School of Computer Science
Personal Web Page

Computer Security 2012

This page contains links to useful material for the Computer Security Module. If will be continually updated through out the module, so check back.

Recommended Reading

Supplementary Material

The main source of information for the module is the lecture slides, which you can find here. Also useful are some of Mark Ryan's lecture notes:

Tools

Tools referred to in lectures include:

N.B. some of these tools can be run against systems that you do not own. DO NOT TARGET THESE TOOLS AT SYSTEMS YOU DO NOT OWN. This will probably be illegal, and you could be expelled from the University.

Recommended Text Books

  • Computer Security, Gollmann
  • Security Engineering, Anderson

You can find these books in the Central and the computer security libraries. The first edition of Ross Anderson's book can be found here for free download.

Futher Reading

These will give you a deeper understanding of the issues presented in Lectures. The material in them will not be examined, but reading them is highly recommended.

  • Applied Cryptography, Bruce Schneier.
  • Why Johnny Can't Encrypt This paper gives some of the reasons why PGP never really became popular.