Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.

Security Topics CSC 5387: Home

This Course Guide helps you identify some of the resources available at Mohammed VI Library. For more information please get in touch with Your Librarian whose contact information is listed below right.

Vocabulary list

Please use the vocabulary list below to search the library catalog, through the keyword function, to identify materials relevant to this course.

  • Information System Security
  • Security management systems
  • Security measures
  • Cryptography



"This domain identifies application software development flaws and threats, and addresses the related security concepts and countermeasures. It outlines the environment where software is designed and developed and explains the critical role software plays in providing information system security. A special attention is given to web and mobile applications. Topics include: software flaws (buffer and stack overrun) and exploits; viruses, malware and shell code; web applications flaws and exploits: XSS and SQL Injection; mobile applications security issues; user and application authentication: Kerberos, X509 authentication service, web authentication (CAS) and SSO, strong authentication, authentication delegation; application access control methods; electronic Mail Security: SMIME, PGP; PKI and PKCS 7/11; programming with encryption (JCE APIs); biometrics, and strong authentication; software configuration management; secure software development lifecycle and principles."

Library of Congress Classes and Subclasses

Please use the call number below to search the library catalog, through the Call Number function, to browse the library collection listing materials relevant to this course.

  • QA76.9 .A25  Computer Security
  • T58.64  Security in Information Systems

Subject Guide