|
Dan Wallach, Department
of Computer Science, Rice University
Spring 1999 |
| Are you looking for the current Comp527 Web page? |
This class will focus on computer security in real systems. We will cover theory and practice for the design of secure systems (formal modelling, hardware and compiler-enforced safety, software engineering processes, tamper-resistant and tamper-reactive hardware, firewalls, cryptography, and more). We will also discuss how and why each of these techniques fail.
Course syllabus, grading policies, final project.
|
Internet Besieged: Countering Cyberspace Scofflaws
Dorothy E. Denning and Peter J. Denning, eds. Addison-Wesley / ACM Press Paperback - 547 pages (October 1997) |
If you have trouble getting the book locally, you can always try buying it at Amazon.com, Bookpool, or directly from the ACM press. Bookpool seems to have the best prices.
| Dan Wallach | (room 3004) | M 2-3, Tu 11-12 |
| Jingsong He | (room 2070) | W 3-4 |
| Li Xu | (room 3061) | Th 4-5 |
You can also send e-mail to arrange an appointment.