<-----------------------------------------------------------------> This area will be updated with information relevant to the course Weller, R., Clements, R., Dugdale, K., et al.Introduction to the New Mainframe: Security, Redbook 2007. URL: http://www.redbooks.ibm.com/abstracts/sg246776.html (BIN) Weller -- Book (HTM) Weller -- Book link Cook, J., Cantalupo, J.C., & Lee, M. Security Guide for IBM i V6.1 Redbook 2009. URL: http://www.redbooks.ibm.com/abstracts/sg247680.html (BIN) Cook -- Book (HTM) Cook -- Book link Anderson, R. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley 2001. URL: http://www.cl.cam.ac.uk/~rja14/book.html (BIN) Anderson -- Book (HTM) Anderson -- Book link Parmar, S.K. Introduction to Computer, Internet & Network Systems Security. URL: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.5669 (BIN) Parmar -- Book (HTM) Parmar -- Book link Menezes, A.J., van Oorschot, P., & Vanstone, S.A. Handbook of Applied Cryptography, CRC Press, ISBN: 0-8493-8523-7, October 1996, Fourth Printing (July 1999). URL: http://www.cacr.math.uwaterloo.ca/hac/ (HTM) Menezes -- Optional book link National Institute of Standards and Technology (NIST), Information Technology Laboratory, Computer Security Division. Collection of free publications on security. (HTM) NIST Computer Security Resource Center This is an amateur web site that collects security tools. It links to other useful sites like http://seclists.org/. (HTM) Security tools collection (DIR) <= go back <----------------------------------------------------------------->