Skip to main content

Mobile Main Menu

  • Library Portal
    • Library Resources
      • Search the Library
      • A-Z Databases
      • Browse Journals
    • Accessibility Tools
    • Subject Guides
      • Criminal Justice
      • Digital Education in Practice
      • Investigation, Security and Defence
      • Law
      • Psychology
      • Computing
      • Design and creativity
      • Finance and Accounting
      • Marketing
      • Health and Care Management
      • Human Resource Management
      • Business Management
      • Supply Chain Management and Logistics
      • Hospitality and Tourism
      • Foundation Year
  • English Language Hub
    • Academic Writing in English
    • Self-study Resources
  • Academic Skills
    • Academic Integrity
    • Academic Writing
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
  • Workshops and One-to-Ones
    • One-to-one Appointments
    • Workshops

Secondary navigation

  • Your Projects
  • Feedback to Win
  • iLearn
  • About Us
  • Office 365
  • Request It!
  • News Hub
Home
  • Library Portal
    • Library Resources
    • Accessibility Tools
    • Research Tools
    • Subject Guides
    • AppsAnywhere
    • Search the Library
    • A-Z Databases
    • Browse Journals
    • eBook Spotlight Collections

    Get started with the Library Portal

    Get Started
    • Accessible eBooks
    • Document Conversion Tools
    • RNIB Bookshare
    • Sensus Access

    Get started with the Library Portal

    Get Started
    • Research Tools

    Get started with the Library Portal

    Get Started
    Faculty of Social Sciences
    • Criminal Justice
    • Digital Education in Practice
    • Investigation, Security and Defence
    • Law
    • Psychology
    STEM
    • Computing
    Arden Business
    • Business Management
    • Design and Creativity
    • Finance
    • Marketing
    • Health and Care Management
    • Human Resource Management
    • Supply Chain and Project Management
    • Hospitality and Tourism
    • MBA and Executive Education
    IFS
    • Foundation Year
     

    Get started with the Library Portal

    Get Started

  • English Language
    • Academic Writing
    • Self-Study Resources
    • Workshops and one-to-ones
    • Academic Writing in English

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
    • Academic Grammar in Focus
    • Academic Vocabulary in Focus

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
    • English Language Hub One-to-one
    • English Language Hub Workshops

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
  • Academic Skills
    • Academic Integrity
    • Academic Writing
    • Artificial Intelligence
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library
    • Academic Integrity
    • Artificial Intelligence
    • Referencing Guides

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • Academic Writing
    • Reading and Notetaking
    • Paraphrasing and Synthesising
    • Critical Thinking
    • Developing Your Academic Voice

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
     

    Book a one-to-one appointment

    Book a appointment

    • JISC Digital Capabilities Discovery Tool
    • Microsoft Office 365

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • What is a Dissertation?
    • Identifying a Research Topic
    • Formatting your Dissertation

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • Assessment Types
    • Understanding Assignments
    • Assessment Strategies

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
    • Maths and Statistics
    • Programming
    • SPSS

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
  • Workshops and One-to-Ones
    • One-to-one Appointments
    • Workshops
     

    Book onto a Learning Success Hub workshop

    Book a place
    • Academic Skills Workshops
    • Academic English Workshops
    • Library Workshops

    Book onto a Learning Success Hub workshop

    Book a place
Support

PG Computing Reading Lists  COM7018

Secure Systems Design

All the reading and resources from your modules, all in one place

Reading List Category
Resource Type
Lesson

Lesson 1

Key Text eBook

Security engineering: A guide to building…

by Anderson, R
Essential Resource Website

Security architecture anti-patterns

by NCSC
Essential Resource Website

OWASP SAMM

by OWASP
Essential Resource Article

The Myth of Secure Computing

by Austin, R. D. and Darby, C. A. R.
Essential Resource Website

Cyber Resilience Act: Shaping Europe’s digital…

by European Commission
Essential Resource Website

Microsoft Security Development Lifecycle Practices

by Microsoft
Essential Resource Website

Fundamental practices for secure software…

by SAFECode
Essential Resource Website

Building Security in Maturity Model (BSIMM)

by Synopsys

Lesson 2

Key Text eBook

Security engineering

by Anderson, R
Essential Resource Website

Stubborn Weaknesses in the CWE Top

by Common Weakness Enumeration (CWE)
Essential Resource Website

Unforgivable vulnerabilities

by Christey, S.
Essential Resource Website

Secure By Design

by Cybersecurity and Infrastructure Security Agency (CISA)
Essential Resource Website

Unforgivable vulnerabilities

by Christey, S.
Essential Resource Other

Enterprise architecture frameworks assessment:…

by Al-Turkistani, H. F., Aldobaian, S. and Latif, R.

Lesson 3

Key Text eBook

Security engineering: A guide to building…

by Anderson, R
Key Text eBook

Designing user experience: A guide to HCI, UX and…

by Benyon, D.
Essential Resource Website

The NIST Privacy Framework: A Tool for Improving…

by NIST
Essential Resource Website

Privacy threat modelling

by Linddun
Essential Resource Video

How your "working memory" makes sense…

by Doolittle, P.
Essential Resource Article

What are the differences between long-term, short…

by Cowan, N.
Essential Resource Other

The diamond model of intrusion analysis

by Caltagirone, S., Pendergast, A. and Betz, C.
Essential Resource Article

Applying the diamond model of intrusion analysis…

by Ximenes, P., and Mello, P.

Lesson 4

Key Text eBook

Computer Security: Principles and Practice,…

by Stallings, W. and Brown, L.
Key Text eBook

Computer System and Network Security

by White, G. B., Fisch, E. A. and Pooch, U. W.
Essential Resource Website

Secure System Architecture and Design

by UK Cyber Security Council
Essential Resource Website

Unforgivable vulnerabilities

by Christey, S.
Essential Resource Article

Noninterference specifications for secure systems

by Nelson, L. et al.
Essential Resource Article

CONDENSE: A Moving Target Defense Approach for…

by Dai, C. and Adegbija, T.

Lesson 5

Key Text eBook

Computer Security: Principles and Practice,…

by Stallings, W. and Brown, L.
Key Text eBook

Computer System and Network Security

by White, G. B., Fisch, E. A. and Pooch, U. W.
Essential Resource Other

An Approach to Achieve Modern Cryptographic…

by Berlin, K., Dhenakaran, S. S. and Sivabalan, K.
Essential Resource Article

Modern techniques for decentralized key…

by Galis, M. et al.
Essential Resource Article

Mathematical investigation of cryptographic…

by Gencoglu, M. T.
Essential Resource Other

Time Analysis Side Channeling Attack in Symmetric…

by Hettiarachchi, M. J., Sandanuwan, H. H. G. D., and Balasooriya, R. W., et al.

Lesson 6

Key Text eBook

Security engineering: A guide to building…

by Anderson, R
Key Text eBook

Computer Security: Principles and Practice,…

by Stallings, W. and Brown, L.
Essential Resource Article

From collisions to chosen-prefix collisions…

by Leurent, G. and Peyrin, T.,
Essential Resource Website

RSA Key Generator

by CryptoTools.net
Essential Resource Article

A comparative study of PKI trust models

by El Uahhabi, Z. and El Bakkali, H.
Essential Resource Website

String hash calculator

by CryptoTools.net
Essential Resource Article

Asymmetric Encryption Algorithms: Primitives and…

by Meng, Z. and Wang, Y.
Essential Resource Website

Hash Functions Online

by OnlineDomainTools
Essential Resource Other

A Study of Cryptographic Primitives in the…

by Singh, R. et al.

Lesson 7

Key Text eBook

Security engineering

by Anderson, R
Essential Resource Article

Optimizing Performance of Distributed Web Systems

by Ileana, M.
Essential Resource Article

Design and Implementation of an E-learning…

by Alseelawi, N. S., et al.

Lesson 8

Key Text eBook

Cyber-physical systems: A comprehensive guide

by Sharma, N. et al., eds.
Essential Resource Article

An improved Cyber-Physical Systems architecture…

by Jiang, J. R.
Essential Resource Article

Cyber Physical Systems Security: Analysis,…

by Ashibani, Y. and Mahmoud, Q. H.
Essential Resource Website

Top 10 cyber-physical systems examples in 2023…

by StartUs Insights
Essential Resource Article

Modernizing CPS with Blockchain: Applications,…

by Ansar, S. A., et al.
Essential Resource Other

Cyber-Physical Systems and Internet of Things:…

by Greer, C. et al.

Lesson 9

Key Text eBook

Introduction to quantum computing

by Banafa, A.
Essential Resource Other

Feasible Applications of Quantum Computing in…

by Chamma, E. et al.
Essential Resource Article

Enterprise Post Quantum Cryptography Migration…

by Thakur, M. S. D. et al.
Essential Resource Article

How Quantum Computing Impacts Cyber Security

by Abushgra, A. A.
Essential Resource Website

NIST announces first four quantum-resistant…

by NIST

Footer

  • Library Portal
  • Academic Skills
  • English Language
  • Workshops
  • One-to-one Appointments

Footer 2

  • About Us
  • iLearn
  • News Hub
  • Support
  • Feedback To Win

Footer3

  • About Arden University
  • Cookies Policy
  • Privacy Policy
Contact Us
address icon

Arden University,
Middlemarch Park,
Coventry, CV3 4FJ, UK

email icon

Library@arden.ac.uk
AcademicSkills@arden.ac.uk
EnglishLanguageHub@arden.ac.uk

footer logo

Follow us on

  • Arden twitter

© 2005-2025 Arden University  | All rights reserved