Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.

INF 612 Computer network and data security: Reading list

INF 612 Computer Network and Data Security


Department: PhD in Computer Science
Module Description: The study of theory, design and analysis of efficient algorithms is an important component and core module of computer network and data security from the perspective of a system administrator and a penetration tester. The key objective of this module is introduce to computer network security and practical cryptography analysis and important concepts that are essential to operating systems security.
The other objective is to make students aware of various techniques used to evaluate the efficiency of some important class of malicious software’s, denial of services and intrusion detection systems.
Students would eventually learn to design of  firewalls and intrusion prevention system, access control, security issues and threats.
It outlines efforts intended to make future security systems safe, predictable, and revolvable. Finally, it covers security issues and threats, and security assessment for their research studies and would also be able to critically analyse other people’s work in this area.

Module text(s)

  • Stalling, W. and Brown, L. (2020). Computer security: principle and practice. New Jersey: Prentice Hall.

Indicative key readings

  • Bishop, M. (2005). Introduction to computer security. Boston: Addison-Wesley.
  • Kizza, J. M. (2020). Guide to computer network security. 5th edn. Cham: Springer.
  • Salomon, D. (2010). Elements of computer security. London: Springer London.

Recommended readings

  • Bishop, M., Sullivan, E. and Ruppel, M. (2019). Computer security : art and science. 2nd edn. Boston: Addison-Wesley.
  • Mitra, S. and Gofman, M. (2020). Biometrics in a data driven world : trends, technologies, and challenges. Chapman and Hall/CRC.

Ask a Librarian for help to find and evaluate resources