Educational guide | ||||||||||||||||||||||||||||||||||||||||
IDENTIFYING DATA | 2023_24 | |||||||||||||||||||||||||||||||||||||||
Subject | COMPUTER SECURITY | Code | 00709026 | |||||||||||||||||||||||||||||||||||||
Study programme |
|
|||||||||||||||||||||||||||||||||||||||
Descriptors | Credit. | Type | Year | Period | ||||||||||||||||||||||||||||||||||||
6 | Compulsory | Third | Second |
|||||||||||||||||||||||||||||||||||||
Language |
|
|||||||||||||||||||||||||||||||||||||||
Prerequisites | ||||||||||||||||||||||||||||||||||||||||
Department | MATEMATICAS |
|||||||||||||||||||||||||||||||||||||||
Coordinador |
|
mjpism@unileon.es asaes@unileon.es |
||||||||||||||||||||||||||||||||||||||
Lecturers |
|
|||||||||||||||||||||||||||||||||||||||
Web | http:// | |||||||||||||||||||||||||||||||||||||||
General description | ||||||||||||||||||||||||||||||||||||||||
Tribunales de Revisión |
|
|||||||||||||||||||||||||||||||||||||||
Competencias |
Code | |
A18119 | |
A18124 | |
B5618 | |
B5619 | |
B5623 | |
B5624 | |
B5625 | |
B5627 | |
C2 | CMECES2 That students know how to apply their knowledge to their work or vocation in a professional manner and possess the skills that are usually demonstrated through the development and defense of arguments and the resolution of problems within their area of study. |
C4 | CMECES4 That students can transmit information, ideas, problems and solutions to both a specialised and non-specialised audience |
Learning aims |
Competences | |||
A18119 A18124 |
B5618 B5619 B5623 B5624 B5625 |
C2 C4 |
|
A18119 A18124 |
B5618 B5619 B5623 B5624 B5625 B5627 |
C2 C4 |
|
A18119 A18124 |
B5618 B5619 B5623 B5624 B5625 B5627 |
C2 C4 |
|
A18119 A18124 |
B5618 B5619 B5623 B5624 B5625 |
C2 C4 |
|
A18119 A18124 |
B5618 B5619 B5623 B5624 B5625 |
C2 C4 |
Contents |
Topic | Sub-topic |
Planning |
Methodologies :: Tests | |||||||||
Class hours | Hours outside the classroom | Total hours | |||||||
Problem solving, classroom exercises | 15 | 15 | 30 | ||||||
Practicals using information and communication technologies (ICTs) in computer rooms | 24 | 24 | 48 | ||||||
Lecture | 15 | 15 | 30 | ||||||
Mixed tests | 3 | 18 | 21 | ||||||
3 | 18 | 21 | |||||||
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students. |
Methodologies |
Description | |
Problem solving, classroom exercises | |
Practicals using information and communication technologies (ICTs) in computer rooms | |
Lecture |
Personalized attention |
|
|
Assessment |
Description | Qualification | ||
Practicals using information and communication technologies (ICTs) in computer rooms | 30% | ||
Mixed tests | 50% | ||
20% | |||
Other comments and second call | |||
Sources of information |
Access to Recommended Bibliography in the Catalog ULE |
Basic |
Carlos Munuera y Juan Tena, Codificación de la información, Universidad de Valladolid, 1997 San Ling and Chaoping Xing, Coding theory. A first course, Cambridge University Press, 2004 Manuel José Lucena López, Criptografía y Seguridad de Computadores, http://criptografiayseguridad.blogspot.com/p/criptografia-y-seguridad-en.html, 2022 William Stallings, Cryptography and network security: principles and practice, Seventh edition, Pearson, 2016 Stuart Jacobs, Engineering Information Security. Second Edition, IEEE Press, 2011 William Stallings, Fundamentos de Seguridad en Redes. Aplicaciones y Estándares. 2ª edición, Pearson. Prentice_Hall, 2003 A.J. Menezes; P.C. van Oorschot; S.A. Vanstone , Handbook of applied cryptography (web del libro), https://cacr.uwaterloo.ca/hac/, 1996 Pino Caballero Gil, Introducción a la Criptografía. 2ª edición actualizada, Ra_Ma, 2002 Johannes Buchmann, Introduction to cryptography. Second Edition, Springer, 2004 William Stallings, Network and Internetwork Security: principles and practice, Prentice_Hall, 1995 Charles P. PFleeger; Shari Lawrence Pfleeger; Jonathan Margulies, Security in Computing. Fifth edition, Prentice-Hall, 2015 José M. Huidobro Moya y David Roldán Martínez, Seguridad en Redes y Sistemas Informáticos, Thomson-Paraninfo , 2005 Fuster, A. y otros, Técnicas criptográficas de protección de datos. 2ª edición actualizada, Ra-Ma, 2000 |
Complementary | |
Recommendations |
Subjects that it is recommended to have taken before | |||||||
|