Searching for access : 2082 results found | RSS Feed for this search

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83

Readme file for Introduction to OO Programming in Java

Description

This readme file contains details of links to all the Introduction to OO Programming in Java module's material held on Jorum and information about the module as well.

Subjects

ukoer | programming task guide | programming lecture | programming reading material | software design reading material | classes guide | libraries lecture | classes reading material | classes visual aid | software objects guide | graphics reading material | attributes reading material | attributes visual guide | naming conventions reading material | code reading material | java keywords reading material | variables visual guide | arithmetic reading material | java assignment | making decisions task guide | making decisions lecture | making decisions reading material | boolean expressions visual guide | repetition reading material | while loops visual guide | methods reading material | methods practical | access modifiers reading material | objects reading material | classes assignment | classes practical | child classes task guide | inheritance task guide | extending classes lecture | inheritance reading material | inheritance visual guide | inheritance practical | graphics task guide | awt reading material | graphics visual aid | awt class library reading material | event-driven programming reading material | scrollbars reading material | reflective practice visual guide | mobile phone task guide | mobile phone lecture | fixed repitition reading material | fixed repitition visual guide | mobile phone library reading material | mobile phone reading material | arrays task guide | arrays lecture | arrays reading material | arrays visual guide | creating software objects reading material | software objects visual guide | java practical | generic array list task guide | overriding methods reading material | menu and switch task guide | multi-way decisions reading material | multi-way decisions visual guide | searching task guide | searching lecture | searching reading material | software quality task guide | software quality lecture | software quality reading material | programming assignment | applet reading material | classes visual guide | object-oriented programming | object-oriented | programming | java | problem solving | java program | software design | programming languages | computers | class task guide | class reading material | class assignment | class practical | java classes | variables | attributes | arithmetic | java class | classes and arithmetic | classes | class | decisions | boolean expression | boolean expressions | repetition | methods | aggregate classes | access modifier | access modifiers | child classes | inheritance | child class | graphics | awt class library | fixed repetition | for loop | for loops | array | arrays | iteration | software object | definite iteration | generic lists | generic array list | cast | casting | overriding method | overriding methods | generic list | menu-driven program | menu-driven programs | multi-way decisions | menu and switch | search | searching | software quality | testing | software quality and testing | assessment | computers task guide | programming languages task guide | software design task guide | java program task guide | problem-solving task guide | problem solving task guide | object-oriented programming task guide | java task guide | object-oriented task guide | object oriented task guide | computers lecture | programming languages lecture | software design lecture | java program lecture | problem solving lecture | object-oriented programming lecture | java lecture | object oriented programming lecture | object-oriented lecture | computers reading material | programming languages reading material | java program reading material | problem solving reading material | object-oriented programming reading material | java reading material | object-oriented reading material | object oriented reading material | java classes task guide | variables task guide | attributes task guide | arithmetic task guide | java class task guide | classes and arithmetic task guide | classes task guide | java classes lecture | variables lecture | attributes lecture | arithmetic lecture | java class lecture | classes and arithmetic lecture | classes lecture | class lecture | java classes reading material | variables reading material | java class reading material | classes and arithmetic reading material | java classes visual aid | variables visual aid | attributes visual aid | arithmetic visual aid | java class visual aid | classes and arithmetic visual aid | class visual aid | java visual aid | object-oriented programming visual aid | programming visual aid | object-oriented visual aid | decisions task guide | boolean expression task guide | boolean expressions task guide | repetition task guide | methods task guide | decisions lecture | boolean expression lecture | boolean expressions lecture | repetition lecture | methods lecture | decisions reading material | boolean expression reading material | boolean expressions reading material | decisions visual aid | boolean expression visual aid | boolean expressions visual aid | repetition visual aid | methods visual aid | decisions practical | boolean expression practical | boolean expressions practical | repetition practical | programming practical | object oriented programming practical | object-oriented programming practical | object-oriented practical | object oriented practical | aggregate classes task guide | access modifier task guide | access modifiers task guide | aggregate classes lecture | access modifier lecture | access modifiers lecture | aggregate classes reading material | access modifier reading material | aggregate classes assignment | java classes assignment | access modifier assignment | access modifiers assignment | object oriented programming assignment | object-oriented programming assignment | object-oriented assignment | object oriented assignment | child class task guide | child classes lecture | inheritance lecture | child class lecture | child classes reading material | child class reading material | child classes visual aid | inheritance visual aid | child class visual aid | awt class library task guide | graphics lecture | awt class library lecture | awt class library visual aid | graphics assignment | awt class library assignment | fixed repetition task guide | fixed repetition lecture | fixed repetition visual aid | fixed repetition reading material | for loop task guide | for loops task guide | array task guide | iteration task guide | software object task guide | definite iteration task guide | for loop lecture | for loops lecture | array lecture | iteration lecture | software object lecture | definite iteration lecture | for loop reading material | for loops reading material | array reading material | iteration reading material | software object reading material | definite iteration reading material | for loop visual aid | for loops visual aid | array visual aid | arrays visual aid | iteration visual aid | software object visual aid | definite iteration visual aid | generic lists task guide | cast task guide | casting task guide | overriding method task guide | overriding methods task guide | generic list task guide | generic lists lecture | generic array list lecture | cast lecture | casting lecture | overriding method lecture | overriding methods lecture | generic list lecture | generic lists reading material | generic array list reading material | cast reading material | casting reading material | overriding method reading material | generic list reading material | menu-driven program task guide | menu-driven programs task guide | multi-way decisions task guide | menu-driven program lecture | menu-driven programs lecture | multi-way decisions lecture | menu and switch lecture | menu-driven program reading material | menu-driven programs reading material | menu and switch reading material | menu-driven program visual aid | menu-driven programs visual aid | multi-way decisions visual aid | menu and switch visual aid | search task guide | search lecture | search reading material | testing task guide | software quality and testing task guide | testing lecture | software quality and testing lecture | testing reading material | software quality and testing reading material | assessment reading material | assessment assignment | fixed repetition practical | jcreator guide | g622 | oo | oop | oo programming | awt | oo programming task guide | oop task guide | oo task guide | g622 task guide | oo programming lecture | oop lecture | oo lecture | g622 lecture | oo programming reading material | oop reading material | oo reading material | g622 reading material | g622 visual aid | oop visual aid | oo visual aid | oo programming visual aid | g622 practical | oo practical | oo programming practical | oop practical | g622 assignment | oo assignment | oop assignment | oo programming assignment | awt task guide | awt lecture | awt visual aid | awt assignment | Computer science | I100

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Readme file for Rapid Application Development

Description

This readme file contains details of links to all the Rapid Application Development module's material held on Jorum and information about the module as well.

Subjects

ukoer | access 2003 practical | access 2007 lecture | access 2007 practical | access 2007 task guide | access 2007 | access lecture | access practical | access reading material | action queries lecture | action queries practical | action queries task guide | action queries | action query lecture | action query practical | action query task guide | action query | asp.net lecture | asp.net practical | asp.net reading material | asp.net task guide | asp.net | class modules reading material | classes lecture | classes practical | classes reading material | classes task guide | classes | client server lecture | client server reading material | client server task guide | client server | data access practical | form data lecture | form data practical | form data task guide | form data | forms lecture | forms practical | forms task guide | forms | menus and toolbars lecture | menus and toolbars practical | menus and toolbars task guide | menus and toolbars | menus lecture | menus practical | menus task guide | menus | multitier architecture lecture | multitier architecture reading material | multitier architecture task guide | multitier architecture | multitier architectures lecture | multitier architectures reading material | multitier architectures task guide | multitier architectures | object concepts lecture | object concepts practical | object concepts reading material | object concepts task guide | object concepts | objects practical | objects task guide | queries lecture | rad lecture | rad methodologies reading material | rad methodology lecture | rad methodology practical | rad methodology reading material | rad methodology task guide | rad methodology | rad practical | rad reading material | rad task guide | rad | rapid application development lecture | rapid application development methodologies lecture | rapid application development methodologies practical | rapid application development methodologies reading material | rapid application development methodologies task guide | rapid application development methodologies | rapid application development methodology lecture | rapid application development methodology practical | rapid application development methodology reading material | rapid application development methodology task guide | rapid application development methodology | rapid application development practical | rapid application development reading material | rapid application development task guide | rapid application development | rapid application practical | rapid application task guide | recordset lecture | recordset practical | recordset task guide | recordset | recordsetclone lecture | recordsetclone practical | recordsetclone task guide | recordsetclone | recordsets lecture | recordsets practical | recordsets task guide | recordsets | recordsource practical | reports lecture | reports practical | reports task guide | reports | sql lecture | toolbars lecture | toolbars practical | toolbars task guide | toolbars | unbound recordsets practical | unbound recordsets task guide | user controls lecture | user controls practical | user controls reading material | user controls task guide | user controls | vba practical | vba lecture | vba reading material | vba task guide | vba | visual basic for applications lecture | visual basic for applications practical | visual basic for applications reading material | visual basic for applications task guide | visual basic for applications | visual basic lecture | visual basic practical | visual basic reading material | visual basic task guide | visual basic | web delivery task guide | .net lecture | .net practical | .net reading material | .net task guide | net | 4gl lecture | 4gl practical | 4gl task guide | 4gl | asp lecture | asp practical | asp reading material | asp task guide | asp | g400 lecture | g400 practical | g400 reading material | g400 task guide | g400 | rad methodologies lecture | rad methodologies practical | rad methodologies task guide | rad methodologies | practical report | Computer science | I100

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT) 6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment. 6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | network | computer security | computer security | security | security | cryptography | cryptography | secret-key | secret-key | public-key | public-key | digital signature | digital signature | authentication | authentication | identification | identification | intrusion detection | intrusion detection | virus | virus | operating system | operating system | software | software | protection | protection | electronic mail | electronic mail | email | email | electronic commerce | electronic commerce | electronic cash | electronic cash | firewall | firewall | computer | computer | digital | digital | signature | signature | electronic | electronic | cash | cash | commerce | commerce | mail | mail | operating | operating | system | system | intrustion | intrustion | detection | detection | distributed | distributed | physical | physical | discretionary | discretionary | mandatory | mandatory | access | access | control | control | biometrics | biometrics | information | information | flow | flow | models | models | covert | covert | channels | channels | integrity | integrity | logic | logic | voting | voting | risk | risk | assessment | assessment | secure | secure | web | web | browsers | browsers | architecture | architecture | engineering | engineering | certificates | certificates | multi-user computer systems | multi-user computer systems | distributed computer systems | distributed computer systems | physical security | physical security | discretionary access control | discretionary access control | mandatory access control | mandatory access control | information-flow models | information-flow models | covert channels | covert channels | integrity models | integrity models | elementary cryptography | elementary cryptography | authentication logic;electronic cash | authentication logic;electronic cash | viruses | viruses | firewalls | firewalls | electronic voting | electronic voting | risk assessment | risk assessment | secure web browsers | secure web browsers | network security | network security | architecture engineering | architecture engineering | digital signatures | digital signatures | authentication schemes | authentication schemes | identification schemes | identification schemes | formal models | formal models | secure operating systems | secure operating systems | software protection | software protection | electronic mail security | electronic mail security | World Wide Web | World Wide Web | ecommerce | ecommerce | email security | email security | www | www | payment protocols | payment protocols | authentication logic | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Introduction to OO Programming in Java - Creating Classes

Description

This task guide forms part of the "Creating Classes" topic in the Introduction to OO Programming in Java module.

Subjects

ukoer | class task guide | classes | aggregate classes | java classes | access modifier | access modifiers | class | java | programming | object-oriented programming | object-oriented | classes task guide | aggregate classes task guide | java classes task guide | access modifier task guide | access modifiers task guide | java task guide | programming task guide | object-oriented programming task guide | object-oriented task guide | object oriented task guide | g622 | oo | oop | oo programming | g622 task guide | oo task guide | oop task guide | oo programming task guide | Computer science | I100

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Introduction to OO Programming in Java - Creating Classes

Description

This lecture forms part of the "Creating Classes" topic in the Introduction to OO Programming in Java module.

Subjects

ukoer | classes | aggregate classes | java classes | access modifier | access modifiers | class | java | programming | object-oriented programming | object-oriented | classes lecture | aggregate classes lecture | java classes lecture | access modifier lecture | access modifiers lecture | class lecture | object oriented programming lecture | java lecture | programming lecture | object-oriented programming lecture | object-oriented lecture | g622 | oo | oop | oo programming | g622 lecture | oo lecture | oop lecture | oo programming lecture | Computer science | I100

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Introduction to OO Programming in Java - Creating Classes

Description

This reading material forms part of the "Creating Classes" topic in the Introduction to OO Programming in Java module.

Subjects

ukoer | classes reading material | class reading material | classes | aggregate classes | java classes | access modifier | access modifiers | class | java | programming | object-oriented programming | object-oriented | aggregate classes reading material | java classes reading material | access modifier reading material | access modifiers reading material | java reading material | programming reading material | object-oriented programming reading material | object-oriented reading material | object oriented reading material | g622 | oo | oop | oo programming | g622 reading material | oo reading material | oop reading material | oo programming reading material | Computer science | I100

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Introduction to OO Programming in Java - Creating Classes

Description

This reading material forms part of the "Creating Classes" topic in the Introduction to OO Programming in Java module.

Subjects

ukoer | classes reading material | class reading material | classes | aggregate classes | java classes | access modifier | access modifiers | class | java | programming | object-oriented programming | object-oriented | aggregate classes reading material | java classes reading material | access modifier reading material | access modifiers reading material | java reading material | programming reading material | object-oriented programming reading material | object-oriented reading material | object oriented reading material | g622 | oo | oop | oo programming | g622 reading material | oo reading material | oop reading material | oo programming reading material | Computer science | I100

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Introduction to OO Programming in Java - Creating Classes

Description

This reading material forms part of the "Creating Classes" topic in the Introduction to OO Programming in Java module.

Subjects

ukoer | access modifiers reading material | classes | aggregate classes | java classes | access modifier | access modifiers | class | java | programming | object-oriented programming | object-oriented | classes reading material | aggregate classes reading material | java classes reading material | access modifier reading material | class reading material | java reading material | programming reading material | object-oriented programming reading material | object-oriented reading material | object oriented reading material | g622 | oo | oop | oo programming | g622 reading material | oo reading material | oop reading material | oo programming reading material | Computer science | I100

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Introduction to OO Programming in Java - Creating Classes

Description

This reading material forms part of the "Creating Classes" topic in the Introduction to OO Programming in Java module.

Subjects

ukoer | methods reading material | classes | aggregate classes | java classes | access modifier | access modifiers | class | java | programming | object-oriented programming | object-oriented | classes reading material | aggregate classes reading material | java classes reading material | access modifier reading material | access modifiers reading material | class reading material | java reading material | programming reading material | object-oriented programming reading material | object-oriented reading material | object oriented reading material | g622 | oo | oop | oo programming | g622 reading material | oo reading material | oop reading material | oo programming reading material | Computer science | I100

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Introduction to OO Programming in Java - Creating Classes

Description

This reading material forms part of the "Creating Classes" topic in the Introduction to OO Programming in Java module.

Subjects

ukoer | objects reading material | classes | aggregate classes | java classes | access modifier | access modifiers | class | java | programming | object-oriented programming | object-oriented | classes reading material | aggregate classes reading material | java classes reading material | access modifier reading material | access modifiers reading material | class reading material | java reading material | programming reading material | object-oriented programming reading material | object-oriented reading material | object oriented reading material | g622 | oo | oop | oo programming | g622 reading material | oo reading material | oop reading material | oo programming reading material | Computer science | I100

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

11.332J Urban Design (MIT) 11.332J Urban Design (MIT)

Description

For many years, Cambridge, MA, as host to two major research universities, has been the scene of debates as to how best to meet the competing expectations of different stakeholders. Where there has been success, it has frequently been the result, at least in part, of inventive urban design proposals and the design and implementation of new institutional arrangements to accomplish those proposals. Where there has been failure it has often been explained by the inability - or unwillingness - of one stakeholder to accept and accommodate the expectations of another. The two most recent fall Urban Design Studios have examined these issues at a larger scale. In 2001 we looked at the possible patterns for growth and change in Cambridge, UK, as triggered by the plans of Cambridge University. And i For many years, Cambridge, MA, as host to two major research universities, has been the scene of debates as to how best to meet the competing expectations of different stakeholders. Where there has been success, it has frequently been the result, at least in part, of inventive urban design proposals and the design and implementation of new institutional arrangements to accomplish those proposals. Where there has been failure it has often been explained by the inability - or unwillingness - of one stakeholder to accept and accommodate the expectations of another. The two most recent fall Urban Design Studios have examined these issues at a larger scale. In 2001 we looked at the possible patterns for growth and change in Cambridge, UK, as triggered by the plans of Cambridge University. And i

Subjects

urban planning | urban planning | community | community | stakeholders | stakeholders | development | development | urban growth | urban growth | MIT | MIT | Cambridge | Cambridge | Cambridgeport | Cambridgeport | institutional mechanisms | institutional mechanisms | housing | housing | universities | universities | built form | built form | public space | public space | landscape | landscape | path and access systems | path and access systems | parking | parking | density | density | activity location and intensity | activity location and intensity | planning | planning | finance | finance | public/private partnerships | public/private partnerships | parcelization | parcelization | phasing | phasing | multi-disciplinary teams | multi-disciplinary teams | town and gown | town and gown | Massachusetts | Massachusetts | research universities | research universities | urban design | urban design | Fort Washington | Fort Washington | urban form | urban form | biotech research industry | biotech research industry | activity location | activity location | activity intensity | activity intensity | access systems | access systems | paths | paths | 11.332 | 11.332 | 4.163 | 4.163

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-11.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allpersiancourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Example of a badly designed Web page

Description

This resource is an interactive example of a non-accessible website. By rolling over particular features of the site, students can read explanatory text highlighting what is wrong with these features, and what kind of users they might affect in terms of accessibility. Some of the inappropriate features highlighted here include: flashing text; underlined text; use of capitals; and use of novelty fonts.

Subjects

non-accessible websites | accessibility | accessible websites | websites | RETAILING | Creative Arts and Design | Business and Administrative studies | CRAFTS | INFORMATION | BUSINESS / MANAGEMENT / OFFICE STUDIES | Employability | Learning | Design and delivery of programmes | UK EL08 = SCQF 8 | Higher Diploma | NICAT 5 | CQFW 5 | HN Diploma | Diploma in HE | UK EL04 = SCQF 4 | Foundational Level | NICAT 1 | CQFW 1 | Foundation | GCSE D-G | NVQ 1 | Intermediate 1 | | UK EL05 = SCQF 5 | Intermediate level | Intermediate | NICAT 2 | CQFW 2 | Intermediate | GSCE A-C | NVQ 2 | | UK EL06 = SCQF 6 | Advanced courses | NICAT 3 | CQFW 3 | Advanced | A/AS Level | NVQ 3 | Higher | SVQ 3 | UK EL07 = SCQF 7 | Higher Certificate | NICAT 4 | CQFW 4 | NVQ 4 | Advanced Higher | SVQ 4 | HN Certificate | administrative studies | design | N000 | W000 | ARTS and CRAFTS | INFORMATION TECHNOLOGY and INFORMATION | SALES MARKETING and RETAILING | J | A | C | B

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Rapid Application Development - Characteristics of VBA, Debugging and Validation

Description

This lecture forms part of the "Characteristics of VBA, Debugging and Validation" topic in the Rapid Application Development module.

Subjects

ukoer | vba lecture | vba | access 2007 | visual basic for applications | rad | rapid application development | access 2007 lecture | visual basic for applications lecture | rad lecture | rapid application development lecture | g400 | g400 lecture | Computer science | I100

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Rapid Application Development - Characteristics of VBA, Debugging and Validation

Description

This task guide forms part of the "Characteristics of VBA, Debugging and Validation" topic in the Rapid Application Development module.

Subjects

ukoer | vba task guide | vba | access 2007 | visual basic for applications | rad | rapid application development | access 2007 task guide | visual basic for applications task guide | rad task guide | rapid application development task guide | g400 | g400 task guide | Computer science | I100

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Rapid Application Development - Characteristics of VBA, Debugging and Validation

Description

This task guide forms part of the "Characteristics of VBA, Debugging and Validation" topic in the Rapid Application Development module.

Subjects

ukoer | vba practical | vba | access 2007 | visual basic for applications | rad | rapid application development | vba task guide | access 2007 task guide | visual basic for applications task guide | rad task guide | rapid application development task guide | g400 | g400 task guide | Computer science | I100

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Rapid Application Development - Characteristics of VBA, Debugging and Validation

Description

This practical forms part of the "Characteristics of VBA, Debugging and Validation" topic in the Rapid Application Development module.

Subjects

ukoer | vba practical | vba | access 2007 | visual basic for applications | rad | rapid application development | access 2007 practical | visual basic for applications practical | rad practical | rapid application development practical | g400 | g400 practical | Computer science | I100

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Rapid Application Development - Characteristics of VBA, Debugging and Validation

Description

This practical forms part of the "Characteristics of VBA, Debugging and Validation" topic in the Rapid Application Development module.

Subjects

ukoer | vba practical | vba | access 2007 | visual basic for applications | rad | rapid application development | access 2007 practical | visual basic for applications practical | rad practical | rapid application development practical | g400 | g400 practical | Computer science | I100

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Rapid Application Development - Characteristics of VBA, Debugging and Validation

Description

This practical forms part of the "Characteristics of VBA, Debugging and Validation" topic in the Rapid Application Development module.

Subjects

ukoer | vba practical | vba | access 2007 | visual basic for applications | rad | rapid application development | access 2007 practical | visual basic for applications practical | rad practical | rapid application development practical | g400 | g400 practical | Computer science | I100

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

9.59J Psycholinguistics (MIT) 9.59J Psycholinguistics (MIT)

Description

Central topics in language processing. The structure of language. Sentence processing. Discourse processing. Morphological processing. The storage and access of words in the mental dictionary. Speech processing. The relationship between the computational resources available in working memory and the language processing mechanism. Ambiguity resolution. Discussion of computational modeling, including connectionist models. The relationship between language and thought. Issues in language acquisition including critical period phenomena, the acquisition of speech, and the acquisition of words. Experimental methodologies such as self-paced reading, eye-tracking, cross-modal priming, and neural imaging methods. Central topics in language processing. The structure of language. Sentence processing. Discourse processing. Morphological processing. The storage and access of words in the mental dictionary. Speech processing. The relationship between the computational resources available in working memory and the language processing mechanism. Ambiguity resolution. Discussion of computational modeling, including connectionist models. The relationship between language and thought. Issues in language acquisition including critical period phenomena, the acquisition of speech, and the acquisition of words. Experimental methodologies such as self-paced reading, eye-tracking, cross-modal priming, and neural imaging methods.

Subjects

language processing | language processing | Language | Language | Sentence processing | Sentence processing | Discourse processing | Discourse processing | Morphological processing | Morphological processing | storage | storage | access | access | Speech processing | Speech processing | computation | computation | Ambiguity | Ambiguity | connectionist models | connectionist models | thought | thought | acquisition | acquisition | critical period phenomena | critical period phenomena | acquisition of speech | acquisition of speech | word acquisition | word acquisition | eye-tracking | eye-tracking | cross-modal priming | cross-modal priming | neural imaging methods. | neural imaging methods. | 9.59 | 9.59 | 24.905 | 24.905

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

4.163J Urban Design Studio: Providence (MIT) 4.163J Urban Design Studio: Providence (MIT)

Description

This studio discusses in great detail the design of urban environments, specifically in Providence, RI. It will propose strategies for change in large areas of cities, to be developed over time, involving different actors. Fitting forms into natural, man-made, historical, and cultural contexts; enabling desirable activity patterns; conceptualizing built form; providing infrastructure and service systems; guiding the sensory character of development: all are topics covered in the studio. The course integrates architecture and planning students in joint work and requires individual designs and planning guidelines as a final product. This studio discusses in great detail the design of urban environments, specifically in Providence, RI. It will propose strategies for change in large areas of cities, to be developed over time, involving different actors. Fitting forms into natural, man-made, historical, and cultural contexts; enabling desirable activity patterns; conceptualizing built form; providing infrastructure and service systems; guiding the sensory character of development: all are topics covered in the studio. The course integrates architecture and planning students in joint work and requires individual designs and planning guidelines as a final product.

Subjects

urban planning | urban planning | community | community | stakeholders | stakeholders | development | development | urban growth | urban growth | Providence | Providence | Rhode Island | Rhode Island | institutional mechanisms | institutional mechanisms | housing | housing | waterfront | waterfront | port | port | built form | built form | public space | public space | landscape | landscape | path and access systems | path and access systems | parking | parking | density | density | activity location and intensity | activity location and intensity | planning | planning | finance | finance | public/private partnerships | public/private partnerships | parcelization | parcelization | phasing | phasing | multi-disciplinary teams | multi-disciplinary teams | 4.163 | 4.163 | 11.332 | 11.332

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.441 Transmission of Information (MIT) 6.441 Transmission of Information (MIT)

Description

6.441 offers an introduction to the quantitative theory of information and its applications to reliable, efficient communication systems. Topics include: mathematical definition and properties of information; source coding theorem, lossless compression of data, optimal lossless coding; noisy communication channels, channel coding theorem, the source-channel separation theorem, multiple access channels, broadcast channels, Gaussian noise, and time-varying channels. 6.441 offers an introduction to the quantitative theory of information and its applications to reliable, efficient communication systems. Topics include: mathematical definition and properties of information; source coding theorem, lossless compression of data, optimal lossless coding; noisy communication channels, channel coding theorem, the source-channel separation theorem, multiple access channels, broadcast channels, Gaussian noise, and time-varying channels.

Subjects

transmission of information | transmission of information | quantitative theory of information | quantitative theory of information | efficient communication systems | efficient communication systems | mathematical definition of information | mathematical definition of information | properties of information | properties of information | source coding theorem | source coding theorem | lossless compression of data | lossless compression of data | optimal lossless coding | optimal lossless coding | noisy communication channels | noisy communication channels | channel coding theorem | channel coding theorem | the source-channel separation theorem | the source-channel separation theorem | multiple access channels | multiple access channels | broadcast channels | broadcast channels | gaussian noise | gaussian noise | time-varying channels | time-varying channels | lossless data compression | lossless data compression | telecommunications | telecommunications | data transmission | data transmission

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Magnifying Glass

Description

The "Magnifying Glass" is a simple widget that magnifies text and images.The widget shows a magnifying glass that the user can drag over text and/or images. When the magnifying glass stays on the spot for more than 2 seconds, it zooms in and make the text appear larger or zoom into the image. Developed as part of the JISC Widgets for Inclusive Distributed Environments (WIDE) project. WIDE is a joint project between the Accessibility Research Centre at Teesside University, JISC TechDis and Portland College that aims to make online learning more accessible and inclusive for disabled students/learners. Our objective is to develop open educational resources that improve or support the learning experience and can be shared and that can be shared and adapted by the community. This project exte

Subjects

visual impairments | magnify | zoom | accessibility | widgets | accessibility research centre | Technologies | J000

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata