Subject to change, no warranty expressed or implied, who knows if all these books are even available, heck they’re books not divine aliens, I wish I didn’t have to prep all of these courses, did you know that books are like made of paper, something shiny….
32638, 34178, ITS 135 Operating Systems Technologies – This course covers operating systems concepts, applications, administrative activities, installation, customization, maintenance, security, and other topics
Palmer, Michael and Walters Michael “Guide to operating systems”, Enhanced Edition, Thomson Course Technology, 2007, ISBN 1418837199
34179, ITS 170 Networking Technologies – This course covers routing and switching, physical layer, foundations of networking, security, application considerations, network management, and other topics.
Chappell, Laura A. & Tittel, Ed “Guide to TCP/IP” Third Edition, Thomson Course Technology, 2007, ISBN 1418837555
32635, ITS 250 Fundamentals of Information Assurance – This course covers security mechanisms, fundamental aspects, operational issues, policy, attacks, security domains, forensics, information states, security services, threat analysis, vulnerabilities, and other topics.
Maiwald, Eric “Fundamentals of Network Security”, McGraw-Hill Technology Education, 2004, ISBN 0072230932
32629, ITS 270 Internetworking Technologies – This course covers requirements, acquisition/sourcing, integration, project management, testing and quality assurance, organizational context, architecture and other topics. – Taught as advanced routing techniques and networking.
Grice, Michael “CCNP Guide to advanced Cisco routing”, Course Technology, 2001, ISBN 0619015756
Grice, Michael “Lab Manual for CCNP guide to advanced Cisco routing”, Course Technology, 2003, ISBN 0619130865
32631, ITS 330 Advanced Operating Systems – This course covers the comparison and contrast of operating systems, the detailed examination of architecture, customization and implementation of the features of specific operating systems. Extensive laboratory exercises are assigned.
Stuart B., “Principles of operating systems: design + applications”, Thomson, 2009, ISBN 9781418837693
33711, ITS 350 Systems Assurance – This course covers the implementation of systems assurance with computing systems. Topics include confidentiality, integrity, authentication, non-repudiation, intrusion detection, physical security, and encryption. Extensive laboratory exercises are assigned.
Smith, S., Marchesini, J,, “The Craft of System Security”, Addison Wesley, 2008, ISBN 0-321-43483-8
33712, ITS 450 Software Assurance – This course covers defensive programming techniques, bounds analysis, error handling, advanced testing techniques, detailed code auditing, and software specification in a trusted assured environment. Extensive laboratory exercises are assigned
Seacord, R, “Secure Coding in C and C++”, Addison Wesley, 2006, ISBN 0-321-33572-4
34171, ITS 452 Computer Forensics – This course covers the techniques used in the forensic analysis of computerized systems for gathering evidence to detail how a system has been exploited or used. Extensive laboratory exercises are assigned.
Bunting S., “EnCE The official EnCase Certified Examiner Guide, Second Edition”, Sybex, 2008, ISBN 9780470181454
Carrier B., “File System Forensic Analysis”, Addison Wesley, 2005, ISBN 9780321268174
32637, ITS 470 Large Scale High Performance Systems – This course covers topics in grid computing, managing computing clusters, distributed processing environments, storage area networks, and large computing environments
Sterling, T., Salmon J., Becker D., Savarese D., “How to build a Beowulf: A guide to the implementation and application of PC Clusers”, The MIT Press, 1999, ISBN 026269218X
“Performance tuning for Linux Servers”, IBM Press, 2005, ISBN 9780137136285