Searching for electronic mail : 10 results found | RSS Feed for this search

6.857 Network and Computer Security (MIT) 6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment. 6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | network | computer security | computer security | security | security | cryptography | cryptography | secret-key | secret-key | public-key | public-key | digital signature | digital signature | authentication | authentication | identification | identification | intrusion detection | intrusion detection | virus | virus | operating system | operating system | software | software | protection | protection | electronic mail | electronic mail | email | email | electronic commerce | electronic commerce | electronic cash | electronic cash | firewall | firewall | computer | computer | digital | digital | signature | signature | electronic | electronic | cash | cash | commerce | commerce | mail | mail | operating | operating | system | system | intrustion | intrustion | detection | detection | distributed | distributed | physical | physical | discretionary | discretionary | mandatory | mandatory | access | access | control | control | biometrics | biometrics | information | information | flow | flow | models | models | covert | covert | channels | channels | integrity | integrity | logic | logic | voting | voting | risk | risk | assessment | assessment | secure | secure | web | web | browsers | browsers | architecture | architecture | engineering | engineering | certificates | certificates | multi-user computer systems | multi-user computer systems | distributed computer systems | distributed computer systems | physical security | physical security | discretionary access control | discretionary access control | mandatory access control | mandatory access control | information-flow models | information-flow models | covert channels | covert channels | integrity models | integrity models | elementary cryptography | elementary cryptography | authentication logic;electronic cash | authentication logic;electronic cash | viruses | viruses | firewalls | firewalls | electronic voting | electronic voting | risk assessment | risk assessment | secure web browsers | secure web browsers | network security | network security | architecture engineering | architecture engineering | digital signatures | digital signatures | authentication schemes | authentication schemes | identification schemes | identification schemes | formal models | formal models | secure operating systems | secure operating systems | software protection | software protection | electronic mail security | electronic mail security | World Wide Web | World Wide Web | ecommerce | ecommerce | email security | email security | www | www | payment protocols | payment protocols | authentication logic | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allpersiancourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

21W.780 Communicating in Technical Organizations (MIT) 21W.780 Communicating in Technical Organizations (MIT)

Description

This course focuses on an exploration of the role that communication plays in the work of the contemporary engineering and science professional. Emphasis is placed on analyzing how composition and publication contribute to work management and knowledge production, as well as the "how-to" aspects of writing specific kinds of documents in a clear style. Topics include: communication as organizational process, electronic modes such as e-mail and the Internet, the informational and social roles of specific document forms, writing as collaboration, the writing process, the elements of style, methods of oral presentation, and communication ethics. Case studies used as the basis for class discussion and some writing assignments. Several short documents, a longer report or article, and a This course focuses on an exploration of the role that communication plays in the work of the contemporary engineering and science professional. Emphasis is placed on analyzing how composition and publication contribute to work management and knowledge production, as well as the "how-to" aspects of writing specific kinds of documents in a clear style. Topics include: communication as organizational process, electronic modes such as e-mail and the Internet, the informational and social roles of specific document forms, writing as collaboration, the writing process, the elements of style, methods of oral presentation, and communication ethics. Case studies used as the basis for class discussion and some writing assignments. Several short documents, a longer report or article, and a

Subjects

Communicating; Technical;Organizations | Communicating; Technical;Organizations | document | document | abstracts | abstracts | executive | executive | summaries | summaries | memos | memos | proposals | proposals | progress | progress | reports | reports | PowerPoint | PowerPoint | Web | Web | poster | poster | writing | writing | Communicating | Communicating | Technical | Technical | Organizations | Organizations | engineering professionals | engineering professionals | science professionals | science professionals | composition | composition | publication | publication | work management | work management | knowledge production | knowledge production | technical writing | technical writing | organizational process | organizational process | electronic communication | electronic communication | electronic mail | electronic mail | e-mail | e-mail | internet | internet | intranet | intranet | informational roles | informational roles | social roles | social roles | collaboration | collaboration | writing process | writing process | elements of style | elements of style | oral presentation | oral presentation | communication ethics | communication ethics | communicating technical information | communicating technical information | web-based media | web-based media | video | video | teleconferencing | teleconferencing | document types | document types | executive summaries | executive summaries | technical memos | technical memos | progress reports | progress reports | final reports | final reports | oral reports | oral reports

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

21W.780 Communicating in Technical Organizations (MIT)

Description

This course focuses on an exploration of the role that communication plays in the work of the contemporary engineering and science professional. Emphasis is placed on analyzing how composition and publication contribute to work management and knowledge production, as well as the "how-to" aspects of writing specific kinds of documents in a clear style. Topics include: communication as organizational process, electronic modes such as e-mail and the Internet, the informational and social roles of specific document forms, writing as collaboration, the writing process, the elements of style, methods of oral presentation, and communication ethics. Case studies used as the basis for class discussion and some writing assignments. Several short documents, a longer report or article, and a short o

Subjects

Communicating; Technical;Organizations | document | abstracts | executive | summaries | memos | proposals | progress | reports | PowerPoint | Web | poster | writing | Communicating | Technical | Organizations | engineering professionals | science professionals | composition | publication | work management | knowledge production | technical writing | organizational process | electronic communication | electronic mail | e-mail | internet | intranet | informational roles | social roles | collaboration | writing process | elements of style | oral presentation | communication ethics | communicating technical information | web-based media | video | teleconferencing | document types | executive summaries | technical memos | progress reports | final reports | oral reports

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

New email window

Description

Illustration of a section of a new email window. Does not refer to any particular software package. Copyright Swansea College 2005.

Subjects

computers | communications | information technology | electronic mail | BUSINESS / MANAGEMENT / OFFICE STUDIES | Mathematical and Computer Sciences | Employability | Design and delivery of programmes | UK EL04 = SCQF 4 | Foundational Level | NICAT 1 | CQFW 1 | Foundation | GCSE D-G | NVQ 1 | Intermediate 1 | | UK EL05 = SCQF 5 | Intermediate level | Intermediate | NICAT 2 | CQFW 2 | Intermediate | GSCE A-C | NVQ 2 | | UK EL06 = SCQF 6 | Advanced courses | NICAT 3 | CQFW 3 | Advanced | A/AS Level | NVQ 3 | Higher | SVQ 3 | Computer science | I100 | A

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

GroupWise email tutorial : missing sent items

Description

This tutorial demonstrates how to find 'missing sent' items in GroupWise email. This resource was produced as part of the North West Content Exchange (NWCE) program.

Subjects

emails | electronic mail | communications | groupwise | INFORMATION | BUSINESS / MANAGEMENT / OFFICE STUDIES | Business and Administrative studies | UK EL03 = SCQF 3 | Level 3 | Entry level 2 | NICAT Entry | Access 3 | Foundation SG | UK EL04 = SCQF 4 | Foundational Level | NICAT 1 | CQFW 1 | Foundation | GCSE D-G | NVQ 1 | Intermediate 1 | | UK EL05 = SCQF 5 | Intermediate level | Intermediate | NICAT 2 | CQFW 2 | Intermediate | GSCE A-C | NVQ 2 | | Learning | Students | administrative studies | N000 | INFORMATION TECHNOLOGY and INFORMATION | A | C

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

GroupWise email tutorial : proxy settings

Description

This tutorial demonstrates how to change the proxy settings in GroupWise email. This resource was produced as part of the North West Content Exchange (NWCE) program.

Subjects

emails | electronic communications | communications | electronic mail | groupwise | INFORMATION | BUSINESS / MANAGEMENT / OFFICE STUDIES | Business and Administrative studies | UK EL03 = SCQF 3 | Level 3 | Entry level 2 | NICAT Entry | Access 3 | Foundation SG | UK EL04 = SCQF 4 | Foundational Level | NICAT 1 | CQFW 1 | Foundation | GCSE D-G | NVQ 1 | Intermediate 1 | | UK EL05 = SCQF 5 | Intermediate level | Intermediate | NICAT 2 | CQFW 2 | Intermediate | GSCE A-C | NVQ 2 | | Learning | Students | administrative studies | N000 | INFORMATION TECHNOLOGY and INFORMATION | A | C

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

21W.780 Communicating in Technical Organizations (MIT)

Description

This course focuses on an exploration of the role that communication plays in the work of the contemporary engineering and science professional. Emphasis is placed on analyzing how composition and publication contribute to work management and knowledge production, as well as the "how-to" aspects of writing specific kinds of documents in a clear style. Topics include: communication as organizational process, electronic modes such as e-mail and the Internet, the informational and social roles of specific document forms, writing as collaboration, the writing process, the elements of style, methods of oral presentation, and communication ethics. Case studies used as the basis for class discussion and some writing assignments. Several short documents, a longer report or article, and a

Subjects

Communicating; Technical;Organizations | document | abstracts | executive | summaries | memos | proposals | progress | reports | PowerPoint | Web | poster | writing | Communicating | Technical | Organizations | engineering professionals | science professionals | composition | publication | work management | knowledge production | technical writing | organizational process | electronic communication | electronic mail | e-mail | internet | intranet | informational roles | social roles | collaboration | writing process | elements of style | oral presentation | communication ethics | communicating technical information | web-based media | video | teleconferencing | document types | executive summaries | technical memos | progress reports | final reports | oral reports

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata