Reading

This is the reading list for CSCI E45b. Do not be put off by the amount of material. The first thing to do is to read the first required reading for Module 1 (Google Effects) and from it understand why we feel that it is not only OK but important to assign so much reading. The real world has far more reading that could be done when researching any particular topic than can reasonably be done thus, selective reading and remembering where a topic was discussed is more important than memorizing the details in a particular document. Finally, note that all of our readings are links to external sites.

Module 1 - Introduction

Required Reading

Optional Reading

 

Module 2 – Internet Governance

Required Reading

Optional Reading

 

Module 3 – Internet Application Protocols

Required Reading

Optional Reading

 

Module 4 – Identity and Authentication

Required Reading

Optional Reading

 

Module 5 – Trust and Privacy

Required Reading

Optional Reading

 

Module 6 – Security Threats I

Required Reading

Optional Reading

 

Module 7 – Security Threats II

Required Reading

Optional Reading

 

Module 8 – Protecting the Infrastructure

Required Reading

Optional Reading

 

Module 9 – Usability and Accessibility

Required Reading

Optional Reading

 

Module 10 – Cyber Conflict

Required Reading

Optional Reading

 

Module 11 – Commerce, DRM

Required Reading

Optional Reading

 

Module 12 – Security Policy & Mindset

Required Reading

Module 13 – Surveillance, Counter Surveillance

Required Reading

Optional Reading

 

Module 14 – Safe computing and Networking

Required Reading