The outline below structures the topics to be covered in class this semester. We are hoping to cover a lot of material, and there is some risk that we won't get through it all.
The outline also contains links to scribed lecture notes for related, past CS513 lectures and, in a few places, draft chapters for a new textbook. These written notes are being offered solely on an "as is" basis --- what is actually covered in lecture this semester and the manner in which that material is presented may differ from these scribed lecture notes. Note. Cornell University Policy restricts the use of these notes. In addition, these notes are copyright F.B. Schneider. All rights reserved.
Readings to accompany each topic are indicated within the outline in square brackets.
|[B]||Matt Bishop, Introduction to Computer Security, Addison Wesley, 2005.|
|[KPS]||Charlie Kaufman, Radia Perlman, and Mike Speciner. Network Security. Private Communication in a Public World. Prentice Hall, 1995.|
|[S]||Bruce Schneier. Applied Cryptography. Second Edition. Wiley, 1996.|
Links are also given to other sources that expand upon the material that will be covered in lecture.
Entries in the outline prefixed by * are given for students wishing to go beyond the anticipated scope of this semester's CS513 offering.