Be sure you have access to the Linux machines in the iLabs on the second floor annex of Hill. You will need to use your RU ID card to access the room and can request access at www.cs.rutgers.edu/resources/systems/ilab/. For help, there are iLab Assistants in Hill 252 (The Cave).
You should be able to use other machines (e.g., PCs running Linux, some flavor of BSD, Mac OS X, or — for some or all assignments — even a Windows PC running the Windows Subsystem for Linux or Cygwin. but I will not accept the excuse of not having an account in time to finish an assignment. If you develop your assignment on another system, you should ensure that it compiles and runs on an iLab Linux system.
You will need to check the class web page regularly since I will be posting notices, assignment source/data, changes to the syllabus, and exam results there.
I will be using several sources for this course, including:
Security Engineering: A Guide to Building Dependable Distributed Systems]
by Ross J. Anderson
The text is available for free online — legally — at the author’s website at the University of Cambridge Computer Laboratory.
If you’d like to buy a dead tree version, you can get one from Amazon.
I will also make use of these texts but do not expect you to buy them:
Handbook of Applied Cryptography
Fifth Printing Edition
by Alfred J. Menezes, Jonathan Katz, Paul C. van Oorschot, Scott A. Vanstone
CRC Press; 1^st^ edition (December 16, 1996)
Sample chapters available for free at cacr.uwaterloo.ca/hac.
Thinking Security: Stopping Next Year’s Hackers
by Steven M. Bellovin
Introduction to Computer Security
by Matt Bishop
Secrets and Lies: Digital Security in a Networked World
by Bruce Schneier