University of Cincinnati Logo
 

20-CS-6056 - Security Vulnerability Assessment
Electrical Engineering & Computer Science

Texts:
 
    Mark Dowd, John McDonald, Justin Schuh. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities (1st edition - paperback, 1200 pages). Addison-Wesley Professional, ISBN-10: 0321444426, 2006, $53.48 at Amazon.com.
 
Sean Heelan. Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities. Masters Thesis, Computing Laboratory, University of Oxford, 2009. Available at: http://www.cprover.org/dissertations/thesis-Heelan.pdf.
 
Charles P. Pfleeger and Shari Lawrence Pfleeger. Analyzing Computer Security: A Threat/Vulnerability/Countermeasure Approach (1st edition - hardcover, 896 pages), Prentice Hall, ISBN-10: 0132789469, 2011, $92.00 at Amazon.com.
 
Abhishek Singh, B. Singh, H. Joseph. Vulnerability Analysis and Defense for the Internet (hardcover, 254 pages). Springer, ISBN-10: 0387743898, 2008, $135.20 at Amazon.com.
 
EC-Council. Network Defense: Security and Vulnerability Assessment (1st edition - paperback, 192 pages), EC-Council Press Series: Network Defense (Book 5). Cengage Learning, ISBN-10: 1435483596, 2010, $44.37 at Amazon.com.
 
References:
 
    Bruce Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C (2nd edition - paperback 758 pages). John Wiley and Sons, New York, ISBN-10: 0471117099, 1996, $37.75 at Amazon.com.
 
Michael Howard, David LeBlanc, John Viega. 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them (1st edition - paperback, 432 pages). McGraw-Hill Osborne Media, ISBN-10: 0071626751, 2009, $30.62 at Amazon.com.
ERC
MainStreet
Paul Erdos
NIT
Ladies on Campus
Oscar Robinson