Below is a schedule with a tentative calendar of topics and links to lecture notes and problem sets.
Textbooks (for both required reading and optional reading)
- AC = Schneier, Applied Cryptography
- CH = Skoudis, CounterHack: A Step-by-Step Guide to Computer Attacks and Effective Defenses
- CSAS = Bishop, Computer Security: Art and Science
- HAE = Erickson, Hacking: The Art of Exploitation (2nd edition, 2008)
- HLE = Hatch, Lee, and Kurtz, Hacking Linux Exposed: Linux Security Secrets and Solutions
- HTNG = Dhanjani, Rios, and Hardin, Hacking: The Next Generation
- MW = Skoudis, Malware: Fighting Malicious Code
- NS = Kaufman, Perlman, and Speciner, Network Security: Private Communication in a Public World (2nd edition, 2002)
- SE = Anderson, Security Engineering (2nd edition, 2008)
- S&M = Smith and Marchesini, The Craft of System Security
Based on JavaScript calendar program by Mark A. Sheldon (msheldon@wellesley.edu)
Last Modified 13 September 2014