<----------------------------------------------------------------->
       This area will be updated with information relevant to the course
       
       Weller, R., Clements, R., Dugdale, K., et al.Introduction to the 
       New Mainframe: Security, Redbook 2007. 
       URL: http://www.redbooks.ibm.com/abstracts/sg246776.html
 (BIN) Weller -- Book
 (HTM) Weller -- Book link
       
       
       Cook, J., Cantalupo, J.C., & Lee, M. Security Guide for IBM i V6.1
       Redbook 2009. 
       URL: http://www.redbooks.ibm.com/abstracts/sg247680.html
 (BIN) Cook -- Book
 (HTM) Cook -- Book link
       
       
       Anderson, R. Security Engineering: A Guide to Building Dependable
       Distributed Systems. Wiley 2001. 
       URL: http://www.cl.cam.ac.uk/~rja14/book.html
 (BIN) Anderson -- Book
 (HTM) Anderson -- Book link
       
       
       Parmar, S.K. Introduction to Computer, Internet & Network Systems
       Security. URL:
       http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.5669
 (BIN) Parmar -- Book
 (HTM) Parmar -- Book link
       
       
       Menezes, A.J., van Oorschot, P., & Vanstone, S.A. 
       Handbook of Applied Cryptography, CRC Press, ISBN: 0-8493-8523-7,
       October 1996, Fourth Printing (July 1999). 
       URL: http://www.cacr.math.uwaterloo.ca/hac/
 (HTM) Menezes -- Optional book link
       
       
       National Institute of Standards and Technology (NIST), 
       Information Technology Laboratory, Computer Security Division.
       Collection of free publications on security.
 (HTM) NIST Computer Security Resource Center
       
       
       This is an amateur web site that collects security tools. 
       It links to other useful sites like http://seclists.org/.
 (HTM) Security tools collection
       
 (DIR) <= go back
       <----------------------------------------------------------------->