Handouts
These are available on your
UC Davis SmartSite
ECS 155 workspace.
Web Pages
Here are links to the web pages that are on the reading list.
- [Balc]
- Aaron Balchunas, “Introduction to Firewalls”, available at http://www.routeralley.com/ra/docs/intro_firewalls.pdf
- [Barb06]
- Michael Barbaro and Tom Zeller Jr., “A Face is Exposed for AOL Searcher No. 4417749”, New York Times (Aug. 9, 2006); available at http://www.nytimes.com/2006/08/09/technology/09aol.html
- [Bish07]
- Matt Bishop, “Overview of Red Team Reports”, available at http://www.sos.ca.gov/voting-systems/oversight/ttbr/red-overview.pdf
- [Clar53]
- Arthur C. Clarke, “Superiority”, in Expedition to Earth, Ballantine Books, New York, NY (1953); available at http://www.mayofamily.com/RLM/txt_Clarke_Superiority.html
- [Cond]
- Jamie Condliffe, “Easily Understand Encryption Using
Paint and Clocks?” available at http://gizmodo.com/5888567/how-to-understand-encryption-using-paint-and-clocks
- [Danh11]
- Pieter Danhieux, “E-mail Phishing and Scams”, OUCH! (Dec. 2011); available at http://www.securingthehuman.org/newsletters/ouch/issues/OUCH-201112_en.pdf
- [Danh13]
- Pieter Danhieux, “E-mail Phishing Attacks”, OUCH! (Feb. 2013); available at http://www.securingthehuman.org/newsletters/ouch/issues/OUCH-201302_en.pdf
- [Demo13]
- Ted Demopoulos, “Social Networking Safely”, OUCH! (Mar. 2013); available at http://www.securingthehuman.org/newsletters/ouch/issues/OUCH-201303_en.pdf
- [Educ]
- “7 Things You Should Know About Federated Identity Management”, available at http://net.educause.edu/ir/library/pdf/EST0903.pdf
- [Emer]
- “The Security Principles of Saltzer and Schroeder”, available at
http://emergentchaos.com/the-security-principles-of-saltzer-and-schroeder
- [Good]
- Dan Goodin, “Anatomy of a Hack: How Crackers Ransack Passwords Line ‘qeadzcwrsfxv1331’ ” available at http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords
- [Hipsa]
- Ron Hipschman, “The Secret Language”, available at http://www.exploratorium.edu/ronh/secret/secret.html
- [Hipsb]
- Ron Hipschman, “Internet 101.101.101.101”, available at http://www.exploratorium.edu/ronh/tcpip/index.html
- [John12]
- Kevin Johnson, “Securing Your Mobile Device Apps”, OUCH! (Feb. 2012); available at http://www.securingthehuman.org/newsletters/ouch/issues/OUCH-201202_en.pdf
- [Kerb12]
- Fred Kerby, “Two-Factor Authentication”, OUCH! (Nov. 2012); available at http://www.securingthehuman.org/newsletters/ouch/issues/OUCH-201211_en.pdf
- [PGPI]
- “How PGP Works”, available at http://www.pgpi.org/doc/pgpintro/
- [Secu]
- “Two-Step Verification”, OUCH! (Aug. 2013); available at http://www.securingthehuman.org/newsletters/ouch/issues/OUCH-201308_en.pdf
- [Webp]
- “How Does the Internet Work?” available at http://docs.webplatform.org/wiki/concepts/internet_and_web/how_does_the_internet_work
- [Wrig11]
- Joshua Wright, “Using Your Smartphone Securely”, OUCH! (Feb. 2011); available at http://www.securingthehuman.org/newsletters/ouch/issues/OUCH-201102_en.pdf
Other Documents
They are not here because some of the documents are
available only to class members.
|
ECS 155, Computer Security for Non-Majors Fall Quarter 2013 |