CIS 3360: Security In Computing
Notes



Notes for this course will be posted to this page as soon as they are available. The best way to view these notes is to right-click the notes link you wish to view, select Save Target As... from the shortcut menu (some Web browsers will say Save As instead), and then save the notes to your computer. After saving the notes, navigate to the location where the notes file resides and double-click the icon to run it.


Chapter 1 - Introduction
Chapter 2 - Physical Security - Authentication
Chapter 2 - Physical Security - Computer Forensics
Chapter 2 - Physical Security - Direct
Chapter 2 - Physical Security - Locks
Chapter 2 - Physical Security - RFID Security
Chapter 3 - OS Security - Buffer Overflow
Chapter 3 - OS Security - File System Security
Chapter 3 - OS Security - OS
Chapter 3 - OS Security - OSSec
Chapter 4 - Malware
Chapter 5 - Network Security 1 - Network Models ARP
Chapter 5 - Network Security 1- Network Models TCP/IP
Chapter 6 - Network Security 2 - Firewalls
Chapter 6 - Network Security 2 - DNS
Chapter 6 - Network Security 2 - Wireless Networks
Chapter 7 - Web Security
Chapter 8 - Cryptography Concepts
Chapter 8 - Cryptography - Data Integrity
Chapter 9 - Security Models and Practice - Kerberos
Chapter 9 - Security Models and Practice - Models
Chapter 9 - Security Models and Practice - Penetration Testing
Chapter 9 - Security Models and Practice - Secure Storage
Chapter 10 - Distributed-Applications Security - Database
Chapter 10 - Distributed-Applications Security - DRM
Chapter 10 - Distributed-Applications Security - Payment Systems
Chapter 10 - Distributed-Applications Security - Spam