Skip to main content

Mobile Main Menu

  • Library Portal
    • About Library
    • Search the Library
    • A-Z Databases
    • Research Tools
    • Subject Guides
    • Browse Journals
    • AppsAnywhere
    • Accessibility Tools
  • Academic Skills
    • About Academic Skills
    • Academic Integrity
    • Academic Writing
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library
  • English Language Hub
    • About English Language
    • Academic Writing in English
    • Self-Study Resources
  • Workshops
  • One-to-ones

Secondary navigation

  • Your Projects
  • Feedback to Win
  • iLearn
  • About Us
  • Office 365
  • Request It!
  • News Hub
Home

Main Menu

  • Library
    • About Library
    • Search the Library
    • A-Z Databases
    • Subject Guides
    • Research Tools
    • Browse Journals
    • AppsAnywhere
    • Accessibility Tools

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

    Get personalized support from a Librarian

    Book a one-to-one

  • Academic Skills
    • About Academic Skills
    • Academic Integrity
    • Academic Writing
    • Artificial Intelligence
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
  • English Language
    • About English Language
    • Academic Writing in English
    • Self-Study Resources

    Get personalised support from an Academic English Lecturer

    Book a one-to-one

    Get personalised support from an Academic English Lecturer

    Book a one-to-one

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
  • Workshops
  • One-to-Ones

Help

COM7018

Secure Systems Design

All the reading and resources from your modules, all in one place

Reading List Category
Resource Type
Lesson

Lesson 1

Key Text eBook

Security engineering: A guide to building…

by Anderson, R
Essential Resource Website

Security architecture anti-patterns

by NCSC
Essential Resource Website

About us

by OWASP SAMM
Essential Resource Article

The Myth of Secure Computing

by Austin, R. D. and Darby, C. A. R.
Essential Resource Website

Cyber Resilience Act: Shaping Europe’s digital…

by European Commission
Essential Resource Website

Microsoft Security Development Lifecycle Practices

by Microsoft
Essential Resource Website

Fundamental practices for secure software…

by SAFECode
Essential Resource Website

Building Security in Maturity Model (BSIMM)

by Synopsys

Lesson 2

Key Text eBook

Security engineering

by Anderson, R
Essential Resource Website

Secure By Design

by Cybersecurity and Infrastructure Security Agency (CISA)
Essential Resource Other

Enterprise architecture frameworks assessment:…

by Al-Turkistani, H. F., Aldobaian, S. and Latif, R.
Essential Resource Other

Volt Typhoon: China's invisible cyber…

by Uhlmann, C. and Lewis, R.
Wider Reading Website

2023 CWE Top 25 Most Dangerous Weaknesses

by Common Weakness Enumeration (CWE)
Wider Reading Website

Unforgivable vulnerabilities

by Christey, S.

Lesson 3

Key Text eBook

Designing user experience: A guide to HCI, UX and…

by Benyon, D.
Key Text eBook

Security engineering: A guide to building…

by Anderson, R
Essential Resource Video

How your "working memory" makes sense…

by Doolittle, P.
Essential Resource Website

Privacy Framework

by NIST
Essential Resource Article

What are the differences between long-term, short…

by Cowan, N.
Essential Resource Other

The diamond model of intrusion analysis

by Caltagirone, S., Pendergast, A. and Betz, C.
Essential Resource Other

Applying the diamond model of intrusion analysis…

by Ximenes, P., and Mello, P.

Lesson 4

Key Text eBook

Computer System and Network Security

by White, G. B., Fisch, E. A. and Pooch, U. W.
Key Text eBook

Computer Security: Principles and Practice,…

by Stallings, W. and Brown, L.
Essential Resource Website

Secure System Architecture and Design

by UK Cyber Security Council
Essential Resource Website

Unforgivable vulnerabilities

by Christey, S.
Essential Resource Article

Noninterference specifications for secure systems

by Nelson, L. et al.
Essential Resource Article

CONDENSE: A Moving Target Defense Approach for…

by Dai, C. and Adegbija, T.
Wider Reading Website

About professional standards

by UK Cyber Security Council

Lesson 5

Key Text eBook

Computer Security: Principles and Practice,…

by Stallings, W. and Brown, L.
Key Text eBook

Computer System and Network Security

by White, G. B., Fisch, E. A. and Pooch, U. W.
Essential Resource Other

Mathematical investigation of cryptographic…

by Gencoglu, M. T.
Essential Resource Other

Modern techniques for decentralized key…

by Galis, M. et al.
Essential Resource Other

An Approach to Achieve Modern Cryptographic…

by Berlin, K., Dhenakaran, S. S. and Sivabalan, K.
Essential Resource Other

Time Analysis Side Channeling Attack in Symmetric…

by Hettiarachchi, M. J., Sandanuwan, H. H. G. D., and Balasooriya, R. W., et al.
Wider Reading eBook

Logical Foundations of Mathematics and…

by Pudlák, P.
Wider Reading eBook

The Design of Rijndael: AES – the Advanced…

by Daemen, J. and Rijmen, V.

Lesson 6

Key Text eBook

Computer Security: Principles and Practice,…

by Stallings, W. and Brown, L.
Key Text eBook

Security engineering: A guide to building…

by Anderson, R
Essential Resource Website

RSA Key Generator

by CryptoTools.net
Essential Resource Other

A comparative study of PKI trust models

by El Uahhabi, Z. and El Bakkali, H.
Essential Resource Website

String hash calculator

by CryptoTools.net
Essential Resource Website

Hash Functions Online

by OnlineDomainTools
Essential Resource Other

Asymmetric Encryption Algorithms: Primitives and…

by Meng, Z. and Wang, Y.
Essential Resource Article

From collisions to chosen-prefix collisions…

by Leurent, G. and Peyrin, T.,
Essential Resource Other

A Study of Cryptographic Primitives in the…

by Singh, R. et al.

Lesson 7

Key Text eBook

Security engineering

by Anderson, R
Essential Resource Article

Optimizing Performance of Distributed Web Systems

by Ileana, M.
Essential Resource Article

Design and Implementation of an E-learning…

by Alseelawi, N. S., et al.

Lesson 8

Key Text eBook

Cyber-physical systems: A comprehensive guide

by Sharma, N. et al., eds.
Essential Resource Other

An improved Cyber-Physical Systems architecture…

by Jiang, J. R.
Essential Resource Article

Cyber Physical Systems Security: Analysis,…

by Ashibani, Y. and Mahmoud, Q. H.
Essential Resource Website

Top 10 cyber-physical systems examples in 2023…

by StartUs Insights
Essential Resource Website

Arden Futures

by Arden University
Essential Resource Other

Modernizing CPS with Blockchain: Applications,…

by Ansar, S. A., et al.
Essential Resource Other

Cyber-Physical Systems and Internet of Things:…

by Greer, C. et al.

Lesson 9

Key Text eBook

Introduction to quantum computing

by Banafa, A.
Essential Resource Other

Feasible Applications of Quantum Computing in…

by Chamma, E. et al.
Essential Resource Other

Enterprise Post Quantum Cryptography Migration…

by Thakur, M. S. D. et al.
Essential Resource Other

How Quantum Computing Impacts Cyber Security

by Abushgra, A. A.
Essential Resource Website

NIST announces first four quantum-resistant…

by NIST

Footer

  • Library Portal
  • Academic Skills
  • English Language
  • Workshops
  • One-to-one Appointments

Footer 2

  • About Us
  • iLearn
  • News Hub
  • Support
  • Feedback To Win

Footer3

  • About Arden University
  • Cookies Policy
  • Privacy Policy
Contact Us
address icon

Arden University,
Middlemarch Park,
Coventry, CV3 4FJ, UK

email icon
  • Library@arden.ac.uk
  • AcademicSkills@arden.ac.uk
  • EnglishLanguageHub@arden.ac.uk
Arden University logo 

© 2005-2025 Arden University  | All rights reserved