Searching for firewall : 11 results found | RSS Feed for this search

15.564 Information Technology I (MIT) 15.564 Information Technology I (MIT)

Description

Information Technology I helps students understand technical concepts underlying current and future developments in information technology. There will be a special emphasis on networks and distributed computing. Students will also gain some hands-on exposure to powerful, high-level tools for making computers do amazing things, without the need for conventional programming languages. Since 15.564 is an introductory course, no knowledge of how computers work or are programmed is assumed. Information Technology I helps students understand technical concepts underlying current and future developments in information technology. There will be a special emphasis on networks and distributed computing. Students will also gain some hands-on exposure to powerful, high-level tools for making computers do amazing things, without the need for conventional programming languages. Since 15.564 is an introductory course, no knowledge of how computers work or are programmed is assumed.

Subjects

developing-country governments; international | developing-country governments; international | computers; future developments; networks;distributed computing; programming languages;firewall;e-business;computerarchitecture;operating systems;software development;database;user interface;telecommunication;data transmission;localarea network;wireless network;internet;world wide web;digital security | computers; future developments; networks;distributed computing; programming languages;firewall;e-business;computerarchitecture;operating systems;software development;database;user interface;telecommunication;data transmission;localarea network;wireless network;internet;world wide web;digital security | computers;future developments;networks;distributed computing;programming languages;firewall;e-business;computerarchitecture;operating systems;software development;database;user interface;telecommunication;data transmission;localarea network;wireless network;internet;world wide web;digital security | computers;future developments;networks;distributed computing;programming languages;firewall;e-business;computerarchitecture;operating systems;software development;database;user interface;telecommunication;data transmission;localarea network;wireless network;internet;world wide web;digital security | computers | computers | future developments | future developments | networks | networks | distributed computing | distributed computing | programming languages | programming languages | firewall | firewall | e-business | e-business | computer architecture | computer architecture | operating | operating | software development | software development | database | database | user interface | user interface | telecommunication | telecommunication | data transmission | data transmission | local area network | local area network | wireless network | wireless network | internet | internet | world wide web | world wide web | digital security | digital security | architecture | architecture | data | data | transmission | transmission | wireless | wireless | interface | interface | user | user | software | software | development | development | programming | programming | languages | languages | distributed | distributed | computing | computing | LAN | LAN | local | local | area | area | future | future | digital | digital | security | security | technology | technology | information | information | management | management | systems | systems | relational | relational | graphical | graphical | interfaces | interfaces | client/server | client/server | enterprise | enterprise | applications | applications | cryptography | cryptography | services | services | Microsoft | Microsoft | Access | Access | Lotus Notes | Lotus Notes | processing | processing | memory | memory | I/O | I/O | CPU | CPU | OS | OS | hardware | hardware | compression | compression | SQL | SQL | queries | queries | design | design | WAN | WAN | wide | wide | Ethernet | Ethernet | packet-switched | packet-switched | peer-to-peer | peer-to-peer | WWW | WWW | public | public | key | key | mining | mining | warehousing | warehousing | concepts | concepts | conceptual | conceptual | modern computing | modern computing | information management | information management | operating systems | operating systems | relational database systems | relational database systems | graphical user interfaces | graphical user interfaces | client/server systems | client/server systems | enterprise applications | enterprise applications | web.internet services | web.internet services | Microsoft Access | Microsoft Access | database management systems | database management systems | information technology | information technology | telecommunications | telecommunications | eBusiness applications | eBusiness applications | client | client | servers | servers | wireless area network | wireless area network

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT) 6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment. 6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | network | computer security | computer security | security | security | cryptography | cryptography | secret-key | secret-key | public-key | public-key | digital signature | digital signature | authentication | authentication | identification | identification | intrusion detection | intrusion detection | virus | virus | operating system | operating system | software | software | protection | protection | electronic mail | electronic mail | email | email | electronic commerce | electronic commerce | electronic cash | electronic cash | firewall | firewall | computer | computer | digital | digital | signature | signature | electronic | electronic | cash | cash | commerce | commerce | mail | mail | operating | operating | system | system | intrustion | intrustion | detection | detection | distributed | distributed | physical | physical | discretionary | discretionary | mandatory | mandatory | access | access | control | control | biometrics | biometrics | information | information | flow | flow | models | models | covert | covert | channels | channels | integrity | integrity | logic | logic | voting | voting | risk | risk | assessment | assessment | secure | secure | web | web | browsers | browsers | architecture | architecture | engineering | engineering | certificates | certificates | multi-user computer systems | multi-user computer systems | distributed computer systems | distributed computer systems | physical security | physical security | discretionary access control | discretionary access control | mandatory access control | mandatory access control | information-flow models | information-flow models | covert channels | covert channels | integrity models | integrity models | elementary cryptography | elementary cryptography | authentication logic;electronic cash | authentication logic;electronic cash | viruses | viruses | firewalls | firewalls | electronic voting | electronic voting | risk assessment | risk assessment | secure web browsers | secure web browsers | network security | network security | architecture engineering | architecture engineering | digital signatures | digital signatures | authentication schemes | authentication schemes | identification schemes | identification schemes | formal models | formal models | secure operating systems | secure operating systems | software protection | software protection | electronic mail security | electronic mail security | World Wide Web | World Wide Web | ecommerce | ecommerce | email security | email security | www | www | payment protocols | payment protocols | authentication logic | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

15.564 Information Technology I (MIT)

Description

Information Technology I helps students understand technical concepts underlying current and future developments in information technology. There will be a special emphasis on networks and distributed computing. Students will also gain some hands-on exposure to powerful, high-level tools for making computers do amazing things, without the need for conventional programming languages. Since 15.564 is an introductory course, no knowledge of how computers work or are programmed is assumed.

Subjects

developing-country governments; international | computers; future developments; networks;distributed computing; programming languages;firewall;e-business;computerarchitecture;operating systems;software development;database;user interface;telecommunication;data transmission;localarea network;wireless network;internet;world wide web;digital security | computers;future developments;networks;distributed computing;programming languages;firewall;e-business;computerarchitecture;operating systems;software development;database;user interface;telecommunication;data transmission;localarea network;wireless network;internet;world wide web;digital security | computers | future developments | networks | distributed computing | programming languages | firewall | e-business | computer architecture | operating | software development | database | user interface | telecommunication | data transmission | local area network | wireless network | internet | world wide web | digital security | architecture | data | transmission | wireless | interface | user | software | development | programming | languages | distributed | computing | LAN | local | area | future | digital | security | technology | information | management | systems | relational | graphical | interfaces | client/server | enterprise | applications | cryptography | services | Microsoft | Access | Lotus Notes | processing | memory | I/O | CPU | OS | hardware | compression | SQL | queries | design | WAN | wide | Ethernet | packet-switched | peer-to-peer | WWW | public | key | mining | warehousing | concepts | conceptual | modern computing | information management | operating systems | relational database systems | graphical user interfaces | client/server systems | enterprise applications | web.internet services | Microsoft Access | database management systems | information technology | telecommunications | eBusiness applications | client | servers | wireless area network

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allpersiancourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

15.564 Information Technology I (MIT)

Description

Information Technology I helps students understand technical concepts underlying current and future developments in information technology. There will be a special emphasis on networks and distributed computing. Students will also gain some hands-on exposure to powerful, high-level tools for making computers do amazing things, without the need for conventional programming languages. Since 15.564 is an introductory course, no knowledge of how computers work or are programmed is assumed.

Subjects

developing-country governments; international | computers; future developments; networks;distributed computing; programming languages;firewall;e-business;computerarchitecture;operating systems;software development;database;user interface;telecommunication;data transmission;localarea network;wireless network;internet;world wide web;digital security | computers;future developments;networks;distributed computing;programming languages;firewall;e-business;computerarchitecture;operating systems;software development;database;user interface;telecommunication;data transmission;localarea network;wireless network;internet;world wide web;digital security | computers | future developments | networks | distributed computing | programming languages | firewall | e-business | computer architecture | operating | software development | database | user interface | telecommunication | data transmission | local area network | wireless network | internet | world wide web | digital security | architecture | data | transmission | wireless | interface | user | software | development | programming | languages | distributed | computing | LAN | local | area | future | digital | security | technology | information | management | systems | relational | graphical | interfaces | client/server | enterprise | applications | cryptography | services | Microsoft | Access | Lotus Notes | processing | memory | I/O | CPU | OS | hardware | compression | SQL | queries | design | WAN | wide | Ethernet | packet-switched | peer-to-peer | WWW | public | key | mining | warehousing | concepts | conceptual | modern computing | information management | operating systems | relational database systems | graphical user interfaces | client/server systems | enterprise applications | web.internet services | Microsoft Access | database management systems | information technology | telecommunications | eBusiness applications | client | servers | wireless area network

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allsimplifiedchinesecourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

15.564 Information Technology I (MIT)

Description

Information Technology I helps students understand technical concepts underlying current and future developments in information technology. There will be a special emphasis on networks and distributed computing. Students will also gain some hands-on exposure to powerful, high-level tools for making computers do amazing things, without the need for conventional programming languages. Since 15.564 is an introductory course, no knowledge of how computers work or are programmed is assumed.

Subjects

developing-country governments; international | computers; future developments; networks;distributed computing; programming languages;firewall;e-business;computerarchitecture;operating systems;software development;database;user interface;telecommunication;data transmission;localarea network;wireless network;internet;world wide web;digital security | computers;future developments;networks;distributed computing;programming languages;firewall;e-business;computerarchitecture;operating systems;software development;database;user interface;telecommunication;data transmission;localarea network;wireless network;internet;world wide web;digital security | computers | future developments | networks | distributed computing | programming languages | firewall | e-business | computer architecture | operating | software development | database | user interface | telecommunication | data transmission | local area network | wireless network | internet | world wide web | digital security | architecture | data | transmission | wireless | interface | user | software | development | programming | languages | distributed | computing | LAN | local | area | future | digital | security | technology | information | management | systems | relational | graphical | interfaces | client/server | enterprise | applications | cryptography | services | Microsoft | Access | Lotus Notes | processing | memory | I/O | CPU | OS | hardware | compression | SQL | queries | design | WAN | wide | Ethernet | packet-switched | peer-to-peer | WWW | public | key | mining | warehousing | concepts | conceptual | modern computing | information management | operating systems | relational database systems | graphical user interfaces | client/server systems | enterprise applications | web.internet services | Microsoft Access | database management systems | information technology | telecommunications | eBusiness applications | client | servers | wireless area network

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allpersiancourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Network security

Description

Encryption of files and firewalls are just some of the security measures that can be used in security. This unit, which assumes you have a substantial knowledge of computing, helps to explain the intricacies of the continually changing area of network security by studying the main issues involved in achieving a reasonable degree of resilience against attacks.

Subjects

it and computing | computing | encryption | firewalls | gateways | network | network_security | security | Education | X000

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Information Security

Description

This course focuses on the fundamentals of information security that are used in protecting both the information present in computer storage as well as information traveling over computer networks. This free course may be completed online at any time. See course site for detailed overview and learning outcomes. (Computer Science 406)

Subjects

computer science | information security | computer security | cryptography | encryption | firewalls | software | public-key | intrusion | detection | prevention | Computer science | I100

License

Attribution 2.0 UK: England & Wales Attribution 2.0 UK: England & Wales http://creativecommons.org/licenses/by/2.0/uk/ http://creativecommons.org/licenses/by/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

DF9V 34 Internetworking Concepts 2

Description

This unit is designed to introduce candidates to the issues involved in using, configuring and describing the key components of internetworking technologies in a business context. It is intended for candidates undertaking an HNC or HND in computing, computer networking or a related area who require a broad knowledge of internetworking technologies.

Subjects

DF9V 34 | DF9V34 | Internet infrastructure | Internet security | Internet business concepts | site monitoring | firewalls | hardware and software connection devices | networking topologies | C: Information Technology and Information | SCQF Level 7

License

http://content.resourceshare.ac.uk/xmlui/bitstream/handle/10949/17761/LicenceSQAMaterialsCOLEG.pdf?sequence=1 http://content.resourceshare.ac.uk/xmlui/bitstream/handle/10949/17761/LicenceSQAMaterialsCOLEG.pdf?sequence=1 Scottish Qualifications Authority Scottish Qualifications Authority

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata