<-----------------------------------------------------------------> | |
This area will be updated with information relevant to the course | |
Weller, R., Clements, R., Dugdale, K., et al.Introduction to the | |
New Mainframe: Security, Redbook 2007. | |
URL: http://www.redbooks.ibm.com/abstracts/sg246776.html | |
Weller -- Book | |
Weller -- Book link | |
Cook, J., Cantalupo, J.C., & Lee, M. Security Guide for IBM i V6.1 | |
Redbook 2009. | |
URL: http://www.redbooks.ibm.com/abstracts/sg247680.html | |
Cook -- Book | |
Cook -- Book link | |
Anderson, R. Security Engineering: A Guide to Building Dependable | |
Distributed Systems. Wiley 2001. | |
URL: http://www.cl.cam.ac.uk/~rja14/book.html | |
Anderson -- Book | |
Anderson -- Book link | |
Parmar, S.K. Introduction to Computer, Internet & Network Systems | |
Security. URL: | |
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.5669 | |
Parmar -- Book | |
Parmar -- Book link | |
Menezes, A.J., van Oorschot, P., & Vanstone, S.A. | |
Handbook of Applied Cryptography, CRC Press, ISBN: 0-8493-8523-7, | |
October 1996, Fourth Printing (July 1999). | |
URL: http://www.cacr.math.uwaterloo.ca/hac/ | |
Menezes -- Optional book link | |
National Institute of Standards and Technology (NIST), | |
Information Technology Laboratory, Computer Security Division. | |
Collection of free publications on security. | |
NIST Computer Security Resource Center | |
This is an amateur web site that collects security tools. | |
It links to other useful sites like http://seclists.org/. | |
Security tools collection | |
<= go back | |
<-----------------------------------------------------------------> |