Backa |
Confidentiality, Integrity och Availibility (CIA) konfidentialitet, riktighet och tillgänglighet (CIA) C I A de klassiska säkerhetsbegreppen i IT-säkerhetssammanhang Dedicated to Confidentiality, Integrity, and Availibility ( professional secrecy -Sv översättning tystnads|plikt (begränsning i yttrande .) konfidentialitet:Säkerhet mot obehörig åtkomst och användande samt förlust och oönskad förändring av information och andra resurser. |
Fullversion 0201440997 Computer Security: Art and Science 1100
Introduction To Computer Security 799kr (0-321-24744-2) Recommended books /Singh Simon The Code Book -The secret History of and code breaking 1857028899 The Cracking Code Book /Singh Simon 000717604x |
F1 050919 Intro Security models cha 1
|
F2 050921 Security Models and Polices
|
F3 050923 Cryptography overview
|
F4 051026 Security Architectures +
Gäst föreläsare Holism inom säkerhetsinformatik , e-business korta ledtider (månader) Mycket från Systemteorin.
|
F5 050929 Malicous Software
|
F6 050930 Program Security
|
F7 051004 Security Tools
|
F8051006 Assurance
|
F9 051007Law and Ethics
|
F10 051010 Privacy and Privacy Enhancement Tools
|
F11 051012
|
|
|
http://dsv.su.se/sak/awAndEthicsL ::
http://dsv.su.se/sak/Assurance ::
http://dsv.su.se/sak/SecurityOverview::
http://dsv.su.se/sak/PolicyAndFormalModels::
http://dsv.su.se/sak/CryptographyOverview::
http://dsv.su.se/sak/SecurityArchitectures::
http://dsv.su.se/sak/MaliciousSoftware::
http://dsv.su.se/sak/ProgramSecurity::
http://dsv.su.se/sak/SecurityTools::
http://dsv.su.se/sak/Assurance (in principle, though this page turned out to be empty)::
http://dsv.su.se/sak/LawAndEthics::
http://dsv.su.se/sak/PrivacyTools::
Introduction to Computer Security, Matt Bishop a complit ebook of Matt Bishop will be found in the following link http://book.itzero.com/read/others/0503/Addison.Wesley.Introduction.to.Computer.Security.Oct.2004.eBook-LiB_html/0321247442/toc.html Computer Security: Art and Science, Matt Bishop ISBN 0-201-44099-7; Publisher Addison Wesley Professional; Copyright 2003; Format Cloth; 1136 pp.; Library of Congress Number QA76.9.A25 B56 2002 Table of Content: http://nob.cs.ucdavis.edu/book/book-aands/toc.pdf Preface http://nob.cs.ucdavis.edu/book/book-aands/preface.pdf Chapter 1, "An Overview of Computer Security" http://nob.cs.ucdavis.edu/book/book-aands/aands01.pdf Chapter 13, "Design Principles" http://nob.cs.ucdavis.edu/book/book-aands/aands13.pdf Slides http://nob.cs.ucdavis.edu/book/book-aands/slides/index.html Introduction to Computer Security, Matt Bishop ISBN 0-321-24744-2; Publisher Addison Wesley Professional; Copyright 2005; Format Cloth; 784 pp.; Library of Congress Number QA76.9.A25 B563 2004. Table of Content: http://nob.cs.ucdavis.edu/book/book-intro/toc.pdf Preface http://nob.cs.ucdavis.edu/book/book-intro/preface.pdf Chapter 1, "An Overview of Computer Security" http://nob.cs.ucdavis.edu/book/book-intro/intro01.pdf Chapter 15, 'Information Flow" http://nob.cs.ucdavis.edu/book/book-intro/intro15.pdf Slides http://nob.cs.ucdavis.edu/book/book-intro/slides/index.html
Handbook of Information Security Management Imprint: Auerbach Publications) Publisher: CRC Press LLC) Authors: Micki Krause, Harold F. Tipton ISBN: 0849399475 http://www.cccure.org/Documents/HISM/ewtoc.html Hand Book of Applied Cryptography Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone CRC Press ISBN: 0-8493-8523-7 October 1996, 816 pages http://www.cacr.math.uwaterloo.ca/hac/ An Introduction to Cryptography; released June 8, 2004. Copyright © 1991---2004 by PGP Corporation. http://download.pgp.com/pdfs/Intro_to_Crypto_040600_F.pdf An Introduction to Cryptography Copyright © 1990-1998 Network Associates, Inc. http://www.ncsa.uiuc.edu/People/ncsairst/pgp/IntroToCrypto.pdf Cryptography http://www.cccure.org/Documents/Cryptography/cisspallinone.pdf J2EE Programming with Passion! Security (Cryptography)Basics Sang Shin Technology Evangelist Sun Microsystems, Inc. http://www.javapassion.com/j2ee/SecurityBasics_speakernoted.pdf Introduction to Modern Cryptography By: Mihir Bellare and Phillip Rogaway http://www-cse.ucsd.edu/users/mihir/cse207/classnotes.html Articles relevant to ICT security Career Guide: Decoding the Information Security Profession Sponsored by Microsoft, 2005 https://www.isc2.org/download/careerguide05.pdf An Introduction to Security Compiled By: S.K.PARMAR, Cst N.Cowichan Duncan RCMP Det 6060 Canada Ave., Duncan, BC 250-748-5522 http://www.hipaadvisory.com/tech/Manual99Pdf.pdf Electronic Information Security February 8, 2005 University of California http://www.ucop.edu/ucophome/policies/bfb/is3.pdf The GPCG Computer Security Self-Assessment Guideline and Checklist for General Practitioners 2nd edition January 2005 http://www.gpcg.org/publications/docs/2004%20Phase1Proj/SecurityGuidelines.pdf Index of /books/net_security/ Use the following link, so that the following ebooks easily: http://files.nixp.ru/books/net_security/ 1. Computer, Network & Internet Security.pdf 2. O'Reilly -- Essential SNMP.chm 3. O'Reilly -- LDAP System Administration.chm 4. O'Reilly -- Network Troubleshooting Tools.pdf 5. O'Reilly -- The Network Administration Guide.chm 6. O'Reilly -- Virtual Private Networks, 2nd Ed.pdf 7. Prentice Hall -- The Practice Of Network Securiurity 8. Que -- Maximum Security, 4th Edition.chm 9. Sybex -- Active Defense -- A Comprehensive Guid to network security.pdf 10. Sybex -- Encylopedia of Networking.pdf 11. Syngress -- Hack Proofing Your Network, 2nd Ed.pdf 12. Syngress -- Hack Proofing Your Wireless Network.pdf 13. Syngress -- Host and Network Security for MS, 14. Syngress -- Managing Cisco Network Security.pdf 15. Syngress -- Mission Critical Internet Security.pdf 16. Wiley -- Internet Security.pdf Computer Security is Not a Science (but it should be) Michael Greenwald Carl A, Gunter Bj¨orn Knutsson, Andre Scedrov Jonathan M, Smith Steve Zdancewic, University of Pennsylvania http://www.cis.upenn.edu/~stevez/papers/GGKS+03.pdf Computer Security: Links and Resources http://academicaffairs.ucsd.edu/staffhr/training/compsecurity.htm Why Information Security is Hard: An Economic Perspective Ross Anderson, University of Cambridge Computer Laboratory, http://www.acsac.org/2001/papers/110.pdf SECURITY IN THE INFORMATION AGE: NEW CHALLENGES, NEW STRATEGIES http://www.house.gov/jec/security.pdf An interesting essays on Computer Security (Prof E Stewart Lee, Cambridge U) http://www.cl.cam.ac.uk/~mgk25/lee-essays.pdf WHY SECURITY POLICIES FAIL http://downloads.securityfocus.com/library/Why_Security_Policies_Fail.pdf Computer Security in the Real World, Butler W. Lampson: Microsoft http://ocw.mit.edu/NR/rdonlyres/Electrical-Engineering-and-Computer-Science/6-826Principles-of-Computer-SystemsSpring2002/8824EACC-5B17-40DF-92C9-9A868FAB7690/0/31security.pdf
Technical Resources and Course Web Site for Cryptography and Network Security: Principles and Practice, Second Edition http://williamstallings.com/Security2e.html A Glimpse of the History of Cryptography Cunsheng Ding Department of Computer Science HKUST, Hong Kong, CHINA http://www.cs.ust.hk/emb/projects/ciphers/history1.pdf http://www.cs.ust.hk/faculty/cding/COMP364/SLIDES/history2.pdf http://www.cs.ust.hk/faculty/cding/COMP364/slides.html Cryptography and Information Security Dr Yoan Pinzon, Department of Computer Science Kings College London see: the ten slides part in the bottom of the apage http://www.dcs.kcl.ac.uk/staff/pinzon/csmcis/ Cryptography WAKE FOREST http://frode.home.cern.ch/frode/pubs/beckrevw.pdf Cryptography in Storage Networks Storage Networking Industry Association Hugo Fruehauf, CEO and CTO, Zyfer Inc. http://www.snia.org/apps/group_public/download.php/1631/Cryptography_in_Storage_Networks.pdf Cryptography and Security: Authors and titles for recent submissions http://xxx.sf.nchc.gov.tw/list/cs.CR/recent Journal of Cryptology Publisher: Springer-Verlag New York, LLC ISSN: 0933-2790 (Paper) 1432-1378 (Online) http://springerlink.metapress.com/(tsks3qvxgnsywhjidzctxn45)/app/home/journal.asp?referrer=parent&backto=linkingpublicationresults,1:100359,1 IWS - Information Warfara site http://www.iwar.org.uk/comsec/resources/security-lecture/index.html
|
Debian ,Knoppix ,Slackware Linux
Slackware Linux |
![]() |