Entry requirements
The course is open to professionals with several years experience in computing who are usually graduates in Computer Science with a First or Second Class Honours degree from a British university or equivalent qualification and to non-computing professionals such as solicitors, barristers, bankers, accountants and police and other occupations who combat computer crime. Each applicant is considered on his or her own merits. A flexible attitude will be taken towards those employed in an industrial or academic context that is related to IT Security and formal qualifications are not necessarily required. MSc IT Security: Book Review You are asked to write a book review in no more than 1000 words on any one book that is relevant to Information Technology Security. Critically assess the strengths and weaknesses of this book. The submission of the review does not guarantee a place on the course. The review will be used to assess your level of ability and evaluate suitability for the course. Only the admissions tutor can determine whether the review has been ‘successfully’ competed. The admissions tutors decision is final. If you are stuck for choice then I have provided examples of relevant texts below: Forrester, T. & Morrison, P. (1995) Computer Ethics, London MIT Press Garfinkel, S. & Spafford, G. (1997) Web security & Commerce, Cambridge:O’Reilly Russell, D. & Gangemi Sr., G.T. (1991) Computer Security Basics, Sebastapol: O’Reilly Parker, D. (1998) Fighting Computer Crime, London: Wiley Stoll, C. (1991) The Cuckoo’s Egg, London: Pan Do not feel restricted to the list above.