[Monash Home][Monash Info][News and Events][Campuses and Faculties] [Monash University]
SiMS Home
SiMS HomeAbout UsCourses & SubjectsStaffResearchContact
SiMS Home
Handbook   Overview   Lectures   Tutorials   Readings   Assessment   Staff   Discussion

IMS3110 : Information Systems Security

Prescribed resources:

As this is a dynamic subject, there are no prescribed resources. I prefer students to obtain, and have access to a variety of different resources.

Information security interest group located at:



"What Works in Intrusion Prevention"
Featuring:  Vasilis Karapanayiotis and Alan Paller
Thursday, August 18 at 2:00 PM EDT (1800 UTC)
Sponsored by: TippingPoint, a division of 3Com

"What Works in Stopping Spyware"
Featuring: Tom White and Alan Paller
Tuesday, August 23 at 1:00 PM EDT (1700 UTC)
Sponsored by: Sunbelt Software

Secure Software Webcast Series: "Effective Encryption"
Featuring: David Read
Thursday, August 25 at 1:00 PM EDT (1700 UTC)
Sponsored by: Secure Software

"What Works in Log Management"
Featuring: Pete J. Boergermann and Alan Paller
Wednesday, August 31 at 11:00 AM EDT (1500 UTC)
Sponsored by: LogLogic

For additional information on any of the above, webcasts please go to

In order to access the webcasts, you will need a SANS portal account
and either Real Audio Player or Windows Media Player (free downloads
are available at our website). If you do not already have a portal
account, just go to http://portal.sans.org and fill in the simple
registration form, it's free!

Your account gives you access to the archive of past webcasts. Log
on to http://www.sans.org/webcasts/archive.php.

On Reserve (Caulfield Library only)

Students are reminded that books “on reserve” can be obtained from the library counter. Students have access to these books for two hour time slots. You may photocopy articles and resources as required. Please DO NOT DEFACE THESE ITEMS BY WRITING OR HIGHLIGHTING areas. These are for all students in this unit.

Ciampa, M. (2005). Security+ Guide to Network Security Fundamentals, (2 nd Edn). Boston , Massachusetts : Thomson Technology.

Erbschloe, M. (2003). Guide to Disaster Recovery. Boston , Massachusetts : Thomson Technology.

Maiwald, E. (2004). Fundamentals of Network Security. New York : McGraw-Hill.

Palmer, M. (2004). Guide to Operating Systems Security. Boston , Massachusetts : Thomson Technology.

Panko, R. R. (2004). Corporate Computer and Network Security. New Jersey : Pearson Education International.

Quirk, P. & Forder, J. (2003). Electronic Commerce and the Law (2 nd Edn). Singapore : John Wiley & Sons Australia, Ltd.

Whiteman, M. E. & Mattord, H. J. (2005). Principles of Information Security (2 nd Edn). Boston , Massachusetts : Thomson Technology.

Recommended resources:

Allinson, C. (2002). Information Systems Audit Trails; An Australian Government survey. Journal of Research and Practice in Information Technology, Vol 34, No 1. pp 47-64.

Bosworth, S. & Kabay , M.E. (eds) (2002). Computer Security Handbook (4 th Edn). Canada : John Wiley & Sons.

Forder, J. & Quirk, P. (2001). Electronic Commerce and the Law. Australia : John Wiley & sons Ltd

Hassler, V. (2001). Security Fundamentals for E-Commerce. London : Arteck House.

Merkow, M.S. & Breithaupt, J. (2000). The Complete Guide to Internet

Security. New York : American Management Association (Amacom). (This text is on electronic copy in the library. Use your authcate access code .)

Muftic, S., Patel, A., Sanders, P., et al. (1994) Security Architecture for open distributed systems. England : Wiley & Sons.

Reynolds, G. W. (1998). Information Systems for Managers.Minneapolis: West Publishing Company

Schneider, G.P. & Perry, J. T. (2001). Electronic Commerce (2 nd Edn). UK : Thomson Learning Inc

Tiptom, H. F., & Krause, M. (2000). Information security management (Handbook 4 th edn). New York : Auerbach Publications.

Wood C. C. (1990). “Principles of Secure Information Systems Design”. Computers and Security, Vol 9, No 1.

Important Web sites :

The SANS top trends in security management for 2002: White paper, January 2002 ( www.netiq.com ) www.CSOonline.com.au



Presentations and reports: Attack and intruder trends



Independent Commission Against Corruption. eCorruption: eCrime vulnerabilities in the NSW Public Sector, Summary Report, 2001.


Disaster Strategies for Record Keeping:




Developing a security policy, December 2001, SunBluePrints http://www.sun.com/blueprints

Additional resource material :

Although the above resources provide a range of views for this topic area and provide valuable information and resources, no single text is used as the basis for assessment in this unit. Additional reading from a variety of sources provided in class and by personal sourcing should be supplemental to this course.

Therefore students are encouraged to read widely in the business and popular industry press (Computer World, Gartner, Forrester, SANS, AUScert) related to specific issues that reflect topics in this unit.

HelpContactsSite MapStaff DirectorySearch

Return to the Top of the PageMonash University ABN 12 377 614 012. Copyright © 1994-2001 Monash University - Caution - Privacy
SIMS is part of the Faculty of Information Technology -

Authorised by: Head of School. Maintained by: Sue Foster