1979)
  •  

Web Sites

Top

CRYPTOGRAPHY

Books

  • Bishop, Matt. Computer Security: Art and Science. Addison Wesley, 2002.
  • Pfleeger, Charles P, Shari Lawrence Pfleeger, and Willis H. Ware. Security in Computing, Third Edition. Prentice Hall, 2002.
  • Pfleeger, Charles P.   Security in Computing, 2nd Edition. Prentice Hall.  1997.
  • Pistoia, Marco, Duane F. Reller, Deepak Gupta, Milind Nagnur, and Ashok Ramani. Java 2 Network Security, 2nd Edition. Prentice Hall, 2000. 
  • Rescorla, Eric. SSL and TLS: Designing and Building Secure Systems. Addison Wesley Professional, 2001. 
  • Schneier, Bruce. Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition. Wiley, 1996.
  • Viega, John and Gary McGraw.  Building Secure Software: How to Avoid Security Problems the Right Way. Addison Wesley.  2002.

Articles

  • Andrews, Gregory R., "Partitions and principles for secure operating systems", Proceedings of the 1975 ACM annual conference, January 1975. 
  • Bashir, Imran, Enrico Serafini, and Kevin Wall, "Securing network software applications: introduction", Communications of the ACM, Volume 44 Issue 2, February 2001.
  • Viega, John, Tadayoshi Kohno, and Bruce Potter, "Trust (and mistrust) in secure applications", Communications of the ACM, Volume 44 Issue 2, February 2001. 

Web Sites

Top

WIRELESS
  • IBM, Nokia team to ease business apps onto WLANs - By Stephen Lawson - Network World, 03/01/04
    IBM and Nokia are teaming to make it easier for companies to provide applications to their mobile workers...
  • 'Wireless LAN Advances: A Concise Assessment'
    This special report by 'Network World' discusses the current trend in wireless LAN security such as the WPA (WiFi Protected Access) and WLAN switches.
  • Wireless research center
    Latest wireless news, analysis and resource links
  • PERSONAL AREA CONNECTIVITY WITH BLUETOOTH(tm) WIRELESS TECHNOLOGY
    In contrast to Wi-Fi(R), a robust LAN technology, the Bluetooth(TM) personal area wireless network was designed as a cable replacement technology for tasks such as synchronizing data between a portable computer and PDA or sharing files in a meeting room or small area. This white paper reviews this emerging technology, describes its applications and discusses its recent availability in the Dell(TM) Latitude(TM) and select Inspiron(TM) portable computers and the Axim(TM) X5 Pocket PC. Download your free copy today (registration required)
  • Tools to watch your airwaves
  • Should you bother with site surveys
    Network World Wireless in the Enterprise Newsletter, 07/14/03
  • Are self-managing WLANs coming
    Network World Wireless in the Enterprise Newsletter, 06/25/03 The iPass Corporate Access service weaves together dial-up, Wi-Fi and Ethernet broadband connectivity in a single, unified service. Users can get effortless connections in approximately 150 countries, while IT managers can get reliability, scalability and end-to-end security. And now you can qualify to try the iPass Corporate Access service free. To get started, visit THE DESKTOP AGENDA: http://www.fattail.com/redir/redirect.asp?CID=44730
  • Dial-up, Wi-Fi and Broadband from a Single Service
    The iPass Corporate Access service weaves together dial-up, Wi-Fi and Ethernet broadband connectivity in a single, unified service. Users can get effortless connections in approximately 150 countries, while IT managers can get reliability, scalability and end-to-end security. And now you can qualify to try the iPass Corporate Access service free.
  • THE ESSENTIAL GUIDE TO NETWORKING FOR SMALL AND MIDSIZE BUSINESSES
    In this Special Report, we take a look at the unique set of challenges-from cost to performance and support--that face small to midsize businesses when it comes time to building or expanding a corporate network. Download your FREE copy today (registration required)
  • Total Visibility of Your Enterprise Network
    Want to significantly reduce the time and expertise needed to solve the most complex network problems Need 7-layer, end-to-end troubleshooting visibility to any Client, Server or high-speed LAN/WAN aggregation link Learn first-hand from Agilent's experienced engineers how to eliminate the time it takes to solve the most complex multi-technology and multi-site problems.

Top

COPYRIGHT © 2007 University of Houston Clear Lake. ALL RIGHTS RESERVED.