【正文】
y, we will see why cryptography can’t solve all security problems 21 Syllabus II ?Network security General principles Security policies Access control Attacks on work Buffer overflows Viruses/worms Privacy and Anonymity ?Security Management 22 Philosophy of this course ?We are not going to be able to cover everything We are not going to be able to even mention everything ?Main goals A sampling of many different aspects of security The security “mindset” Bee familiar with basic acronyms (RSA, SSL, PGP, etc.), and “buzzwords” (phishing, …) Bee an educated security consumer Try to keep it interesting with realworld examples and “hacking” projects You will not be a security expert after this class (after this class, you should realize why it would be dangerous to think you are) You should have a better appreciation of security issues after this class 23 Helpful Books ?Frank Adelstein, Sandeep . Gupta, Golden G. Richard III, and Loren Schwiebert, Fundamentals of Mobile and Pervasive Computing, 2022. ?Noureddine Boudriga, Security of Mobile Communications, 2022. ?Levente Butty225。 and Sons 2022 ? Alfred Menezes, Paul van Oorschot, Scott Vanstone Handbook of Applied Cryptography CRC Press 1997 This is a very prehensive book. The best part is that you can download this book online ! The hardcopy is very convenient though. ? Bruce Schneier Applied Cryptography , 2nd Edition John Wiley amp。 Sons 2022 An excellent book on security in real world systems. ? Douglas Stinson Cryptography Theory and Practice CRC Press 1995 This used to be required for , the theory of cryptography class at MIT. ? Bruce Schneier Secrets and Lies John Wiley amp。s a swell guy too。t supposed to happen! Neumann offers a plethora of stories about the risks and consequences of technology, gathered from his Risks mailing list. On a side note, Neumann is also responsible for ing up with the pun/name Unix. ? Jakob Nielsen Usability Engineering Academic Press 1993 There are a lot of nonintuitive GUIs out there for security products. Anyone making a security product for use by humans should learn about the principles of smart GUIs. ? Charlie Kaufman, Radia Perlman, Mike Speciner Network Security: Private Communication in a Public World, 2nd Edition Prentice Hall 2022 The authors discuss work security from a very applied approach. There is a lot of discussion about real systems, all the way down to the IETF RFCs and the onthewire bit representations. The authors also have a fun, informal style. ? Simson Garfinkel, Gene Spafford Web Security, Privacy amp。Reilly 2022 It39。 Hall/CRC Press 2022 This book contains broad coverage of cryptography. ? Nigel Smart Cryptography: An Introduction, 3rd Edition 2022 ? Song Y. Yan and Martin E. Hellman Number Theory for puting Springer 2022 26 Useful Lin