Dan Wallach, Department
of Computer Science, Rice University
Spring 1999 |
Are you looking for the current Comp527 Web page? |
This class will focus on computer security in real systems. We will cover theory and practice for the design of secure systems (formal modelling, hardware and compiler-enforced safety, software engineering processes, tamper-resistant and tamper-reactive hardware, firewalls, cryptography, and more). We will also discuss how and why each of these techniques fail.
Course syllabus, grading policies, final project.
Internet Besieged: Countering Cyberspace Scofflaws
Dorothy E. Denning and Peter J. Denning, eds. Addison-Wesley / ACM Press Paperback - 547 pages (October 1997) |
If you have trouble getting the book locally, you can always try buying it at Amazon.com, Bookpool, or directly from the ACM press. Bookpool seems to have the best prices.
Dan Wallach | (room 3004) | M 2-3, Tu 11-12 |
Jingsong He | (room 2070) | W 3-4 |
Li Xu | (room 3061) | Th 4-5 |
You can also send e-mail to arrange an appointment.