Searching for integrity : 36 results found | RSS Feed for this search

1

6.857 Network and Computer Security (MIT) 6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment. 6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | network | computer security | computer security | security | security | cryptography | cryptography | secret-key | secret-key | public-key | public-key | digital signature | digital signature | authentication | authentication | identification | identification | intrusion detection | intrusion detection | virus | virus | operating system | operating system | software | software | protection | protection | electronic mail | electronic mail | email | email | electronic commerce | electronic commerce | electronic cash | electronic cash | firewall | firewall | computer | computer | digital | digital | signature | signature | electronic | electronic | cash | cash | commerce | commerce | mail | mail | operating | operating | system | system | intrustion | intrustion | detection | detection | distributed | distributed | physical | physical | discretionary | discretionary | mandatory | mandatory | access | access | control | control | biometrics | biometrics | information | information | flow | flow | models | models | covert | covert | channels | channels | integrity | integrity | logic | logic | voting | voting | risk | risk | assessment | assessment | secure | secure | web | web | browsers | browsers | architecture | architecture | engineering | engineering | certificates | certificates | multi-user computer systems | multi-user computer systems | distributed computer systems | distributed computer systems | physical security | physical security | discretionary access control | discretionary access control | mandatory access control | mandatory access control | information-flow models | information-flow models | covert channels | covert channels | integrity models | integrity models | elementary cryptography | elementary cryptography | authentication logic;electronic cash | authentication logic;electronic cash | viruses | viruses | firewalls | firewalls | electronic voting | electronic voting | risk assessment | risk assessment | secure web browsers | secure web browsers | network security | network security | architecture engineering | architecture engineering | digital signatures | digital signatures | authentication schemes | authentication schemes | identification schemes | identification schemes | formal models | formal models | secure operating systems | secure operating systems | software protection | software protection | electronic mail security | electronic mail security | World Wide Web | World Wide Web | ecommerce | ecommerce | email security | email security | www | www | payment protocols | payment protocols | authentication logic | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.830 Database Systems (MIT) 6.830 Database Systems (MIT)

Description

This course relies on primary readings from the database community to introduce graduate students to the foundations of database systems, focusing on basics such as the relational algebra and data model, schema normalization, query optimization, and transactions. It is designed for students who have taken MIT course 6.033 (or equivalent); no prior database experience is assumed though students who have taken an undergraduate course in databases are encouraged to attend. Topics related to the engineering and design of database systems, including: data models; database and schema design; schema normalization and integrity constraints; query processing; query optimization and cost estimation; transactions; recovery; concurrency control; isolation and consistency; distributed, parallel, and he This course relies on primary readings from the database community to introduce graduate students to the foundations of database systems, focusing on basics such as the relational algebra and data model, schema normalization, query optimization, and transactions. It is designed for students who have taken MIT course 6.033 (or equivalent); no prior database experience is assumed though students who have taken an undergraduate course in databases are encouraged to attend. Topics related to the engineering and design of database systems, including: data models; database and schema design; schema normalization and integrity constraints; query processing; query optimization and cost estimation; transactions; recovery; concurrency control; isolation and consistency; distributed, parallel, and he

Subjects

engineering and design of database systems | data models | engineering and design of database systems | data models | database and schema design | database and schema design | schema normalization and integrity constraints | schema normalization and integrity constraints | query processing | query processing | query optimization and cost estimation | query optimization and cost estimation | transactions | transactions | recovery | recovery | concurrency control | concurrency control | isolation and consistency | isolation and consistency | distributed | distributed | parallel | parallel | heterogeneous databases | heterogeneous databases | adaptive databases | adaptive databases | trigger systems | trigger systems | pub-sub systems | pub-sub systems | semi structured data and XML querying | semi structured data and XML querying

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.893 Database Systems (MIT) 6.893 Database Systems (MIT)

Description

This course is designed to introduce graduate students to the foundations of database systems, focusing on basics such as the relational algebra and data model, query optimization, query processing, and transactions. This is not a course on database design or SQL programming (though we will discuss these issues briefly). It is designed for students who have taken 6.033 (or equivalent); no prior database experience is assumed though students who have taken an undergraduate course in databases are encouraged to attend. This course is designed to introduce graduate students to the foundations of database systems, focusing on basics such as the relational algebra and data model, query optimization, query processing, and transactions. This is not a course on database design or SQL programming (though we will discuss these issues briefly). It is designed for students who have taken 6.033 (or equivalent); no prior database experience is assumed though students who have taken an undergraduate course in databases are encouraged to attend.

Subjects

database systems | database systems | data models | data models | database design | database design | schema design | schema design | schema normalization | schema normalization | integrity constraints | integrity constraints | query processing | query processing | query optimization | query optimization | cost estimation | cost estimation | transactions | transactions | recovery | recovery | concurrency control | concurrency control | isolation | isolation | consistency | consistency | distributed | parallel | and heterogeneous databases | distributed | parallel | and heterogeneous databases | adaptive databases | adaptive databases | trigger systems | trigger systems | pub-sub systems | pub-sub systems | semi-structured data | semi-structured data | XML querying | XML querying

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

7.344 Tumor Suppressor Gene p53: How the Guardian of our Genome Prevents Cancer (MIT) 7.344 Tumor Suppressor Gene p53: How the Guardian of our Genome Prevents Cancer (MIT)

Description

Cancer is a leading cause of death worldwide. Cancer involves uncontrolled cell growth, resistance to cell death, failure to differentiate into a particular cell type, and increased cellular motility. A family of gate-keeper genes, known as tumor suppressor genes, plays important roles in preventing the initiation and progression of cancer. Among these, p53 is the most famous. Because of its essential role in maintaining genomic integrity, p53 is often called the guardian of the genome. During this course, we will study how p53 serves as a pivotal tumor suppressor gene in preventing cancer.This course is one of many Advanced Undergraduate Seminars offered by the Biology Department at MIT. These seminars are tailored for students with an interest in using primary research literature to disc Cancer is a leading cause of death worldwide. Cancer involves uncontrolled cell growth, resistance to cell death, failure to differentiate into a particular cell type, and increased cellular motility. A family of gate-keeper genes, known as tumor suppressor genes, plays important roles in preventing the initiation and progression of cancer. Among these, p53 is the most famous. Because of its essential role in maintaining genomic integrity, p53 is often called the guardian of the genome. During this course, we will study how p53 serves as a pivotal tumor suppressor gene in preventing cancer.This course is one of many Advanced Undergraduate Seminars offered by the Biology Department at MIT. These seminars are tailored for students with an interest in using primary research literature to disc

Subjects

tumor suppressor gene | tumor suppressor gene | p53 | p53 | p53 protein | p53 protein | cancer | cancer | cell-growth signals | cell-growth signals | cell cycle regulation | cell cycle regulation | DNA damage | DNA damage | DNA repair | DNA repair | programmed cell death | programmed cell death | apoptosis | apoptosis | genome integrity | genome integrity | oncogenes | oncogenes | p53 mutations | p53 mutations | mouse cancer models | mouse cancer models | Mdm2 | Mdm2 | microRNA | microRNA

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-7.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

HST.590 Biomedical Engineering Seminar Series: Topics in Medical Ethics and Responsible Conduct in Research (MIT) HST.590 Biomedical Engineering Seminar Series: Topics in Medical Ethics and Responsible Conduct in Research (MIT)

Description

This seminar based course explores techniques for recognizing, analyzing, and resolving ethical dilemmas facing healthcare professionals and biomedical researchers in today's highly regulated environment. Guest lectures by practicing clinicians, technologists, researchers, and regulators will include case studies, interactive small group discussions, and role-playing simulations. Professional conduct topics will include authorship, conflict of interest, data acquisition and management, and the protection of human subjects and animals involved in research programs. This seminar based course explores techniques for recognizing, analyzing, and resolving ethical dilemmas facing healthcare professionals and biomedical researchers in today's highly regulated environment. Guest lectures by practicing clinicians, technologists, researchers, and regulators will include case studies, interactive small group discussions, and role-playing simulations. Professional conduct topics will include authorship, conflict of interest, data acquisition and management, and the protection of human subjects and animals involved in research programs.

Subjects

ethics | ethics | medical ethics | medical ethics | responsible research | responsible research | responsible conduct | responsible conduct | ethical dilemmas | ethical dilemmas | professional conduct | professional conduct | ethical issues | ethical issues | collaboration | collaboration | risk management | risk management | personal integrity | personal integrity

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-HST.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

PE.550 Designing Your Life (MIT) PE.550 Designing Your Life (MIT)

Description

This course provides an exciting, eye-opening, and thoroughly useful inquiry into what it takes to live an extraordinary life, on your own terms. The instructors address what it takes to succeed, to be proud of your life, and to be happy in it. Participants tackle career satisfaction, money, body, vices, and relationship to themselves. They learn how to confront issues in their lives, how to live life, and how to learn from it. A short version of this course meets during the Independent Activities Period (IAP), which is a special 4-week term at MIT that runs from the first week of January until the end of the month. Then this semester-long extension of the IAP course is taught to interested members of the MIT community. This not-for-credit course is sponsored by the Department of Science, This course provides an exciting, eye-opening, and thoroughly useful inquiry into what it takes to live an extraordinary life, on your own terms. The instructors address what it takes to succeed, to be proud of your life, and to be happy in it. Participants tackle career satisfaction, money, body, vices, and relationship to themselves. They learn how to confront issues in their lives, how to live life, and how to learn from it. A short version of this course meets during the Independent Activities Period (IAP), which is a special 4-week term at MIT that runs from the first week of January until the end of the month. Then this semester-long extension of the IAP course is taught to interested members of the MIT community. This not-for-credit course is sponsored by the Department of Science,

Subjects

design | design | living an extraordinary life | living an extraordinary life | life coaching | life coaching | excuses | excuses | mistakes | mistakes | changes | changes | empowerment | empowerment | love | love | vision | vision | action plan | action plan | wisdom | wisdom | balance | balance | communication | communication | fears | fears | accountability | accountability | truth | truth | setting goals | setting goals | community | community | personal growth | personal growth | leadership roles | leadership roles | career | career | promises | promises | consequences | consequences | haunting incidents | haunting incidents | healing | healing | lies | lies | cleaning up | cleaning up | integrity | integrity

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allpersiancourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Research integrity and publication ethics [2010 lecture]

Description

Dr Sabine Kleinert Senior Executive Editor, The Lancet and Vice-Chair of the Committee on Publication Ethics (COPE), gives the fourth 2010 Research Integrity Seminar. Wales; http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Subjects

medical science | biobanking | research integrity | research | Medicine | ethics | journals | lancet | medical science | biobanking | research integrity | research | Medicine | ethics | journals | lancet | 2010-11-22

License

http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://mediapub.it.ox.ac.uk/feeds/129107/audio.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Good practice in research collections and biobanking

Description

Dr Jane Kaye, Director of HeLEX-Centre for Health, Law and Emerging Technologies, University of Oxford, gives the third 2010 Research Integrity Seminar. Wales; http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Subjects

medical science | biobanking | research integrity | research | Medicine | ethics | medical science | biobanking | research integrity | research | Medicine | ethics | 2010-11-08

License

http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://mediapub.it.ox.ac.uk/feeds/129107/audio.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

An international perspective on promoting the responsible conduct of research

Description

Paul Taylor gives a talk as part of the Research Integrity Seminar Series held at the John Radcliffe hospital. Wales; http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Subjects

Medicine | ethics | integrity | research | Medicine | ethics | integrity | research

License

http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://mediapub.it.ox.ac.uk/feeds/129107/audio.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

An international perspective on promoting the responsible conduct of research (Slides)

Description

Paul Taylor gives a talk as part of the Research Integrity Seminar Series held at the John Radcliffe hospital. Wales; http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Subjects

Medicine | ethics | integrity | research | Medicine | ethics | integrity | research

License

http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://mediapub.it.ox.ac.uk/feeds/129107/audio.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Questionable research practices and how to respond to them

Description

Seminar looking at questionable research practices, particularly within medical research and why we as scientists, we need to pay more attention to questionable research practices. Wales; http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Subjects

ethics | integrity | research | ethics | integrity | research

License

http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://mediapub.it.ox.ac.uk/feeds/129107/audio.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Who Cares About Research Integrity?

Description

Seminar looking at the importance of integrity within medical research. Part of the Research Integrity Seminar Series organised by Research Services, in collaboration with the Oxford Biomedical Research Centre. Wales; http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Subjects

Medicine | ethics | integrity | research | Medicine | ethics | integrity | research

License

http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://mediapub.it.ox.ac.uk/feeds/129107/audio.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Research integrity and publication ethics

Description

Part one of a series of lectures looking at different aspects of research integrity and their application in biomedical research. Wales; http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Subjects

integrity | ethics | biosciences | Medical | research | integrity | ethics | biosciences | Medical | research

License

http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://mediapub.it.ox.ac.uk/feeds/129107/audio.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Research integrity and publication ethics (Slides)

Description

Part one of a series of lectures looking at different aspects of research integrity and their application in biomedical research. Wales; http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Subjects

integrity | ethics | biosciences | Medical | research | integrity | ethics | biosciences | Medical | research

License

http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://mediapub.it.ox.ac.uk/feeds/129107/audio.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Questionable research practices and how to respond to them

Description

Seminar looking at questionable research practices, particularly within medical research and why we as scientists, we need to pay more attention to questionable research practices.

Subjects

ethics | integrity | research | ethics | integrity | research

License

http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://rss.oucs.ox.ac.uk/medsci/researchintegrity-audio/rss20.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Who Cares About Research Integrity?

Description

Seminar looking at the importance of integrity within medical research. Part of the Research Integrity Seminar Series organised by Research Services, in collaboration with the Oxford Biomedical Research Centre.

Subjects

Medicine | ethics | integrity | research | Medicine | ethics | integrity | research

License

http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://rss.oucs.ox.ac.uk/medsci/researchintegrity-audio/rss20.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Research integrity and publication ethics

Description

Part one of a series of lectures looking at different aspects of research integrity and their application in biomedical research.

Subjects

integrity | ethics | biosciences | Medical | research | integrity | ethics | biosciences | Medical | research

License

http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://rss.oucs.ox.ac.uk/medsci/researchintegrity-audio/rss20.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

TALAT Lecture 2105.01: Case Study on Pressure Vessels

Description

This lecture helps to create an understanding of how material properties, costs of materials and of their fabrication, required product life, and product liability interact in different ways depending on the product. Some knowledge of fabricating processes and the significance of such factors as fatigue, fracture toughness and environmental performance on material selection is assumed.

Subjects

aluminium | aluminum | european aluminium association | EAA | Training in Aluminium Application Technologies | training | metallurgy | technology | lecture | design | product | product integrity | in-service failure | production volume | life cycle | pressure cabin | high pressure gas cylinders | beverage cans | corematerials | ukoer

License

http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://core.materials.ac.uk/rss/talat.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

HST.590 Biomedical Engineering Seminar Series: Topics in Medical Ethics and Responsible Conduct in Research (MIT)

Description

This seminar based course explores techniques for recognizing, analyzing, and resolving ethical dilemmas facing healthcare professionals and biomedical researchers in today's highly regulated environment. Guest lectures by practicing clinicians, technologists, researchers, and regulators will include case studies, interactive small group discussions, and role-playing simulations. Professional conduct topics will include authorship, conflict of interest, data acquisition and management, and the protection of human subjects and animals involved in research programs.

Subjects

ethics | medical ethics | responsible research | responsible conduct | ethical dilemmas | professional conduct | ethical issues | collaboration | risk management | personal integrity

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allsimplifiedchinesecourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

TALAT Lecture 2105.01: Case Study on Pressure Vessels

Description

This lecture helps to create an understanding of how material properties, costs of materials and of their fabrication, required product life, and product liability interact in different ways depending on the product. Some knowledge of fabricating processes and the significance of such factors as fatigue, fracture toughness and environmental performance on material selection is assumed.

Subjects

aluminium | aluminum | european aluminium association | eaa | talat | training in aluminium application technologies | training | metallurgy | technology | lecture | design | product | product integrity | in-service failure | production volume | life cycle | pressure cabin | high pressure gas cylinders | beverage cans | corematerials | ukoer | Engineering | H000

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

How to avoid plagiarism learning object

Description

• The content has been provided as a zip file IMS/SCORM package that can be added to your VLE (Virtual Learning Environment). To provide an example of the content included in this file, screenshots of some of the materials have been made available as an online presentation.

Subjects

plagiarism | plagiarise | referencing | references | sources | information | academic integrity | bibliography | citation | cite | quotation | quote | ukoer | ostrichoer | Education | X000

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

DE1N34 IT in Business - Databases (2007)

Description

This unit is designed to develop an understanding of database management software and application of databases to decision making. It would be relevant to positions with a focus on information management. Outcomes: On completion of the unit the student should be able to: 1. Design and create a database structure to aid business decision making and problem solving. 2.Input and store data using a relational database. 3. Use the database to manipulate and present information to aid decision making. Materials use Access 2007

Subjects

Access 2007 | DE1N 34 | relational database design | business decision making | problem solving | entity relationship modelling | referential integrity | standard database notation | C: Information Technology and Information | INFORMATION | SCQF Level 7

License

Copyright in these materials is owned by the Colleges Open Learning Exchange Group (COLEG). None of these materials may be Used without the express, prior, written consent of COLEG, except if and to the extent that such Use is permitted under COLEG's conditions of Contribution and Use of Learning Materials through COLEG’s Repository, for the purposes of which these materials are COLEG Materials. Copyright in these materials is owned by the Colleges Open Learning Exchange Group (COLEG). None of these materials may be Used without the express, prior, written consent of COLEG, except if and to the extent that such Use is permitted under COLEG's conditions of Contribution and Use of Learning Materials through COLEG’s Repository, for the purposes of which these materials are COLEG Materials. Licensed to colleges in Scotland only Licensed to colleges in Scotland only http://content.resourceshare.ac.uk/xmlui/bitstream/handle/10949/17759/LicenceCOLEG.pdf?sequence=1 http://content.resourceshare.ac.uk/xmlui/bitstream/handle/10949/17759/LicenceCOLEG.pdf?sequence=1 COLEG COLEG

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata