This course site features problem sets with solutions (including student submissions) and a full reading list.
» Download the complete contents of this course.
- Techniques for achieving security in multi-user computer systems and distributed computer systems;
- Cryptography: secret-key, public-key, digital signatures;
- Authentication and identification schemes;
- Intrusion detection: viruses;
- Formal models of computer security;
- Secure operating systems;
- Software protection;
- Security of electronic mail and the World Wide Web;
- Electronic commerce: payment protocols, electronic cash;
- Firewalls; and
- Risk assessment.
File decompression software, such as Winzip® or StuffIt®, is required to open the .zip files found on this course site. Any text editor can be used to view the .asc files found on this course site. Any number of development tools can be used to compile and run the .java files found on this course site. The .bin files found on this course site are computer-readable files. Please refer to the course materials for any further specific instructions or recommendations.
*Some translations represent previous versions of courses.