Skip to main content

Mobile Main Menu

  • Library Portal
    • About Library
    • Search the Library
    • A-Z Databases
    • Research Tools
    • Subject Guides
    • Browse Journals
    • AppsAnywhere
    • Accessibility Tools
  • Academic Skills
    • About Academic Skills
    • Academic Integrity
    • Academic Writing
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library
  • English Language Hub
    • About English Language
    • Academic Writing in English
    • Self-Study Resources
  • Workshops
  • One-to-ones

Secondary navigation

  • Your Projects
  • Feedback to Win
  • iLearn
  • About Us
  • Office 365
  • Request It!
  • News Hub
Home

Main Menu

  • Library
    • About the Library
    • A-Z Databases
    • Accessibility Tools
    • All Reading Lists
    • AppsAnywhere
    • Browse Journals
    • eBook Spotlight Collections
    • Research Tools
    • Search the Library
    • Subject Guides

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

  • Academic Skills
    • About Academic Skills
    • Academic Integrity
    • Academic Writing
    • Artificial Intelligence
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
  • English Language
    • About English Language
    • Academic Writing in English
    • Self-Study Resources

    Get personalised support from an Academic English Lecturer

    Book a one-to-one

    Get personalised support from an Academic English Lecturer

    Book a one-to-one

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
  • Workshops
  • One-to-Ones

Help

COM7006

IT Security Management

All the reading and resources from your modules, all in one place

Reading List Category
Resource Type
Lesson

Lesson 1

Key Text eBook

Information security management handbook

by Tipton, H. and Krause, M.
Essential Resource Website

Review of Policy Languages and Frameworks

by Policy Languages Interest Group (PLING)
Essential Resource Other

Trust-aware access control: How recent is your…

by Ahmed, A. and Alnajem, A.
Essential Resource Website

XACML 3.0 Sample Policy

by WSO2
Wider Reading eBook

Security Engineering: A Guide to Building…

by Anderson, R.

Lesson 2

Key Text eBook

Information security management handbook

by Tipton, H. and Krause, M.
Essential Resource Video

The Mathematics of Diffie-Hellman Key Exchange

by PBS Infinite Series
Essential Resource Video

Pre-Algebra 10 - Factoring

by Why U
Essential Resource Video

Paper and Pencil RSA (starring the extended…

by Janesko, J.
Wider Reading Other

Public Key Encryption against Related Key Attacks

by Wee, H.
Wider Reading eBook

Security Engineering: A Guide to Building…

by Anderson, R.
Wider Reading Other

Efficient Public Key Cryptosystem Resilientto Key…

by Liu, S., Weng, J. and Zhao, Y.
Wider Reading Website

Public Key Infrastructure Testing

by National Institute of Standards and Technology (NIST)
Wider Reading Article

Distinguisher-Based Attacks on Public-Key…

by Couvreur, A. et al.
Wider Reading Other

Public-Key Cryptosystems Resilient to Key Leakage

by Naor, M. and Segev, G.
Wider Reading Website

Homepage

by OpenPGP
Wider Reading Website

Homepage

by GnuPG

Lesson 3

Key Text eBook

Information security management handbook

by Tipton, H. and Krause, M.
Essential Resource Video

Bitcoin - Cryptographic hash function

by Khan Academy
Essential Resource Website

Homepage

by OpenPGP
Essential Resource Website

Homepage

by GnuPG
Essential Resource Website

SHA-1 Hash function

by douira
Wider Reading Website

Public Key Infrastructure Testing

by National Institute of Standards and Technology (NIST)

Lesson 4

Key Text eBook

Information security management handbook

by Tipton, H. and Krause, M.
Essential Resource Other

What is Code Red Worm?

by Tham, A.
Essential Resource Website

IEEE 802

by The Working Group for WLAN Standards
Essential Resource Website

ShieldsUp!

by Gibson Research Corporation
Essential Resource Other

Artificial Immune Systems

by Aickelin, U., Dasgupta, D. and Gu, F.
Essential Resource Article

A Survey of Artificial Immune System Based…

by Yang, H. et al.
Essential Resource Website

The Heartbleed Bug

by Heartbleed
Wider Reading Article

Evaluating Computer Intrusion Detection Systems:…

by Milenkoski, A. et al.
Wider Reading Other

Real-time anomaly-based distributed intrusion…

by Alseiari, F.A.A. and Aung, Z.
Wider Reading Article

Wireless Network Virtualization: A Survey, Some…

by Liang, C. and Yu, F.R.
Wider Reading Article

Security and privacy in cloud-assisted wireless…

by Zhou, J., Cao, Z. and Dong, X.
Wider Reading Article

On the combination of genetic fuzzy systems and…

by Elhag, S. et al.
Wider Reading Article

Security Challenges for the Public Cloud

by Ren, K., Wang, C. and Wang, Q.
Wider Reading Article

Security of the Internet of Things: perspectives…

by Jing, Q., Vasilakos, A.V. and Wan, J.
Wider Reading Article

Security and Privacy Issues in Wireless Sensor…

by Al Ameen, M., Liu, J. and Kwak, K.
Wider Reading eBook

Security Engineering: A Guide to Building…

by Anderson, R.
Wider Reading Other

Enhanced personal firewall for dynamic computing…

by Bansal, R.P. et al.
Wider Reading Article

A novel feature-selection approach based on the…

by Eesa, A.S., Orman, Z. and Brifcani, A.M.A.

Lesson 5

Key Text eBook

Information security management handbook

by Tipton, H. and Krause, M.
Essential Resource Website

IP Address Authentication - Frequently Asked…

by EBSCO
Essential Resource Website

Whois Lookup

by DomainTools
Essential Resource Other

Routing Attacks in Wireless Sensor Networks: A…

by Virmani, D. et al.
Essential Resource Other

A hierarchical secure routing protocol against…

by Jian, Y. and Madria, S.K.
Essential Resource Other

Black hole attack in mobile Ad Hoc networks

by Al-Shurman, M. et al.
Essential Resource Video

What is a TCP SYN Flood?

by Radware
Essential Resource Website

Well-known port assignments

by IBM
Essential Resource Other

Homepage

by wxHexEditor
Essential Resource Other

Session Hijacking in Windows Networks

by Jess, P.
Essential Resource Other

Search Worms

by Provos, N., McClain, J. and Wang, K.
Essential Resource Website

Look Up

by ICANN
Essential Resource Website

Whois Domain Lookup

by Whois
Essential Resource Other

Download Ubuntu Desktop

by Ubuntu
Essential Resource Website

Remove specific prevalent malware with Windows…

by Microsoft
Wider Reading Website

A Brief History of the Internet

by Leinor, B.M. et al.
Wider Reading eBook

Security Engineering: A Guide to Building…

by Anderson, R.
Wider Reading Website

Homepage

by NMAp
Wider Reading Other

Open Source Digital Forensics

by Sleuth Kit

Lesson 6

Key Text eBook

Information security management handbook

by Tipton, H. and Krause, M.
Essential Resource Other

African Union Convention on Cyber Security and…

by African Union
Essential Resource Other

Behavioural Evidence Analysis Applied to Digital…

by Mutawa, N. et al.
Essential Resource Article

Forensic investigation of cyberstalking cases…

by Al Mutawa, N. et al.
Essential Resource Article

Review and agenda of Digital Forensics education…

by OliveiraJr, E. and Zorzo, A.F.
Wider Reading Website

Automated Computer Forensics

by Garfinkel, S.
Wider Reading Website

Homepage

by Global Information Assurance Certification (GIAC)
Wider Reading Website

A Framework for Ethical Decision Making

by Velasquez, M. et al.
Wider Reading Website

Homepage

by EC-Council

Lesson 7

Key Text eBook

Information security management handbook

by Tipton, H. and Krause, M.
Key Text eBook

Digital Evidence and Computer Crime

by Casey, E.
Essential Resource Website

Disk Devices and Partitions

by Microsoft
Essential Resource Other

Hard Disk

by Cabla, L.
Essential Resource Other

Forensic Analysis of BIOS Chips

by Gershteyn, P. et al.
Essential Resource Website

Help

by Digital Photography Review
Essential Resource Other

Hard Disk Drives

by Arpaci-Dusseau, R. and Arpaci-Dusseau, A.
Wider Reading Website

How to Reset a BIOS Password

by Lloyd, J.
Wider Reading Website

Mebromi: the first BIOS rootkit in the wild

by Giuliani, M.

Lesson 8

Key Text eBook

Digital Evidence and Computer Crime

by Casey, E.
Key Text eBook

Information security management handbook

by Tipton, H. and Krause, M.
Essential Resource Website

Computer Forensics Tool Testing Program (CFTT)

by NIST
Essential Resource Website

Alternate data streams and cybersecurity…

by Mehta, K.
Essential Resource Website

Monitor Windows 7 boot logs with the help of…

by Wallen, J.
Essential Resource Website

FAT Undelete Test 1

by Carrier, B.
Essential Resource Website

Introduction to Alternate Data Streams

by Arntz, P.
Essential Resource Website

Remove hidden data and personal information by…

by Microsoft
Essential Resource Other

Real-time Log File Analysis Using the Simple…

by Rouillard, J.P.
Essential Resource Other

Open Source Digital Forensics

by Sleuth Kit
Essential Resource Website

Sleuth Kit Commands

by Sleuth Kit Wiki
Wider Reading Website

NTFS overview

by Microsoft

Lesson 9

Key Text eBook

Information security management handbook

by Tipton, H. and Krause, M.
Essential Resource Other

Writing a Penetration Testing Report

by Alharbi, M.
Essential Resource eBook

Security in Computing

by Pfleeger, C.P., Pfleeger S.L. and Coles-Kemp, L.
Essential Resource Other

Content-Aware Access Control in Ubiquitous…

by Ahmed, A.
Essential Resource Website

Legal Issues in Penetration Testing

by Rasch, M.
Essential Resource eBook

Security Planning and Disaster Recovery

by Maiwald, E. and Sieglein, W.
Essential Resource Article

Can spending on information security be justified…

by Stewart, A.
Essential Resource Other

Economic Methods and Decision Making by Security…

by Baldwin, A. et al.
Essential Resource Other

SANS 2024 State of ICS/OT Cybersecurity

by Christopher, J.
Essential Resource Other

State of ICS/OT Security 2025

by Christopher, J.
Essential Resource Website

An introduction to penetration testing and its…

by Vines, R.D.
Essential Resource Other

VirtualBox

by Oracle
Essential Resource Website

Vulnerable test sites to test your XSS skills

by Neubert, J.
Wider Reading Other

Pentration Testing Template

by Logically Secure
Wider Reading Video

Nmap Tutorial for Beginners - 1 - What is Nmap?

by thenewboston
Wider Reading Website

OPENVAS

by Greenbone
Wider Reading Video

Introduction To Using The Nessus Vulnerability…

by Tenable
Wider Reading Website

Reporting

by Penetration Testing Execution Standard (PTES)
Wider Reading Website

Website Security Checker

by Sucuri
Wider Reading Website

Qualys Community Edition

by Qualys
Wider Reading Website

Website Malware Scanner

by Web Inspector

Lesson 10

Key Text eBook

Information security management handbook

by Tipton, H. and Krause, M.
Essential Resource Other

Building a Cybersecurity and Privacy Learning…

by Merritt, M. et al.
Essential Resource Other

Incident Response Recommendations and…

by Nelson, A. et al.
Essential Resource Website

Top Tips For Staff

by National Cyber Security Centre
Wider Reading Website

Incident management

by Government Communications Security Bureau
Wider Reading eBook

Security Planning and Disaster Recovery

by Maiwald, E. and Sieglein, W.
Wider Reading eBook

Security in Computing

by Pfleeger, C.P., Pfleeger S.L. and Coles-Kemp, L.

Footer

  • Library Portal
  • Academic Skills
  • English Language
  • Workshops
  • One-to-one Appointments

Footer 2

  • About Us
  • iLearn
  • News Hub
  • Help
  • Feedback To Win

Footer3

  • About Arden University
  • Accessibility Statement
  • Cookies Policy
  • Privacy Policy
Contact Us
address icon

Arden University,
Middlemarch Park,
Coventry, CV3 4FJ, UK

email icon
  • Library@arden.ac.uk
  • AcademicSkills@arden.ac.uk
  • EnglishLanguageHub@arden.ac.uk
Arden University Learning Success Hub 

© 2005-2026 Arden University  | All rights reserved