https://link.springer.com/content/pdf/10.1007/978-1-4302-6383-8.pdf#chapter+1:+introduction+to+security
https://link.springer.com/content/pdf/10.1007/978-1-4302-6383-8.pdf#chapter+2:+history+of+computer+security
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/topic_01/01.html
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/pdfs/cisc_3325_topic_01_lecture_notes.pdf
https://link.springer.com/content/pdf/10.1007/978-1-4302-6383-8.pdf#chapter+3:+key+concepts+and+principles
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/topic_02/01.html
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/pdfs/cisc_3325_topic_02_lecture_notes.pdf
https://link.springer.com/content/pdf/10.1007/978-1-4302-6383-8.pdf#chapter+4:+access+controls
https://link.springer.com/content/pdf/10.1007/978-1-4302-6383-8.pdf#chapter+14:+physical+security+and+biometrics
https://link-springer-com.brooklyn.ezproxy.cuny.edu/content/pdf/10.1007/978-0-85729-006-9.pdf#1+physical+security
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/topic_03/01.html
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/pdfs/cisc_3325_topic_03_lecture_notes.pdf
https://link.springer.com/content/pdf/10.1007/978-1-4302-6383-8.pdf#chapter+8:+cryptography
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/topic_04/01.html
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/pdfs/cisc_3325_topic_04_lecture_notes.pdf
https://link.springer.com/content/pdf/10.1007/978-1-4302-6383-8.pdf#chapter+6:+application+and+web+security
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/topic_05/01.html
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/pdfs/cisc_3325_topic_05_lecture_notes.pdf
https://link.springer.com/content/pdf/10.1007/978-1-4302-6383-8.pdf#chapter+7:+malicious+software+and+anti-virus+software
https://link-springer-com.brooklyn.ezproxy.cuny.edu/content/pdf/10.1007/978-0-85729-006-9.pdf#6+prevention+and+defense
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/topic_06/01.html
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/pdfs/cisc_3325_topic_06_lecture_notes.pdf
https://link.springer.com/content/pdf/10.1007/978-1-4302-6383-8.pdf#chapter+15:+social+engineering
https://link-springer-com.brooklyn.ezproxy.cuny.edu/content/pdf/10.1007/978-0-85729-006-9.pdf#10+identity+theft
https://link-springer-com.brooklyn.ezproxy.cuny.edu/content/pdf/10.1007/978-0-85729-006-9.pdf#11+privacy+and+trust
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/topic_07/01.html
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/pdfs/cisc_3325_topic_07_lecture_notes.pdf
https://link.springer.com/content/pdf/10.1007/978-1-4302-6383-8.pdf#chapter+9:+understanding+networks+and+network+security
https://link-springer-com.brooklyn.ezproxy.cuny.edu/content/pdf/10.1007/978-0-85729-006-9.pdf#7+network+security
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/topic_08/01.html
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/pdfs/cisc_3325_topic_08_lecture_notes.pdf
https://link.springer.com/content/pdf/10.1007/978-1-4302-6383-8.pdf#chapter+10:+firewalls
https://link-springer-com.brooklyn.ezproxy.cuny.edu/content/pdf/10.1007/978-0-85729-006-9.pdf#7.6+firewall+basics
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/topic_09/01.html
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/pdfs/cisc_3325_topic_09_lecture_notes.pdf
https://link.springer.com/content/pdf/10.1007/978-1-4302-6383-8.pdf#chapter+11:+intrusion+detection+and+prevention+systems
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/topic_10/01.html
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/pdfs/cisc_3325_topic_10_lecture_notes.pdf
https://link.springer.com/content/pdf/10.1007/978-1-4302-6383-8.pdf#chapter+12:+virtual+private+networks
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/topic_11/01.html
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/pdfs/cisc_3325_topic_11_lecture_notes.pdf
https://link.springer.com/content/pdf/10.1007/978-1-4302-6383-8.pdf#chapter+13:+data+backups+and+cloud+computing
https://link-springer-com.brooklyn.ezproxy.cuny.edu/content/pdf/10.1007/978-0-85729-006-9.pdf#6.4+backups+and+such
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/topic_12/01.html
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/pdfs/cisc_3325_topic_12_lecture_notes.pdf
https://link.springer.com/content/pdf/10.1007/978-1-4302-6383-8.pdf#chapter+16:+current+trends+in+information+security
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/topic_13/01.html
https://www.sci.brooklyn.cuny.edu/~briskman/cisc/3325/lecture_notes/pdfs/cisc_3325_topic_13_lecture_notes.pdf
Site design and formatting by Emily Fairey, Digital Initiatives/OER Developer Librarian (Brooklyn College) based on Fall 2022 CISC 3320 Operating Systems (Briskman) site design and formatting by Amy Wolfe OER Developer (Brooklyn College) and Accessibility Librarian (CUNY Office of Library Services)