Introduction
Introduction Statistics Contact Development Disclaimer Help
<----------------------------------------------------------------->
This area will be updated with information relevant to the course
Weller, R., Clements, R., Dugdale, K., et al.Introduction to the
New Mainframe: Security, Redbook 2007.
URL: http://www.redbooks.ibm.com/abstracts/sg246776.html
Weller -- Book
Weller -- Book link
Cook, J., Cantalupo, J.C., & Lee, M. Security Guide for IBM i V6.1
Redbook 2009.
URL: http://www.redbooks.ibm.com/abstracts/sg247680.html
Cook -- Book
Cook -- Book link
Anderson, R. Security Engineering: A Guide to Building Dependable
Distributed Systems. Wiley 2001.
URL: http://www.cl.cam.ac.uk/~rja14/book.html
Anderson -- Book
Anderson -- Book link
Parmar, S.K. Introduction to Computer, Internet & Network Systems
Security. URL:
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.5669
Parmar -- Book
Parmar -- Book link
Menezes, A.J., van Oorschot, P., & Vanstone, S.A.
Handbook of Applied Cryptography, CRC Press, ISBN: 0-8493-8523-7,
October 1996, Fourth Printing (July 1999).
URL: http://www.cacr.math.uwaterloo.ca/hac/
Menezes -- Optional book link
National Institute of Standards and Technology (NIST),
Information Technology Laboratory, Computer Security Division.
Collection of free publications on security.
NIST Computer Security Resource Center
This is an amateur web site that collects security tools.
It links to other useful sites like http://seclists.org/.
Security tools collection
<= go back
<----------------------------------------------------------------->
You are viewing proxied material from sdf.org. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.