Code du cours InfT5038
Crédits 3
La quantité totale d'heures en classe81
Nombre de conferences12
Nombre de travaux pratiques et des séminaires12
La quantitē d'heures de travail autonome d'un ētudiant57
Date de l'approbation du cours17.11.2022
1. Tipon H., Krause M. Information security Management Handbook. Boca Raton [etc.]: Auerbach Publications, 2007.
2. Stallings W. Cryptography and Network Security: principles and practices. Upper Saddle River, New Jersy: Person Education, 2006. 680 p.
3. Peltier T.R. Information security policies, procedures and standarts: guidelines for effective information security management. Boca Raton: Auerbach Publications, 2002. 297 p.
4. Vacca J.R. Computer and Information Security: Handbook. Amsterdam; Boston: Elsevier; Burlington, MA: Morgan Kaufmann, 2009. 844 p.
1. Manzuik S. Network security assessment from vulnerability to patch. Rockland, MA: Syngress Pub., 2007.