This is the "Home" page of the "Security Topics CSC 5387" guide.
Alternate Page for Screenreader Users
Skip to Page Navigation
Skip to Page Content

Security Topics CSC 5387   Tags: csc 5387  

This Course Guide helps you identify some of the resources available at Mohammed VI Library. For more information please get in touch with Your Librarian whose contact information is listed below right.
Last Updated: Jan 15, 2013 URL: http://libguides.aui.ma/content.php?pid=420859 Print Guide RSS Updates

Home Print Page
  Search: 
 
 

Vocabulary list

Please use the vocabulary list below to search the library catalog, through the keyword function, to identify materials relevant to this course.

  • Information System Security
  • Security management systems
  • Security measures
  • Cryptography

 

 

Introduction

"This domain identifies application software development flaws and threats, and addresses the related security concepts and countermeasures. It outlines the environment where software is designed and developed and explains the critical role software plays in providing information system security. A special attention is given to web and mobile applications. Topics include: software flaws (buffer and stack overrun) and exploits; viruses, malware and shell code; web applications flaws and exploits: XSS and SQL Injection; mobile applications security issues; user and application authentication: Kerberos, X509 authentication service, web authentication (CAS) and SSO, strong authentication, authentication delegation; application access control methods; electronic Mail Security: SMIME, PGP; PKI and PKCS 7/11; programming with encryption (JCE APIs); biometrics, and strong authentication; software configuration management; secure software development lifecycle and principles."

 

Library of Congress Classes and Subclasses

Please use the call number below to search the library catalog, through the Call Number function, to browse the library collection listing materials relevant to this course.

  • QA76.9 .A25  Computer Security
  • T58.64  Security in Information Systems

Your Contact

Profile Image
Rachid Zegrane
Contact Info
Send Email
 
Description

Loading  Loading...

Tip