Software Engineering 4C03
Computer Networks and Computer Security
Winter 2003

Instructor: William M. Farmer


References

A. Books

  1. C. Brenton, Mastering Network Security, Sybek, 1999.
  2. W. R. Cheswick and S. M. Bellovin, Firewalls and Internet Security, Addison-Wesley, 1994.
  3. D. E. Comer Internetworking with TCP/IP: Principles, Protocols, and Architectures, Volumes 1-3, Prentice Hall, 1997-2000.
  4. S. Garfinkel and G. Spafford, Practical Unix and Internet Security, Second Edition, O'Reilly, 1996.
  5. W. Stallings, Cryptography and Network Security, Second Edition, Prentice Hall, 1999.
  6. W. R. Stevens et al., TCP/IP Illustrated, Volumes 1-3, Addison-Wesley, 1994-1996.
  7. E. D. Zwicky, S. Cooper, and D. B Chapman, Building Internet Firewalls, Second Edition, O'Reilly, 1995.

B. Papers

  1. Terry Dawson and Alessandro Rubini, Linux NET-3-HOWTO, Linux Networking, v1.4, August 1998 (/usr/doc/HOWTO/NET-3-HOWTO).

C. Web Documents and Sites

  1. CERT Coordination Center.
  2. Cisco Systems.
  3. Internet Society.
  4. Network Associates.
  5. OpenBSD Journal.
  6. Password Generator.
  7. Redhat Linux.
  8. "Remote timing attacks are practical" by D. Boneh and D. Brumley.
  9. RSA Security.
  10. Secure Shell (SSH) Commercial Noncommercial.
  11. Secure Socket Layer (SSL).
  12. SecurityFocus.
  13. "Smashing The Stack For Fun And Profit".
  14. "Steganographic Encoding of Information Using a Non-Deterministic Finite State Automaton" by D. E. Weekly
  15. "Wireless LAN resources for Linux".