Searching for computer system : 25 results found | RSS Feed for this search

1

6.858 Computer Systems Security (MIT) 6.858 Computer Systems Security (MIT)

Description

Includes audio/video content: AV lectures. 6.858 Computer Systems Security is a class about the design and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and techniques for achieving security, based on recent research papers. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware security, and security in web applications. Includes audio/video content: AV lectures. 6.858 Computer Systems Security is a class about the design and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and techniques for achieving security, based on recent research papers. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware security, and security in web applications.

Subjects

computer system design | computer system design | secure computer systems | secure computer systems | threat model | threat model | computer systems security | computer systems security | operating system | operating system | operating system security | operating system security | capabilities | capabilities | information flow control | information flow control | language security | language security | network protocols | network protocols | hardware security | hardware security | web | web | web application security | web application security | secure web server | secure web server | web application | web application

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allavcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.823 Computer System Architecture (MIT) 6.823 Computer System Architecture (MIT)

Description

6.823 is a study of the evolution of computer architecture and the factors influencing the design of hardware and software elements of computer systems. Topics may include: instruction set design; processor micro-architecture and pipelining; cache and virtual memory organizations; protection and sharing; I/O and interrupts; in-order and out-of-order superscalar architectures; VLIW machines; vector supercomputers; multithreaded architectures; symmetric multiprocessors; and parallel computers. 6.823 is a study of the evolution of computer architecture and the factors influencing the design of hardware and software elements of computer systems. Topics may include: instruction set design; processor micro-architecture and pipelining; cache and virtual memory organizations; protection and sharing; I/O and interrupts; in-order and out-of-order superscalar architectures; VLIW machines; vector supercomputers; multithreaded architectures; symmetric multiprocessors; and parallel computers.

Subjects

computer architecture | | computer architecture | | computer system architecture | | computer system architecture | | hardware | | hardware | | hardware design | | hardware design | | software | | software | | software design | | software design | | instruction set design | | instruction set design | | processor micro-architecture | | processor micro-architecture | | pipelining | | pipelining | | cache memory | | cache memory | | irtual memory | | irtual memory | | I/O | | I/O | | input/output | | input/output | | interrupts | | interrupts | | superscalar architectures | | superscalar architectures | | VLIW machines | | VLIW machines | | vector supercomputers | | vector supercomputers | | multithreaded architectures | | multithreaded architectures | | symmetric multiprocessors | | symmetric multiprocessors | | parallel computers | parallel computers | computer architecture | computer architecture | computer system architecture | computer system architecture | hardware | hardware | hardware design | hardware design | software | software | software design | software design | instruction set design | instruction set design | processor micro-architecture | processor micro-architecture | pipelining | pipelining | cache memory | cache memory | virtual memory | virtual memory | I/O | I/O | input/output | input/output | interrupts | interrupts | superscalar architectures | superscalar architectures | VLIW machines | VLIW machines | vector supercomputers | vector supercomputers | multithreaded architectures | multithreaded architectures | symmetric multiprocessors | symmetric multiprocessors

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.033 Computer System Engineering (MIT) 6.033 Computer System Engineering (MIT)

Description

Includes audio/video content: AV lectures. This course covers topics on the engineering of computer software and hardware systems: techniques for controlling complexity; strong modularity using client-server design, virtual memory, and threads; networks; atomicity and coordination of parallel activities; recovery and reliability; privacy, security, and encryption; and impact of computer systems on society. Case studies of working systems and readings from the current literature provide comparisons and contrasts. Two design projects are required, and students engage in extensive written communication exercises. Includes audio/video content: AV lectures. This course covers topics on the engineering of computer software and hardware systems: techniques for controlling complexity; strong modularity using client-server design, virtual memory, and threads; networks; atomicity and coordination of parallel activities; recovery and reliability; privacy, security, and encryption; and impact of computer systems on society. Case studies of working systems and readings from the current literature provide comparisons and contrasts. Two design projects are required, and students engage in extensive written communication exercises.

Subjects

computer systems | computer systems | systems design | systems design | complexity | complexity | abstractions | abstractions | modularity | modularity | client server | client server | operating system | operating system | performance | performance | networks | networks | layering | layering | routing | routing | congestion control | congestion control | reliability | reliability | atomicity | atomicity | isolation | isolation | security | security | authentication | authentication | cryptography | cryptography | therac 25 | therac 25 | unix | unix | mapreduce | mapreduce | architecture of complexity | architecture of complexity | trusting trust | trusting trust | computer system design | computer system design

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allavcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.823 Computer System Architecture (MIT) 6.823 Computer System Architecture (MIT)

Description

6.823 is a course in the department's "Computer Systems and Architecture" concentration. 6.823 is a study of the evolution of computer architecture and the factors influencing the design of hardware and software elements of computer systems. Topics may include: instruction set design; processor micro-architecture and pipelining; cache and virtual memory organizations; protection and sharing; I/O and interrupts; in-order and out-of-order superscalar architectures; VLIW machines; vector supercomputers; multithreaded architectures; symmetric multiprocessors; and parallel computers. 6.823 is a course in the department's "Computer Systems and Architecture" concentration. 6.823 is a study of the evolution of computer architecture and the factors influencing the design of hardware and software elements of computer systems. Topics may include: instruction set design; processor micro-architecture and pipelining; cache and virtual memory organizations; protection and sharing; I/O and interrupts; in-order and out-of-order superscalar architectures; VLIW machines; vector supercomputers; multithreaded architectures; symmetric multiprocessors; and parallel computers.

Subjects

computer architecture | computer architecture | computer system architecture | computer system architecture | hardware | hardware | hardware design | hardware design | software | software | software design | software design | instruction set design | instruction set design | processor micro-architecture | processor micro-architecture | pipelining | pipelining | cache memory | cache memory | virtual memory | virtual memory | I/O | I/O | input/output | input/output | interrupts | interrupts | superscalar architectures | superscalar architectures | VLIW machines | VLIW machines | vector supercomputers | vector supercomputers | multithreaded architectures | multithreaded architectures | symmetric multiprocessors | symmetric multiprocessors | parallel computers | parallel computers | computer system | computer system

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-6.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

MAS.963 Out of Context: A Course on Computer Systems That Adapt To, and Learn From, Context (MIT) MAS.963 Out of Context: A Course on Computer Systems That Adapt To, and Learn From, Context (MIT)

Description

Increasingly, we are realizing that to make computer systems more intelligent and responsive to users, we will have to make them more sensitive to context. Traditional hardware and software design overlooks context because it conceptualizes systems as input-output functions. Systems take input explicitly given to them by a human, act upon that input alone and produce explicit output. But this view is too restrictive. Smart computers, intelligent agent software, and digital devices of the future will also have to operate on data that they observe or gather for themselves. They may have to sense their environment, decide which aspects of a situation are really important, and infer the user's intention from concrete actions. The system's actions may be dependent on time, place, or the histo Increasingly, we are realizing that to make computer systems more intelligent and responsive to users, we will have to make them more sensitive to context. Traditional hardware and software design overlooks context because it conceptualizes systems as input-output functions. Systems take input explicitly given to them by a human, act upon that input alone and produce explicit output. But this view is too restrictive. Smart computers, intelligent agent software, and digital devices of the future will also have to operate on data that they observe or gather for themselves. They may have to sense their environment, decide which aspects of a situation are really important, and infer the user's intention from concrete actions. The system's actions may be dependent on time, place, or the histo

Subjects

omputer systems | omputer systems | computer systems | computer systems | input | input | context | context | computer systems that adapt | computer systems that adapt | smart computers | smart computers | intelligent agent software | intelligent agent software | digital devices of the future | digital devices of the future | context-aware application | context-aware application | artificial intelligence | artificial intelligence

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-MAS.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT) 6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment. 6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | network | computer security | computer security | security | security | cryptography | cryptography | secret-key | secret-key | public-key | public-key | digital signature | digital signature | authentication | authentication | identification | identification | intrusion detection | intrusion detection | virus | virus | operating system | operating system | software | software | protection | protection | electronic mail | electronic mail | email | email | electronic commerce | electronic commerce | electronic cash | electronic cash | firewall | firewall | computer | computer | digital | digital | signature | signature | electronic | electronic | cash | cash | commerce | commerce | mail | mail | operating | operating | system | system | intrustion | intrustion | detection | detection | distributed | distributed | physical | physical | discretionary | discretionary | mandatory | mandatory | access | access | control | control | biometrics | biometrics | information | information | flow | flow | models | models | covert | covert | channels | channels | integrity | integrity | logic | logic | voting | voting | risk | risk | assessment | assessment | secure | secure | web | web | browsers | browsers | architecture | architecture | engineering | engineering | certificates | certificates | multi-user computer systems | multi-user computer systems | distributed computer systems | distributed computer systems | physical security | physical security | discretionary access control | discretionary access control | mandatory access control | mandatory access control | information-flow models | information-flow models | covert channels | covert channels | integrity models | integrity models | elementary cryptography | elementary cryptography | authentication logic;electronic cash | authentication logic;electronic cash | viruses | viruses | firewalls | firewalls | electronic voting | electronic voting | risk assessment | risk assessment | secure web browsers | secure web browsers | network security | network security | architecture engineering | architecture engineering | digital signatures | digital signatures | authentication schemes | authentication schemes | identification schemes | identification schemes | formal models | formal models | secure operating systems | secure operating systems | software protection | software protection | electronic mail security | electronic mail security | World Wide Web | World Wide Web | ecommerce | ecommerce | email security | email security | www | www | payment protocols | payment protocols | authentication logic | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.858 Computer Systems Security (MIT)

Description

6.858 Computer Systems Security is a class about the design and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and techniques for achieving security, based on recent research papers. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware security, and security in web applications.

Subjects

computer system design | secure computer systems | threat model | computer systems security | operating system | operating system security | capabilities | information flow control | language security | network protocols | hardware security | web | web application security | secure web server | web application

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.033 Computer System Engineering (SMA 5501) (MIT) 6.033 Computer System Engineering (SMA 5501) (MIT)

Description

This course covers topics on the engineering of computer software and hardware systems: techniques for controlling complexity; strong modularity using client-server design, virtual memory, and threads; networks; atomicity and coordination of parallel activities; recovery and reliability; privacy, security, and encryption; and impact of computer systems on society. We will also look at case studies of working systems and readings from the current literature provide comparisons and contrasts, and do two design projects. Students engage in extensive written communication exercises. Enrollment may be limited. This course is worth 4 Engineering Design Points.This course was also taught as part of the Singapore-MIT Alliance (SMA) programme as course number SMA 5501 (Computer System Engineering). This course covers topics on the engineering of computer software and hardware systems: techniques for controlling complexity; strong modularity using client-server design, virtual memory, and threads; networks; atomicity and coordination of parallel activities; recovery and reliability; privacy, security, and encryption; and impact of computer systems on society. We will also look at case studies of working systems and readings from the current literature provide comparisons and contrasts, and do two design projects. Students engage in extensive written communication exercises. Enrollment may be limited. This course is worth 4 Engineering Design Points.This course was also taught as part of the Singapore-MIT Alliance (SMA) programme as course number SMA 5501 (Computer System Engineering).

Subjects

computer software | computer software | hardware systems | hardware systems | controlling complexity | controlling complexity | strong modularity | strong modularity | client-server design | client-server design | virtual memory | virtual memory | threads | threads | networks | networks | atomicity | atomicity | coordination | coordination | parallel activities | parallel activities | recovery | recovery | reliability | reliability | privacy | privacy | security | security | encryption | encryption | impact on society | impact on society | computer systems | computer systems | case studies | case studies

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.824 Distributed Computer Systems (MIT) 6.824 Distributed Computer Systems (MIT)

Description

This course covers abstractions and implementation techniques for the design of distributed systems. Topics include: server design, network programming, naming, storage systems, security, and fault tolerance. The assigned readings for the course are from current literature. This course is worth 6 Engineering Design Points. This course covers abstractions and implementation techniques for the design of distributed systems. Topics include: server design, network programming, naming, storage systems, security, and fault tolerance. The assigned readings for the course are from current literature. This course is worth 6 Engineering Design Points.

Subjects

distributed computer systems | distributed computer systems | abstractions | abstractions | server design | server design | network programming | network programming | naming | naming | storage systems | storage systems | security | security | fault tolerance | fault tolerance | C++ | C++

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.826 Principles of Computer Systems (MIT) 6.826 Principles of Computer Systems (MIT)

Description

6.826 provides an introduction to the basic principles of computer systems, with emphasis on the use of rigorous techniques as an aid to understanding and building modern computing systems. Particular attention is paid to concurrent and distributed systems. Topics covered include: specification and verification, concurrent algorithms, synchronization, naming, networking, replication techniques (including distributed cache management), and principles and algorithms for achieving reliability. 6.826 provides an introduction to the basic principles of computer systems, with emphasis on the use of rigorous techniques as an aid to understanding and building modern computing systems. Particular attention is paid to concurrent and distributed systems. Topics covered include: specification and verification, concurrent algorithms, synchronization, naming, networking, replication techniques (including distributed cache management), and principles and algorithms for achieving reliability.

Subjects

computer system | computer system | concurrent system | concurrent system | distributed system | distributed system | specification | specification | verification | verification | concurrent algorithms | concurrent algorithms | synchronization | synchronization | naming | naming | networking | networking | replication techniques | replication techniques | distributed cache management | distributed cache management

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-6.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allpersiancourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.823 Computer System Architecture (MIT)

Description

6.823 is a course in the department's "Computer Systems and Architecture" concentration. 6.823 is a study of the evolution of computer architecture and the factors influencing the design of hardware and software elements of computer systems. Topics may include: instruction set design; processor micro-architecture and pipelining; cache and virtual memory organizations; protection and sharing; I/O and interrupts; in-order and out-of-order superscalar architectures; VLIW machines; vector supercomputers; multithreaded architectures; symmetric multiprocessors; and parallel computers.

Subjects

computer architecture | computer system architecture | hardware | hardware design | software | software design | instruction set design | processor micro-architecture | pipelining | cache memory | virtual memory | I/O | input/output | interrupts | superscalar architectures | VLIW machines | vector supercomputers | multithreaded architectures | symmetric multiprocessors | parallel computers | computer system

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allsimplifiedchinesecourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.823 Computer System Architecture (MIT)

Description

6.823 is a study of the evolution of computer architecture and the factors influencing the design of hardware and software elements of computer systems. Topics may include: instruction set design; processor micro-architecture and pipelining; cache and virtual memory organizations; protection and sharing; I/O and interrupts; in-order and out-of-order superscalar architectures; VLIW machines; vector supercomputers; multithreaded architectures; symmetric multiprocessors; and parallel computers.

Subjects

computer architecture | | computer system architecture | | hardware | | hardware design | | software | | software design | | instruction set design | | processor micro-architecture | | pipelining | | cache memory | | irtual memory | | I/O | | input/output | | interrupts | | superscalar architectures | | VLIW machines | | vector supercomputers | | multithreaded architectures | | symmetric multiprocessors | | parallel computers | computer architecture | computer system architecture | hardware | hardware design | software | software design | instruction set design | processor micro-architecture | pipelining | cache memory | virtual memory | I/O | input/output | interrupts | superscalar architectures | VLIW machines | vector supercomputers | multithreaded architectures | symmetric multiprocessors

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

MAS.963 Out of Context: A Course on Computer Systems That Adapt To, and Learn From, Context (MIT)

Description

Increasingly, we are realizing that to make computer systems more intelligent and responsive to users, we will have to make them more sensitive to context. Traditional hardware and software design overlooks context because it conceptualizes systems as input-output functions. Systems take input explicitly given to them by a human, act upon that input alone and produce explicit output. But this view is too restrictive. Smart computers, intelligent agent software, and digital devices of the future will also have to operate on data that they observe or gather for themselves. They may have to sense their environment, decide which aspects of a situation are really important, and infer the user's intention from concrete actions. The system's actions may be dependent on time, place, or the histo

Subjects

omputer systems | computer systems | input | context | computer systems that adapt | smart computers | intelligent agent software | digital devices of the future | context-aware application | artificial intelligence

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.033 Computer System Engineering (MIT)

Description

This course covers topics on the engineering of computer software and hardware systems: techniques for controlling complexity; strong modularity using client-server design, virtual memory, and threads; networks; atomicity and coordination of parallel activities; recovery and reliability; privacy, security, and encryption; and impact of computer systems on society. Case studies of working systems and readings from the current literature provide comparisons and contrasts. Two design projects are required, and students engage in extensive written communication exercises.

Subjects

computer systems | systems design | complexity | abstractions | modularity | client server | operating system | performance | networks | layering | routing | congestion control | reliability | atomicity | isolation | security | authentication | cryptography | therac 25 | unix | mapreduce | architecture of complexity | trusting trust | computer system design

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.823 Computer System Architecture (MIT)

Description

6.823 is a course in the department's "Computer Systems and Architecture" concentration. 6.823 is a study of the evolution of computer architecture and the factors influencing the design of hardware and software elements of computer systems. Topics may include: instruction set design; processor micro-architecture and pipelining; cache and virtual memory organizations; protection and sharing; I/O and interrupts; in-order and out-of-order superscalar architectures; VLIW machines; vector supercomputers; multithreaded architectures; symmetric multiprocessors; and parallel computers.

Subjects

computer architecture | computer system architecture | hardware | hardware design | software | software design | instruction set design | processor micro-architecture | pipelining | cache memory | virtual memory | I/O | input/output | interrupts | superscalar architectures | VLIW machines | vector supercomputers | multithreaded architectures | symmetric multiprocessors | parallel computers | computer system

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

assistive technology

Description

This powerPoint presentation demonstrates the importance of assistive technology and considers how computer systems are used by disabled people

Subjects

ukoer | computer systems | disability | Information and Computer Sciences | Creative Arts and Design | design | W000

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

F1FA 11 IT Systems

Description

This Unit is designed to enable users to evaluate computer systems and their major peripherals. The student will learn how to set up peripherals in order to transfer data between a computer system and the peripheral, methods used to reduce health and security risks associated with using a computer system.

Subjects

computer systems | peripherals | data transfer | security | F1FA11 | TranSETT | CA: Computer Technology | SCQF Level 5

License

Attribution-NonCommercial-ShareAlike 3.0 Unported Attribution-NonCommercial-ShareAlike 3.0 Unported http://creativecommons.org/licenses/by-nc-sa/3.0/ http://creativecommons.org/licenses/by-nc-sa/3.0/ Scotland's Colleges / SQA Scotland's Colleges / SQA

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

F1GP 10 Introduction to IT systems

Description

This Unit is designed to enable users to set-up and use the features of modern computer systems in day to day use. The student will be introduced to computers and the components that make up modern computer hardware.

Subjects

TranSETT | F1GP10 | PC Passport | computer hardware | peripherals | health and safety | computer systems | Graphical User Interface | GUI | CA : Computer Technology | SCQF Level 4

License

Attribution-NonCommercial-ShareAlike 3.0 Unported Attribution-NonCommercial-ShareAlike 3.0 Unported http://creativecommons.org/licenses/by-nc-sa/3.0/ http://creativecommons.org/licenses/by-nc-sa/3.0/ Scotland's Colleges / SQA Scotland's Colleges / SQA

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Parts of a computer system assessment: keeping your computer happy

Description

Part of eMerge: a programme of E-learning staff development for Scotland's colleges, funded by the SFEFC.

Subjects

learning support | parts of a computer | computer system | SCQF Level 2

License

Attribution-NonCommercial-ShareAlike 4.0 International Attribution-NonCommercial-ShareAlike 4.0 International http://creativecommons.org/licenses/by-nc-sa/4.0/ http://creativecommons.org/licenses/by-nc-sa/4.0/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.033 Computer System Engineering (SMA 5501) (MIT)

Description

This course covers topics on the engineering of computer software and hardware systems: techniques for controlling complexity; strong modularity using client-server design, virtual memory, and threads; networks; atomicity and coordination of parallel activities; recovery and reliability; privacy, security, and encryption; and impact of computer systems on society. We will also look at case studies of working systems and readings from the current literature provide comparisons and contrasts, and do two design projects. Students engage in extensive written communication exercises. Enrollment may be limited. This course is worth 4 Engineering Design Points.This course was also taught as part of the Singapore-MIT Alliance (SMA) programme as course number SMA 5501 (Computer System Engineering).

Subjects

computer software | hardware systems | controlling complexity | strong modularity | client-server design | virtual memory | threads | networks | atomicity | coordination | parallel activities | recovery | reliability | privacy | security | encryption | impact on society | computer systems | case studies

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.824 Distributed Computer Systems (MIT)

Description

This course covers abstractions and implementation techniques for the design of distributed systems. Topics include: server design, network programming, naming, storage systems, security, and fault tolerance. The assigned readings for the course are from current literature. This course is worth 6 Engineering Design Points.

Subjects

distributed computer systems | abstractions | server design | network programming | naming | storage systems | security | fault tolerance | C++

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.826 Principles of Computer Systems (MIT)

Description

6.826 provides an introduction to the basic principles of computer systems, with emphasis on the use of rigorous techniques as an aid to understanding and building modern computing systems. Particular attention is paid to concurrent and distributed systems. Topics covered include: specification and verification, concurrent algorithms, synchronization, naming, networking, replication techniques (including distributed cache management), and principles and algorithms for achieving reliability.

Subjects

computer system | concurrent system | distributed system | specification | verification | concurrent algorithms | synchronization | naming | networking | replication techniques | distributed cache management

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata