Things you need

— or might need

Be sure you have access to the Linux machines in the iLabs on the second floor annex of Hill. You will need to use your RU ID card to access the room and can request access at You can access the machines remotely via a web browser. For help, there are iLab Assistants in Hill 252 (The Cave). You should be able to use other machines (e.g., PCs running Linux, some flavor of BSD, Mac OS X, or — for some or all assignments — even a Windows PC running cygwin) but I will not accept the excuse of not having an account in time to finish an assignment. If you develop your assignment on another system, you should ensure that it compiles and runs on a Linux system.

You will need to check the class web page regularly since I will be posting notices, assignment source/data, changes to the syllabus, and exam results there.

I will be using several sources for this course. The primary text will be:

Security Engineering: A Guide to Building Dependable Distributed Systems
2nd Edition
by Ross J. Anderson
Wiley, Pub.
ISBN-10: 0470068523
ISBN-13: 978-0470068526

The text is available online free (legally!) at the author's website at the University of Cambridge Computer Laboratory.

If you'd like to buy a dead tree version, it is $64.97 at Amazon.

I will also make use of these texts but do not expect you to buy them:

Thinking Security: Stopping Next Year's Hackers
1st Edition
by Steven M. Bellovin
Addison-Wesley, Pub.
ISBN-10: 0134277546
ISBN-13: 978-0134277547

Introduction to Computer Security
1st Edition
by Matt Bishop
Addison-Wesley, Pub.
ISBN-10: 0321247442
ISBN-13: 978-0321247445

Secrets and Lies: Digital Security in a Networked World
1st Edition
by Bruce Schneier
Wiley, Pub.
ISBN-10: 0471453803
ISBN-13: 978-0471453802