SEGURIDAD INFORMATICA

Comprender los aspectos básicos de la seguridad informática y entender la importancia de la seguridad dentro de los ambientes de sistemas computacionales.

 [ Temario | Bibliografía | Material de apoyo | Slides de Apoyo | Material Tareas | Calificaciones | Políticas/SyllabusPrograma del curso ]


Temario:


Bibliografía

                     
               

Security in Computing,
C. Pfleeger,
Prentice Hall, 1996,
2nd edition


Applied Cryptography: Protocols, Algorithms, and Source Code in C,
Bruce Schneier,
1995, 2nd Edition

Network Intrusion Detection,
Stephen Northcutt, Judy Novak,
Ed. Sams; 2002, 3 edition

Computer Security Basics,
D. Russell and G.T. Gangeni,
O'Reilly & Associates; 1991

Network Security, Private Communication in a Public World,
C. Kaufman, R. Perlman, M. Speciner,
Ed. Prentice Hall, 2002, 2da. Edición

Building DMZs for Enterprise Networks,
R.J. Shimonski, W. Schmied, V. Chang, T.W. Shinder,
Ed. Syngress; 2003

Inside Network Perimeter Security: The Definitive Guide to Firewalls,
Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems,
S. Northcutt, L. Zeltser, S. Winters, Karen Fredrick, Ronald W. Ritchey,
Ed. Sams; 2005, 2da. Edición

Unix Network Programming,
Vol 1: Networking APIs: sockets and XTI, 
R. Stevens,
Ed. Prentice Hall, 1990

Unix Systems Programming: Communication, Concurrency and Threads,
K. Robbins, S. Robbins,
Ed. Prentice Hall; 2003, 2 edition

C How to Program,
H.M. Deitel, P.J. Deitel,
Ed. Prentice Hall, 2000



Material de apoyo

   Regresar                                                       |Regreso a la página principal|