Comprender los aspectos básicos de la seguridad informática y entender la importancia de la seguridad dentro de los ambientes de sistemas computacionales.
[ Temario | Bibliografía | Material de apoyo | Slides de Apoyo | Material Tareas | Calificaciones | Políticas/Syllabus | Programa del curso ]
|
Security in Computing, C. Pfleeger, Prentice Hall, 1996, 2nd edition |
|
Applied Cryptography: Protocols, Algorithms,
and Source Code in C, Bruce Schneier, 1995, 2nd Edition |
|
Network Intrusion Detection, Stephen Northcutt, Judy Novak, Ed. Sams; 2002, 3 edition |
|
Computer Security Basics, D. Russell and G.T. Gangeni, O'Reilly & Associates; 1991 |
|
Network Security, Private Communication in a
Public World, C. Kaufman, R. Perlman, M. Speciner, Ed. Prentice Hall, 2002, 2da. Edición |
|
Building DMZs for Enterprise Networks, R.J. Shimonski, W. Schmied, V. Chang, T.W. Shinder, Ed. Syngress; 2003 |
|
Inside Network Perimeter Security: The
Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems, S. Northcutt, L. Zeltser, S. Winters, Karen Fredrick, Ronald W. Ritchey, Ed. Sams; 2005, 2da. Edición |
|
Unix Network Programming, Vol 1: Networking APIs: sockets and XTI, R. Stevens, Ed. Prentice Hall, 1990 |
|
Unix Systems Programming: Communication,
Concurrency and Threads, K. Robbins, S. Robbins, Ed. Prentice Hall; 2003, 2 edition |
|
C How to Program, H.M. Deitel, P.J. Deitel, Ed. Prentice Hall, 2000 |
Regresar |Regreso a la página principal|