This shows you the differences between two versions of the page.
isc:info:resources [2019/05/17 20:36] mihai.chiroiu |
isc:info:resources [2024/10/14 11:20] (current) mihai.chiroiu |
||
---|---|---|---|
Line 1: | Line 1: | ||
=== Useful resources === | === Useful resources === | ||
- | * Books: | + | * Lecture's book: |
+ | * [[https://people.scs.carleton.ca/~paulv/toolsjewels.html|Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin, Second Edition]] by Paul C. van Oorschot | ||
+ | * Other books: | ||
* [[https://www.cl.cam.ac.uk/~rja14/book.html|Security Engineering]] by Ross Anderson | * [[https://www.cl.cam.ac.uk/~rja14/book.html|Security Engineering]] by Ross Anderson | ||
* [[https://www.schneier.com/books/applied_cryptography|Applied Cryptography]] by Bruce Schneier | * [[https://www.schneier.com/books/applied_cryptography|Applied Cryptography]] by Bruce Schneier | ||
* Similar lectures | * Similar lectures | ||
- | * [[https://www.csc.ncsu.edu/faculty/enck/csc574-s16/|Computer & Network Security]] by William Enck | + | * [[https://people.engr.ncsu.edu/whenck/csc574/f22/schedule.html|Computer & Network Security]] by William Enck |
+ | * [[https://www.cs.princeton.edu/~arvindn/teaching/fall-2012-privacy-technologies/|Advanced Topics in Computer Science: | ||
+ | Privacy Technologies]] by Arvind Narayanan | ||
+ | * [[http://www.ra.cs.uni-tuebingen.de/lehre/ss11/introd_comp_sec.html|Introduction to Computer Security]] by Pavel Laskov | ||
* Tutorials | * Tutorials | ||
* [[https://thebestvpn.com/cryptography/ | Introduction to cryptography]] by John Mason | * [[https://thebestvpn.com/cryptography/ | Introduction to cryptography]] by John Mason | ||
- | * Paper | + | * Papers |
* [[https://people.eecs.berkeley.edu/~dawnsong/papers/Oakland13-SoK-CR.pdf | Eternal War in Memory]] | * [[https://people.eecs.berkeley.edu/~dawnsong/papers/Oakland13-SoK-CR.pdf | Eternal War in Memory]] |