ee4215_c0 - minimum pass mark 35% 0.4 Book Lists H.L....

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
0.1 Course Aims & Objectives Aim to provide students with the knowledge in computer security technologies Principles of cryptography will be discussed Techniques for computer data, communications and card technologies will be covered in depth. Representative methods used in magnetic card and smart card will be described.
Background image of page 2
0.2 Syllabus Introduction Threats to Computer Systems Preventive Security Approaches Logistic Security Approaches Card Security Applications Internet Security Applications
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
0.3 Teaching Patten Lecture/Tutorial 33 hours Lab 3 hours
Background image of page 4
0.4 Assessment Pattern Course Work: 40% (3 x Quizzes@10%, 1 x assignment @10%, 1 x Lab (10%) and 1 x tests @10%) Examination: 60% (two hours)
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 6
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 8
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: minimum pass mark 35% 0.4 Book Lists H.L. Capron: Computer Tools for Information Age, Addison Welsey, 2004 Matt Bishop Computer Security Art and Science, Addison Wisley, 2002, ISBN -201-44099-7 Supplementary B. Schneier: Applied Cryptography, Wiley, 1996 D. E. Denning: Information Warfare and Security, Addison Wesley, 1999 Eric Cole: Hackers Beware, New Riders, 2001 W Stallings, Cryptography and Network Security Principle and Practice, Prentice Hall 2005 A.G. Konheim, Computer Security & Cryptography, John Wiley & Son, 2007 0.5 References ISO 7811/2 Standard ISO 7816/1-4 Standards www.commoncriteria.org...
View Full Document

Page1 / 8

ee4215_c0 - minimum pass mark 35% 0.4 Book Lists H.L....

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online