<----------------------------------------------------------------->
This area will be updated with information relevant to the course
Weller, R., Clements, R., Dugdale, K., et al.Introduction to the
New Mainframe: Security, Redbook 2007.
URL: http://www.redbooks.ibm.com/abstracts/sg246776.html
(BIN) Weller -- Book
(HTM) Weller -- Book link
Cook, J., Cantalupo, J.C., & Lee, M. Security Guide for IBM i V6.1
Redbook 2009.
URL: http://www.redbooks.ibm.com/abstracts/sg247680.html
(BIN) Cook -- Book
(HTM) Cook -- Book link
Anderson, R. Security Engineering: A Guide to Building Dependable
Distributed Systems. Wiley 2001.
URL: http://www.cl.cam.ac.uk/~rja14/book.html
(BIN) Anderson -- Book
(HTM) Anderson -- Book link
Parmar, S.K. Introduction to Computer, Internet & Network Systems
Security. URL:
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.5669
(BIN) Parmar -- Book
(HTM) Parmar -- Book link
Menezes, A.J., van Oorschot, P., & Vanstone, S.A.
Handbook of Applied Cryptography, CRC Press, ISBN: 0-8493-8523-7,
October 1996, Fourth Printing (July 1999).
URL: http://www.cacr.math.uwaterloo.ca/hac/
(HTM) Menezes -- Optional book link
National Institute of Standards and Technology (NIST),
Information Technology Laboratory, Computer Security Division.
Collection of free publications on security.
(HTM) NIST Computer Security Resource Center
This is an amateur web site that collects security tools.
It links to other useful sites like http://seclists.org/.
(HTM) Security tools collection
(DIR) <= go back
<----------------------------------------------------------------->