|
|
|
|
|
|
|
|
Click on the
links below to access the available Resources :
|
|
GENERAL LINKS |
|
-
"Distributed Computer Security Lab and
Projects" -T. Andrew Yang,
Kwok-Bun Yue, Morris Liaw, George Collins, Jayaraman T. Venkatraman,
Swati Achar, Karthik Sadasivam, and Ping Chen. submitted to the
"Thirteenth Annual Consortium for Computing Sciences in Colleges: Rocky
Mountain Conference", October 22-23, 2004, Utah Valley State College,
Orem, Utah.
-
XML Editor Free : Peter's XML
-
Learning XML Schema:
a center of XML schema created by Andrew.
- Polytechnic University ISIS lab:
http://isis.poly.edu/.
-
http://isis.poly.edu/courses/:
List of courses developed by ISIS. You may want to focus on CS 392
Computer Security (Fall 2002) and CS 393 Network Security (Spring
2003).
- Examples of hand-on labs:
-
Rice's connexions project:
links and analysis.
-
Yasir 's Thesis Report
-
Active Directory Setup
-
VPN Server Setup
-
Implementing Network Security Monitoring
with Open Source Tools - by Richard Bejtlick
-
Comparing VPN Options - An article from
WindowsSecurity.com
-
RSA Conference 2004, San Francisco articles
Top
|
MANAGEMENT OF SECURITY |
|
Top
|
LEGAL AND ETHICAL ISSUES IN COMPUTER SECURITY |
|
Top
|
INTRODUCTION TO COMPUTER SECURITY |
|
Books
- Bishop, Matt. Computer Security: Art
and
Science. Addison Wesley, 2002.
- Pfleeger, Charles P, Shari Lawrence Pfleeger,
and
Willis H. Ware. Security in Computing, Third Edition. Prentice
Hall, 2002.
- Pfleeger, Charles P. Security in
Computing, 2nd Edition. Prentice Hall. 1997.
- Pistoia, Marco, Duane F. Reller, Deepak Gupta,
Milind
Nagnur, and Ashok Ramani. Java 2 Network Security, 2nd Edition.
Prentice
Hall, 2000.
- Rescorla, Eric. SSL and TLS: Designing and
Building
Secure Systems. Addison Wesley Professional, 2001.
- Schneier, Bruce. Applied Cryptography:
Protocols,
Algorithms, and Source Code in C, 2nd Edition. Wiley, 1996.
- Viega, John and Gary McGraw. Building
Secure Software: How to Avoid Security Problems the Right Way.
Addison
Wesley. 2002.
Articles
- Andrews, Gregory R., "Partitions and principles
for
secure operating systems", Proceedings of the 1975 ACM annual
conference,
January 1975.
- Bashir, Imran, Enrico Serafini, and Kevin Wall,
"Securing network software applications: introduction", Communications
of the ACM, Volume 44 Issue 2, February 2001.
- Viega, John, Tadayoshi Kohno, and Bruce Potter,
"Trust (and mistrust) in secure applications", Communications of
the
ACM, Volume 44 Issue 2, February 2001.
Web Sites
Top
|
MALICIOUS PROGRAMS AND SECURE PROGRAMMING |
|
Some Useful Links
Unix Related
Perl Related
Top
|
DATABASE SECURITY |
|
Books
- Bishop, Matt. Computer Security: Art and Science.
Addison Wesley, 2002.
- Pfleeger, Charles P, Shari Lawrence Pfleeger, and Willis
H. Ware. Security in Computing, Third Edition. Prentice Hall, 2002.
- Rescorla, Eric. SSL and TLS: Designing and Building Secure Systems. Addison
Wesley Professional, 2001.
- Viega, John and Gary McGraw. Building Secure Software: How to Avoid Security
Problems the Right Way. Addison Wesley. 2002.
Articles
- Dorothy E. Denning, Peter J. Denning: Data Security. ACM
Computing Surveys 11(3): 227-249 (1979)
- David P. Dobkin, Anita K. Jones, Richard J. Lipton: Secure
Databases: Protection Against User Influence. TODS 4(1): 97-106 (1979)
-
Web Sites
Top
|
CRYPTOGRAPHY |
|
Books
- Bishop, Matt. Computer Security: Art and
Science. Addison Wesley, 2002.
- Pfleeger, Charles P, Shari Lawrence Pfleeger, and
Willis H. Ware. Security in Computing, Third Edition. Prentice
Hall, 2002.
- Pfleeger, Charles P. Security in
Computing, 2nd Edition. Prentice Hall. 1997.
- Pistoia, Marco, Duane F. Reller, Deepak Gupta, Milind
Nagnur, and Ashok Ramani. Java 2 Network Security, 2nd Edition. Prentice
Hall, 2000.
- Rescorla, Eric. SSL and TLS: Designing and Building
Secure Systems. Addison Wesley Professional, 2001.
- Schneier, Bruce. Applied Cryptography: Protocols,
Algorithms, and Source Code in C, 2nd Edition. Wiley, 1996.
- Viega, John and Gary McGraw. Building
Secure Software: How to Avoid Security Problems the Right Way. Addison
Wesley. 2002.
Articles
- Andrews, Gregory R., "Partitions and principles for
secure operating systems", Proceedings of the 1975 ACM annual conference,
January 1975.
- Bashir, Imran, Enrico Serafini, and Kevin Wall,
"Securing network software applications: introduction", Communications
of the ACM, Volume 44 Issue 2, February 2001.
- Viega, John, Tadayoshi Kohno, and Bruce Potter,
"Trust (and mistrust) in secure applications", Communications of the
ACM, Volume 44 Issue 2, February 2001.
Web Sites
Top
|
|
|
WIRELESS |
|
-
IBM, Nokia team to ease business apps onto WLANs - By Stephen Lawson - Network World, 03/01/04
IBM and Nokia are teaming to make it easier for companies to provide applications to their mobile workers...
-
'Wireless LAN
Advances: A Concise Assessment'
This special report by 'Network World'
discusses the current trend in wireless LAN security such as the WPA (WiFi
Protected Access) and WLAN switches.
-
Wireless
research center
Latest wireless news, analysis and resource links
-
PERSONAL
AREA CONNECTIVITY WITH BLUETOOTH(tm) WIRELESS TECHNOLOGY
In contrast
to Wi-Fi(R), a robust LAN technology, the Bluetooth(TM) personal area wireless
network was designed as a cable replacement technology for tasks such as
synchronizing data between a portable computer and PDA or sharing files in a
meeting room or small area. This white paper reviews this emerging technology,
describes its applications and discusses its recent availability in the
Dell(TM) Latitude(TM) and select Inspiron(TM) portable computers and the
Axim(TM) X5 Pocket PC. Download your free copy today (registration required)
-
Tools to watch
your airwaves
-
Should you
bother with site surveys
Network World Wireless in the Enterprise
Newsletter, 07/14/03
-
Are
self-managing WLANs coming
Network World Wireless in the Enterprise
Newsletter, 06/25/03 The iPass Corporate Access service weaves together
dial-up, Wi-Fi and Ethernet broadband connectivity in a single, unified
service. Users can get effortless connections in approximately 150 countries,
while IT managers can get reliability, scalability and end-to-end security.
And now you can qualify to try the iPass Corporate Access service free. To get
started, visit THE DESKTOP AGENDA:
http://www.fattail.com/redir/redirect.asp?CID=44730
-
Dial-up,
Wi-Fi and Broadband from a Single Service
The iPass Corporate Access
service weaves together dial-up, Wi-Fi and Ethernet broadband connectivity in
a single, unified service. Users can get effortless connections in
approximately 150 countries, while IT managers can get reliability,
scalability and end-to-end security. And now you can qualify to try the iPass
Corporate Access service free.
-
THE
ESSENTIAL GUIDE TO NETWORKING FOR SMALL AND MIDSIZE BUSINESSES
In this
Special Report, we take a look at the unique set of challenges-from cost to
performance and support--that face small to midsize businesses when it comes
time to building or expanding a corporate network. Download your FREE copy
today (registration required)
-
Total
Visibility of Your Enterprise Network
Want to significantly reduce the
time and expertise needed to solve the most complex network problems Need
7-layer, end-to-end troubleshooting visibility to any Client, Server or
high-speed LAN/WAN aggregation link Learn first-hand from Agilent's
experienced engineers how to eliminate the time it takes to solve the most
complex multi-technology and multi-site problems.
Top
|
|