Searching for encryption : 28 results found | RSS Feed for this search

1

18.304 Undergraduate Seminar in Discrete Mathematics (MIT) 18.304 Undergraduate Seminar in Discrete Mathematics (MIT)

Description

This course is a student-presented seminar in combinatorics, graph theory, and discrete mathematics in general. Instruction and practice in written and oral communication is emphasized, with participants reading and presenting papers from recent mathematics literature and writing a final paper in a related topic. This course is a student-presented seminar in combinatorics, graph theory, and discrete mathematics in general. Instruction and practice in written and oral communication is emphasized, with participants reading and presenting papers from recent mathematics literature and writing a final paper in a related topic.

Subjects

discrete math; discrete mathematics; discrete; math; mathematics; seminar; presentations; student presentations; oral; communication; stable marriage; dych; emergency; response vehicles; ambulance; game theory; congruences; color theorem; four color; cake cutting; algorithm; RSA; encryption; numberical integration; sorting; post correspondence problem; PCP; ramsey; van der waals; fibonacci; recursion; domino; tiling; towers; hanoi; pigeonhole; principle; matrix; hamming; code; hat game; juggling; zero-knowledge; proof; repeated games; lewis carroll; determinants; infinitude of primes; bridges; konigsberg; koenigsberg; time series analysis; GARCH; rational; recurrence; relations; digital; image; compression; quantum computing | discrete math; discrete mathematics; discrete; math; mathematics; seminar; presentations; student presentations; oral; communication; stable marriage; dych; emergency; response vehicles; ambulance; game theory; congruences; color theorem; four color; cake cutting; algorithm; RSA; encryption; numberical integration; sorting; post correspondence problem; PCP; ramsey; van der waals; fibonacci; recursion; domino; tiling; towers; hanoi; pigeonhole; principle; matrix; hamming; code; hat game; juggling; zero-knowledge; proof; repeated games; lewis carroll; determinants; infinitude of primes; bridges; konigsberg; koenigsberg; time series analysis; GARCH; rational; recurrence; relations; digital; image; compression; quantum computing | discrete math | discrete math | discrete mathematics | discrete mathematics | discrete | discrete | math | math | mathematics | mathematics | seminar | seminar | presentations | presentations | student presentations | student presentations | oral | oral | communication | communication | stable marriage | stable marriage | dych | dych | emergency | emergency | response vehicles | response vehicles | ambulance | ambulance | game theory | game theory | congruences | congruences | color theorem | color theorem | four color | four color | cake cutting | cake cutting | algorithm | algorithm | RSA | RSA | encryption | encryption | numberical integration | numberical integration | sorting | sorting | post correspondence problem | post correspondence problem | PCP | PCP | ramsey | ramsey | van der waals | van der waals | fibonacci | fibonacci | recursion | recursion | domino | domino | tiling | tiling | towers | towers | hanoi | hanoi | pigeonhole | pigeonhole | principle | principle | matrix | matrix | hamming | hamming | code | code | hat game | hat game | juggling | juggling | zero-knowledge | zero-knowledge | proof | proof | repeated games | repeated games | lewis carroll | lewis carroll | determinants | determinants | infinitude of primes | infinitude of primes | bridges | bridges | konigsberg | konigsberg | koenigsberg | koenigsberg | time series analysis | time series analysis | GARCH | GARCH | rational | rational | recurrence | recurrence | relations | relations | digital | digital | image | image | compression | compression | quantum computing | quantum computing

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

18.304 Undergraduate Seminar in Discrete Mathematics (MIT) 18.304 Undergraduate Seminar in Discrete Mathematics (MIT)

Description

This course is a student-presented seminar in combinatorics, graph theory, and discrete mathematics in general. Instruction and practice in written and oral communication is emphasized, with participants reading and presenting papers from recent mathematics literature and writing a final paper in a related topic. This course is a student-presented seminar in combinatorics, graph theory, and discrete mathematics in general. Instruction and practice in written and oral communication is emphasized, with participants reading and presenting papers from recent mathematics literature and writing a final paper in a related topic.

Subjects

discrete math; discrete mathematics; discrete; math; mathematics; seminar; presentations; student presentations; oral; communication; stable marriage; dych; emergency; response vehicles; ambulance; game theory; congruences; color theorem; four color; cake cutting; algorithm; RSA; encryption; numberical integration; sorting; post correspondence problem; PCP; ramsey; van der waals; fibonacci; recursion; domino; tiling; towers; hanoi; pigeonhole; principle; matrix; hamming; code; hat game; juggling; zero-knowledge; proof; repeated games; lewis carroll; determinants; infinitude of primes; bridges; konigsberg; koenigsberg; time series analysis; GARCH; rational; recurrence; relations; digital; image; compression; quantum computing | discrete math; discrete mathematics; discrete; math; mathematics; seminar; presentations; student presentations; oral; communication; stable marriage; dych; emergency; response vehicles; ambulance; game theory; congruences; color theorem; four color; cake cutting; algorithm; RSA; encryption; numberical integration; sorting; post correspondence problem; PCP; ramsey; van der waals; fibonacci; recursion; domino; tiling; towers; hanoi; pigeonhole; principle; matrix; hamming; code; hat game; juggling; zero-knowledge; proof; repeated games; lewis carroll; determinants; infinitude of primes; bridges; konigsberg; koenigsberg; time series analysis; GARCH; rational; recurrence; relations; digital; image; compression; quantum computing | discrete math | discrete math | discrete mathematics | discrete mathematics | discrete | discrete | math | math | mathematics | mathematics | seminar | seminar | presentations | presentations | student presentations | student presentations | oral | oral | communication | communication | stable marriage | stable marriage | dych | dych | emergency | emergency | response vehicles | response vehicles | ambulance | ambulance | game theory | game theory | congruences | congruences | color theorem | color theorem | four color | four color | cake cutting | cake cutting | algorithm | algorithm | RSA | RSA | encryption | encryption | numberical integration | numberical integration | sorting | sorting | post correspondence problem | post correspondence problem | PCP | PCP | ramsey | ramsey | van der waals | van der waals | fibonacci | fibonacci | recursion | recursion | domino | domino | tiling | tiling | towers | towers | hanoi | hanoi | pigeonhole | pigeonhole | principle | principle | matrix | matrix | hamming | hamming | code | code | hat game | hat game | juggling | juggling | zero-knowledge | zero-knowledge | proof | proof | repeated games | repeated games | lewis carroll | lewis carroll | determinants | determinants | infinitude of primes | infinitude of primes | bridges | bridges | konigsberg | konigsberg | koenigsberg | koenigsberg | time series analysis | time series analysis | GARCH | GARCH | rational | rational | recurrence | recurrence | relations | relations | digital | digital | image | image | compression | compression | quantum computing | quantum computing

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.033 Computer System Engineering (SMA 5501) (MIT) 6.033 Computer System Engineering (SMA 5501) (MIT)

Description

This course covers topics on the engineering of computer software and hardware systems: techniques for controlling complexity; strong modularity using client-server design, virtual memory, and threads; networks; atomicity and coordination of parallel activities; recovery and reliability; privacy, security, and encryption; and impact of computer systems on society. We will also look at case studies of working systems and readings from the current literature provide comparisons and contrasts, and do two design projects. Students engage in extensive written communication exercises. Enrollment may be limited. This course is worth 4 Engineering Design Points.This course was also taught as part of the Singapore-MIT Alliance (SMA) programme as course number SMA 5501 (Computer System Engineering). This course covers topics on the engineering of computer software and hardware systems: techniques for controlling complexity; strong modularity using client-server design, virtual memory, and threads; networks; atomicity and coordination of parallel activities; recovery and reliability; privacy, security, and encryption; and impact of computer systems on society. We will also look at case studies of working systems and readings from the current literature provide comparisons and contrasts, and do two design projects. Students engage in extensive written communication exercises. Enrollment may be limited. This course is worth 4 Engineering Design Points.This course was also taught as part of the Singapore-MIT Alliance (SMA) programme as course number SMA 5501 (Computer System Engineering).

Subjects

computer software | computer software | hardware systems | hardware systems | controlling complexity | controlling complexity | strong modularity | strong modularity | client-server design | client-server design | virtual memory | virtual memory | threads | threads | networks | networks | atomicity | atomicity | coordination | coordination | parallel activities | parallel activities | recovery | recovery | reliability | reliability | privacy | privacy | security | security | encryption | encryption | impact on society | impact on society | computer systems | computer systems | case studies | case studies

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.805J Ethics and Law on the Electronic Frontier (MIT) 6.805J Ethics and Law on the Electronic Frontier (MIT)

Description

This course considers the interaction between law, policy, and technology as they relate to the evolving controversies over control of the Internet. Topics include: intellectual property and copyright control, privacy and government surveillance, and freedom of expression and content control. This course considers the interaction between law, policy, and technology as they relate to the evolving controversies over control of the Internet. Topics include: intellectual property and copyright control, privacy and government surveillance, and freedom of expression and content control.

Subjects

computer | computer | communications | communications | ethics | ethics | policy | policy | technology | technology | individual rights | individual rights | societal needs | societal needs | computer crime | computer crime | intellectual property | intellectual property | software | software | encryption | encryption | privacy | privacy | national security | national security | academic freedom | academic freedom | free speech | free speech | copyright | copyright | copyright control | copyright control | copyright law | copyright law | 6.805 | 6.805

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.912 Introduction to Copyright Law (MIT) 6.912 Introduction to Copyright Law (MIT)

Description

Includes audio/video content: AV lectures. This course is an introduction to copyright law and American law in general. Topics covered include: structure of federal law; basics of legal research; legal citations; how to use LexisNexis®; the 1976 Copyright Act; copyright as applied to music, computers, broadcasting, and education; fair use; Napster®, Grokster®, and Peer-to-Peer file-sharing; Library Access to Music Project; The 1998 Digital Millennium Copyright Act; DVDs and encryption; software licensing; the GNU® General Public License and free software. Includes audio/video content: AV lectures. This course is an introduction to copyright law and American law in general. Topics covered include: structure of federal law; basics of legal research; legal citations; how to use LexisNexis®; the 1976 Copyright Act; copyright as applied to music, computers, broadcasting, and education; fair use; Napster®, Grokster®, and Peer-to-Peer file-sharing; Library Access to Music Project; The 1998 Digital Millennium Copyright Act; DVDs and encryption; software licensing; the GNU® General Public License and free software.

Subjects

opyright law | opyright law | american law structure of federal law | american law structure of federal law | legal research and citations | legal research and citations | Lexis-Nexis | Lexis-Nexis | 1976 Copyright Act | 1976 Copyright Act | copyright as applied to music | copyright as applied to music | computers | computers | broadcasting | broadcasting | and education | and education | fair use | fair use | Napster | Napster | Grokster | Grokster | and P2P file-sharing | and P2P file-sharing | Library Access to Music Project | Library Access to Music Project | The 1998 Digital Millennium Copyright Act | The 1998 Digital Millennium Copyright Act | DVDs and encryption | DVDs and encryption | Software licensing | Software licensing | The GNU General Public License | The GNU General Public License | free software | free software

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allavcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.805 Ethics and the Law on the Electronic Frontier (MIT) 6.805 Ethics and the Law on the Electronic Frontier (MIT)

Description

This course considers the interaction between law, policy, and technology as they relate to the evolving controversies over control of the Internet. In addition, there will be an in-depth treatment of privacy and the notion of "transparency" -- regulations and technologies that govern the use of information, as well as access to information. Topics explored will include: Legal Background for Regulation of the Internet Fourth Amendment Law and Electronic Surveillance Profiling, Data Mining, and the U.S. PATRIOT Act Technologies for Anonymity and Transparency The Policy-Aware Web This course considers the interaction between law, policy, and technology as they relate to the evolving controversies over control of the Internet. In addition, there will be an in-depth treatment of privacy and the notion of "transparency" -- regulations and technologies that govern the use of information, as well as access to information. Topics explored will include: Legal Background for Regulation of the Internet Fourth Amendment Law and Electronic Surveillance Profiling, Data Mining, and the U.S. PATRIOT Act Technologies for Anonymity and Transparency The Policy-Aware Web

Subjects

computer | computer | communications | communications | ethics | ethics | policy | policy | technology | technology | individual rights | individual rights | societal needs | societal needs | computer crime | computer crime | intellectual property | intellectual property | software | software | encryption | encryption | privacy | privacy | national security | national security | academic freedom | academic freedom | free speech | free speech | copyright | copyright | copyright control | copyright control | copyright law | copyright law

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-6.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.875 Cryptography and Cryptanalysis (MIT) 6.875 Cryptography and Cryptanalysis (MIT)

Description

This course features a rigorous introduction to modern cryptography, with an emphasis on the fundamental cryptographic primitives of public-key encryption, digital signatures, pseudo-random number generation, and basic protocols and their computational complexity requirements. This course features a rigorous introduction to modern cryptography, with an emphasis on the fundamental cryptographic primitives of public-key encryption, digital signatures, pseudo-random number generation, and basic protocols and their computational complexity requirements.

Subjects

modern cryptography | modern cryptography | fundamental cryptographic primitives | fundamental cryptographic primitives | public-key encryption | public-key encryption | digital signatures | digital signatures | pseudo-random number generation | pseudo-random number generation | basic protocols | basic protocols | computational complexity | computational complexity | two-party protocols | two-party protocols | zero-knowledge | zero-knowledge

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-6.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.897 Selected Topics in Cryptography (MIT) 6.897 Selected Topics in Cryptography (MIT)

Description

This course covers a number of advanced "selected topics" in the field of cryptography. The first part of the course tackles the foundational question of how to define security of cryptographic protocols in a way that is appropriate for modern computer networks, and how to construct protocols that satisfy these security definitions. For this purpose, the framework of "universally composable security" is studied and used. The second part of the course concentrates on the many challenges involved in building secure electronic voting systems, from both theoretical and practical points of view. In the third part, an introduction to cryptographic constructions based on bilinear pairings is given. This course covers a number of advanced "selected topics" in the field of cryptography. The first part of the course tackles the foundational question of how to define security of cryptographic protocols in a way that is appropriate for modern computer networks, and how to construct protocols that satisfy these security definitions. For this purpose, the framework of "universally composable security" is studied and used. The second part of the course concentrates on the many challenges involved in building secure electronic voting systems, from both theoretical and practical points of view. In the third part, an introduction to cryptographic constructions based on bilinear pairings is given.

Subjects

cryptography | cryptography | cryptanalysis | cryptanalysis | cryptographic protocols | cryptographic protocols | general security definitions | general security definitions | composition theorems | composition theorems | protocols | protocols | commitments | commitments | key exchange | key exchange | general multi-party computation | general multi-party computation | composable notions of security for PK encryption and signatures | composable notions of security for PK encryption and signatures | theory of extractors | theory of extractors | privacy amplification | privacy amplification | special-purpose factoring devices | special-purpose factoring devices | algorithms | algorithms | concrete security arguments | concrete security arguments | differential cryptanalysis | differential cryptanalysis | public-key infrastructures | public-key infrastructures | electronic voting | electronic voting

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-6.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT) 6.857 Network and Computer Security (MIT)

Description

6.857 Network and Computer Security is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the Computer Systems and Architecture Engineering concentration. 6.857 Network and Computer Security is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the Computer Systems and Architecture Engineering concentration.

Subjects

network | network | computer security | computer security | security | security | cryptography | cryptography | secret-key | secret-key | public-key | public-key | digital signature | digital signature | authentication | authentication | Bitcoin | Bitcoin | encryption | encryption | block ciphers | block ciphers | cryptographic hash functions | cryptographic hash functions | one-time pad | one-time pad | stream ciphers | stream ciphers | web browser security | web browser security | biometrics | biometrics | Viruses | Viruses | electronic voting | electronic voting

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-6.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Network security Network security

Description

Encryption of files and firewalls are just some of the security measures that can be used in security. This free course, Network security, which assumes you have a substantial knowledge of computing, helps to explain the intricacies of the continually changing area of network security by studying the main issues involved in achieving a reasonable degree of resilience against attacks. First published on Thu, 17 Mar 2016 as Network security. To find out more visit The Open University's Openlearn website. Creative-Commons 2016 Encryption of files and firewalls are just some of the security measures that can be used in security. This free course, Network security, which assumes you have a substantial knowledge of computing, helps to explain the intricacies of the continually changing area of network security by studying the main issues involved in achieving a reasonable degree of resilience against attacks. First published on Thu, 17 Mar 2016 as Network security. To find out more visit The Open University's Openlearn website. Creative-Commons 2016 First published on Thu, 17 Mar 2016 as Network security. To find out more visit The Open University's Openlearn website. Creative-Commons 2016 First published on Thu, 17 Mar 2016 as Network security. To find out more visit The Open University's Openlearn website. Creative-Commons 2016

Subjects

Systems (Computer) | Systems (Computer) | security | security | computing | computing | network | network | encryption | encryption

License

Except for third party materials and otherwise stated (see http://www.open.ac.uk/conditions terms and conditions), this content is made available under a http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ Creative Commons Attribution-NonCommercial-ShareAlike 2.0 Licence Licensed under a Creative Commons Attribution - NonCommercial-ShareAlike 2.0 Licence - see http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ - Original copyright The Open University

Site sourced from

http://www.open.edu/openlearn/rss/try-content

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

18.304 Undergraduate Seminar in Discrete Mathematics (MIT)

Description

This course is a student-presented seminar in combinatorics, graph theory, and discrete mathematics in general. Instruction and practice in written and oral communication is emphasized, with participants reading and presenting papers from recent mathematics literature and writing a final paper in a related topic.

Subjects

discrete math; discrete mathematics; discrete; math; mathematics; seminar; presentations; student presentations; oral; communication; stable marriage; dych; emergency; response vehicles; ambulance; game theory; congruences; color theorem; four color; cake cutting; algorithm; RSA; encryption; numberical integration; sorting; post correspondence problem; PCP; ramsey; van der waals; fibonacci; recursion; domino; tiling; towers; hanoi; pigeonhole; principle; matrix; hamming; code; hat game; juggling; zero-knowledge; proof; repeated games; lewis carroll; determinants; infinitude of primes; bridges; konigsberg; koenigsberg; time series analysis; GARCH; rational; recurrence; relations; digital; image; compression; quantum computing | discrete math | discrete mathematics | discrete | math | mathematics | seminar | presentations | student presentations | oral | communication | stable marriage | dych | emergency | response vehicles | ambulance | game theory | congruences | color theorem | four color | cake cutting | algorithm | RSA | encryption | numberical integration | sorting | post correspondence problem | PCP | ramsey | van der waals | fibonacci | recursion | domino | tiling | towers | hanoi | pigeonhole | principle | matrix | hamming | code | hat game | juggling | zero-knowledge | proof | repeated games | lewis carroll | determinants | infinitude of primes | bridges | konigsberg | koenigsberg | time series analysis | GARCH | rational | recurrence | relations | digital | image | compression | quantum computing

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.805 Ethics and the Law on the Electronic Frontier (MIT)

Description

This course considers the interaction between law, policy, and technology as they relate to the evolving controversies over control of the Internet. In addition, there will be an in-depth treatment of privacy and the notion of "transparency" -- regulations and technologies that govern the use of information, as well as access to information. Topics explored will include: Legal Background for Regulation of the Internet Fourth Amendment Law and Electronic Surveillance Profiling, Data Mining, and the U.S. PATRIOT Act Technologies for Anonymity and Transparency The Policy-Aware Web

Subjects

computer | communications | ethics | policy | technology | individual rights | societal needs | computer crime | intellectual property | software | encryption | privacy | national security | academic freedom | free speech | copyright | copyright control | copyright law

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allsimplifiedchinesecourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Network security

Description

Encryption of files and firewalls are just some of the security measures that can be used in security. This unit, which assumes you have a substantial knowledge of computing, helps to explain the intricacies of the continually changing area of network security by studying the main issues involved in achieving a reasonable degree of resilience against attacks.

Subjects

it and computing | computing | encryption | firewalls | gateways | network | network_security | security | Education | X000

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Web Development

Description

This course explores the basic fundamentals of the Internet and Web protocols, the different architectures that Web-related applications use, and the programming languages that enable the development of Web applications. The student will also cover matters of security and reliability in the development of web applications via the use of transport encryption and authentication. This free course may be completed online at any time. See course site for detailed overview and learning outcomes. (Computer Science 305)

Subjects

computer science | internet | web development | programming | html | java | web security | encryption | client server architecture | software | ajax | Computer science | I100

License

Attribution 2.0 UK: England & Wales Attribution 2.0 UK: England & Wales http://creativecommons.org/licenses/by/2.0/uk/ http://creativecommons.org/licenses/by/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Information Security

Description

This course focuses on the fundamentals of information security that are used in protecting both the information present in computer storage as well as information traveling over computer networks. This free course may be completed online at any time. See course site for detailed overview and learning outcomes. (Computer Science 406)

Subjects

computer science | information security | computer security | cryptography | encryption | firewalls | software | public-key | intrusion | detection | prevention | Computer science | I100

License

Attribution 2.0 UK: England & Wales Attribution 2.0 UK: England & Wales http://creativecommons.org/licenses/by/2.0/uk/ http://creativecommons.org/licenses/by/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Cryptography

Description

This course introduces cryptography by addressing topics such as ciphers that were used before World War II, block cipher algorithms, the advanced encryption standard for a symmetric-key encryption adopted by the U.S. government, MD5 and SHA-1 hash functions, and the message authentication code. The course will focus on public key cryptography (as exemplified by the RSA algorithm), elliptic curves, the Diffie-Hellman key exchange, and the elliptic curve discrete logarithm problem. The course concludes with key exchange methods, study signature schemes, and discussion of public key infrastructure. Note: It is strongly recommended that the student complete an abstract algebra course (such as the Saylor Foundation’s MA231) before taking this course. This free course may be completed onli

Subjects

computer science | cryptanalysis | ciphers | code | encryption | hash functions | rsa | public key cryptography | elliptic curve | authentication | key exchange | Computer science | I100

License

Attribution 2.0 UK: England & Wales Attribution 2.0 UK: England & Wales http://creativecommons.org/licenses/by/2.0/uk/ http://creativecommons.org/licenses/by/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Cryptography

Description

This course introduces cryptography by addressing topics such as ciphers that were used before World War II, block cipher algorithms, the advanced encryption standard for a symmetric-key encryption adopted by the U.S. government, MD5 and SHA-1 hash functions, and the message authentication code. The course will focus on public key cryptography (as exemplified by the RSA algorithm), elliptic curves, the Diffie-Hellman key exchange, and the elliptic curve discrete logarithm problem. The course concludes with key exchange methods, study signature schemes, and discussion of public key infrastructure. Note: It is strongly recommended that the student complete an abstract algebra course (such as the Saylor Foundation’s MA231) before taking this course. This free course may be completed onli

Subjects

computer science | cryptanalysis | ciphers | code | encryption | hash functions | rsa | public key cryptography | elliptic curve | authentication | key exchange | Computer science | I100

License

Attribution 2.0 UK: England & Wales Attribution 2.0 UK: England & Wales http://creativecommons.org/licenses/by/2.0/uk/ http://creativecommons.org/licenses/by/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Research Data MANTRA online course

Description

The accompanying data handling tutorials are provided as zip files containing pdfs and data files. The user must have access to the relevant software to use them, and should have a basic knowledge of the software package.

Subjects

research data management | training | data management plans | documentation | metadata | file formats | file transformation | data organisation | data storage | data security | university of edinburgh | mantra | RDMTrain | research data | RDM | big data | eScience | organising data | versioning | file naming | data normalization | data transformation | secondary analysis | data citation | reproducible research | replication | password safety | encryption | Data Protection Act | anonymisation | FOI | confidentiality | informed consent | open data | open licenses | linked open data | IPR | data sharing | digital preservation | data repositories | R | SPSS | ArcGIS | NVivo | Jisc | EDINA | YouTube | doctoral training | postgraduate training

License

Attribution 4.0 International Attribution 4.0 International http://creativecommons.org/licenses/by/4.0/ http://creativecommons.org/licenses/by/4.0/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Research Data Management Training Module 3: Safeguarding Data

Description

Discussing the benefits and risks of storage media, back up systems, sharing data across the internet, and general security, this training module encourages secure storage and sharing of data whilst in the working stage of a research project. Slides and training notes are included in this pack in one collection, but can be divided into four sections; storage solutions, keep it safe - back up, sharing, and security.

Subjects

rdm | research data management | research data management training | jiscmrd | research training | storing data | backing up data | data sharing | security | encryption | best practice | RDMTrain | RDM Toolkit Project

License

Attribution-NonCommercial 3.0 Unported Attribution-NonCommercial 3.0 Unported http://creativecommons.org/licenses/by-nc/3.0/ http://creativecommons.org/licenses/by-nc/3.0/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Network security

Description

Encryption of files and firewalls are just some of the security measures that can be used in security. This free course which assumes you have a substantial knowledge of computing

Subjects

Systems (Computer) | security | computing | networks | encryption

License

Except for third party materials and otherwise stated in the acknowledgement section (see our terms and conditions http://www.open.ac.uk/conditions) this content is made available under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence. - http://creativecommons.org/licenses/by-nc-sa/4.0 Except for third party materials and otherwise stated in the acknowledgement section (see our terms and conditions http://www.open.ac.uk/conditions) this content is made available under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence. - http://creativecommons.org/licenses/by-nc-sa/4.0

Site sourced from

http://www.open.edu/openlearn/feeds/oai?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.033 Computer System Engineering (SMA 5501) (MIT)

Description

This course covers topics on the engineering of computer software and hardware systems: techniques for controlling complexity; strong modularity using client-server design, virtual memory, and threads; networks; atomicity and coordination of parallel activities; recovery and reliability; privacy, security, and encryption; and impact of computer systems on society. We will also look at case studies of working systems and readings from the current literature provide comparisons and contrasts, and do two design projects. Students engage in extensive written communication exercises. Enrollment may be limited. This course is worth 4 Engineering Design Points.This course was also taught as part of the Singapore-MIT Alliance (SMA) programme as course number SMA 5501 (Computer System Engineering).

Subjects

computer software | hardware systems | controlling complexity | strong modularity | client-server design | virtual memory | threads | networks | atomicity | coordination | parallel activities | recovery | reliability | privacy | security | encryption | impact on society | computer systems | case studies

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.805J Ethics and Law on the Electronic Frontier (MIT)

Description

This course considers the interaction between law, policy, and technology as they relate to the evolving controversies over control of the Internet. Topics include: intellectual property and copyright control, privacy and government surveillance, and freedom of expression and content control.

Subjects

computer | communications | ethics | policy | technology | individual rights | societal needs | computer crime | intellectual property | software | encryption | privacy | national security | academic freedom | free speech | copyright | copyright control | copyright law | 6.805

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 Network and Computer Security is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the Computer Systems and Architecture Engineering concentration.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | Bitcoin | encryption | block ciphers | cryptographic hash functions | one-time pad | stream ciphers | web browser security | biometrics | Viruses | electronic voting

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.912 Introduction to Copyright Law (MIT)

Description

This course is an introduction to copyright law and American law in general. Topics covered include: structure of federal law; basics of legal research; legal citations; how to use LexisNexis®; the 1976 Copyright Act; copyright as applied to music, computers, broadcasting, and education; fair use; Napster®, Grokster®, and Peer-to-Peer file-sharing; Library Access to Music Project; The 1998 Digital Millennium Copyright Act; DVDs and encryption; software licensing; the GNU® General Public License and free software.

Subjects

copyright law | american law structure of federal law | legal research and citations | Lexis-Nexis | 1976 Copyright Act | copyright as applied to music | computers | broadcasting | and education | fair use | Napster | Grokster | and P2P file-sharing | Library Access to Music Project | The 1998 Digital Millennium Copyright Act | DVDs and encryption | Software licensing | The GNU General Public License | free software

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.805 Ethics and the Law on the Electronic Frontier (MIT)

Description

This course considers the interaction between law, policy, and technology as they relate to the evolving controversies over control of the Internet. In addition, there will be an in-depth treatment of privacy and the notion of "transparency" -- regulations and technologies that govern the use of information, as well as access to information. Topics explored will include: Legal Background for Regulation of the Internet Fourth Amendment Law and Electronic Surveillance Profiling, Data Mining, and the U.S. PATRIOT Act Technologies for Anonymity and Transparency The Policy-Aware Web

Subjects

computer | communications | ethics | policy | technology | individual rights | societal needs | computer crime | intellectual property | software | encryption | privacy | national security | academic freedom | free speech | copyright | copyright control | copyright law

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata