html>
UMCP: iSchool: INST 346: Spring 2018: Reading List
INST 346
Technologies, Infrastructure and Architectures
Spring 2018
Required Readings
"Text" refers to the textbook, which is David L. Cannon, Brian
T. O'Hara and Allen Keele, CISA Certified Information System Auditor
Study Guide, Fourth Edition, Sybex, 2016.
Required Reading for Session 2 (Mobile Phones)
Required Reading for Session 3 (Wearables)
Required Reading for Session 4 (Storage)
Required Reading for Session 5 (File Types)
Required Reading for Session 6 (Backup and Recovery)
- Text, Chapter 8, read the section on "Understanding the Five
Phases of a Business Continuity Program" from "Phase 3: Plan
Development" (you can stop when you get to "Incident Command
System")
- Iron
Mountain History (Web)
Required Reading for Session 7 (Software Stack)
- Text chapter 4, pages 216-223 (you can stop when you get to the
start of Table 4.1)
- BIOS (Wikipedia)
Required Reading for Session 8 (Virtualization)
Required Reading for Session 9 (Encryption)
- Text chapter 7, pages 489-496 (Encryption Methods)
Required Reading for Session 10 (Access Control)
- Text chapter 7, pages 475-488 (Authentication Methods)
Required Reading for Session 11 (Malware)
- Text chapter 7, pages 458-469 (Understanding Attack Methods)
Required Reading for Session 12 (Exam Review)
Required Reading for Session 13 (Exam 1)
- There are no new readings for the exam!
Required Reading for Session 14 (The Internet)
- Text chapter 4, pages 237-252 (Introducing the Open Systems
Interconnection Model)
Required Reading for Session 15 (Point to Point)
- Text chapter 4, pages 252-263 (from Understanding Physical Network Design; stop at Using Network Services)
Required Reading for Session 16 (Ethernet)
Required Reading for Session 17
Required Reading for Session 18 (WiFi)
- Kurose and Ross, Computer Networking, A Top-Down Approach, 6th
edition, pages 527-541 (sections 6.3.1 and 6.3.2).
Required Reading for Session 19 (IP)
Required Reading for Session 20 (Routing)
- Kurose and Ross, Computer Networking, A Top-Down Approach, 6th
edition, pages 363-371 (section 4.5, through the end of section 4.5.1).
Required Reading for Session 21 (UDP)
Required Reading for Session 22 (TCP)
Required Reading for Session 23 (SSL)
- Kurose and Ross, Computer Networking, A Top-Down Approach, 6th
edition, pages 711-717 (section 8.6).
Required Reading for Session 24 (DNS)
- Kurose and Ross, Computer Networking, A Top-Down Approach, 6th
edition, pages 130-143 (section 2.5).
Required Reading for Session 25 (Streaming)
- Kurose and Ross, Computer Networking, A Top-Down Approach, 6th
edition, pages 593-601 (section 7.2, but only through the end of 7.2.3).
Required Reading for Session 26
Required Reading for Session 27 (Internet Governance)
Required Reading for Session 28 (Networked Systems Architectures)
Required Reading for Session 29 (Exam Review)
Required Reading for Session 30 (Exam 2)
- There is no reading for the Exam!
Required Reading for Session 31 (The Web)
Required Reading for Session 32 (PHP)
Required Reading for Session 33 (Information Architecture)
Required Reading for Session 34 (Data Architecture)
Required Reading for Session 35 (Cloud Computing)
Required Reading for Session 36 (Data Centers)
Required Reading for Session 37 (Networked Malware)
Required Reading for Session 38 (Cyberdefense)
- Kurose and Ross, Computer Networking, A Top-Down Approach, 6th
edition, pages 731-742 (section 8.9).
Required Reading for Session 39 (Blockchain)
Required Reading for Session 40 (Information Governance)
- Textbook pages 58-69 ("Governance", through the end of Table 2.1)
Required Reading for Session 41 (Surveillance)
- Privacy and Civil Liberties Oversight Board, Report on the
Surveillance Program Operated Pursuant to Section 702 of the
Foreign Intelligence Surveillance Act, July 2, 2014. Read only
Section III (Privacy and Civil Liberties Implications of the
Section 702 Program, which is on pages 111-133). Available at
https://www.pclob.gov/library/702-Report-2.pdf
Required Reading for Session 42 (Hacking)
- Timothy C. Summers, How Hackers Think: A Study of Cybersecurity
Experts and Their Mental Models (September 20, 2013). Third
Annual International Conference on Engaged Management
Scholarship, Atlanta, GA, September, 2013. Available at
SSRN: https://ssrn.com/abstract=2326634
Required Reading for Session 43 (Final Exam Review)
Doug Oard
Last modified: Mon May 7 10:08:18 2018