電腦攻擊與防禦 The Attack and Defense of Computers CE6107 許富皓
Books Hacking Exposed, Fifth Edition Authors: Stuart McClure, Joel Scambray, and George Kurtz Publisher: Mc Graw Hill Practical Unix & Internet Security, 3rd Edition Authors: Simson Garfinkel and Gene Spafford Publisher: O Reilly
Contents: Footprinting Scanning Enumeration Port-Scanning OS fingerprinting. Hacking Unix Buffer Overflow Attacks/Return Into Libc Attacks Internet Worm Format String Attacks Input Validation Attacks Integer Overflow and Integer Sign Attacks TCP session Hijacking Denial of Service Attacks/Distributed DoS
Important Security Conferences: http://www.cl.cam.ac.uk/Research/Security/conferences/all.html IEEE Symposium on Security and Privacy USENIX Security Symposium ACM Conference on Computer and Communications Security (CCS) International Symposium on Recent Advances in Intrusion Detection (RAID) Sigcomm (http://www.acm.org/sigs/sigcomm/) Infocom (http://www.ieee-infocom.org/)
Grading: Program & report 1 (30%) Report 2 (25%) Exam. (25%) Presentation (15%) Attendance (5%) ========================= Bonus (20%)