Searching for secure : 15 results found | RSS Feed for this search

1

6.876J Advanced Topics in Cryptography (MIT) 6.876J Advanced Topics in Cryptography (MIT)

Description

The topics covered in this course include interactive proofs, zero-knowledge proofs, zero-knowledge proofs of knowledge, non-interactive zero-knowledge proofs, secure protocols, two-party secure computation, multiparty secure computation, and chosen-ciphertext security. The topics covered in this course include interactive proofs, zero-knowledge proofs, zero-knowledge proofs of knowledge, non-interactive zero-knowledge proofs, secure protocols, two-party secure computation, multiparty secure computation, and chosen-ciphertext security.

Subjects

interactive proofs | interactive proofs | zero-knowledge proofs | zero-knowledge proofs | zero-knowledge proofs of knowledge | zero-knowledge proofs of knowledge | non-interactive zero-knowledge proofs | non-interactive zero-knowledge proofs | secure protocols | secure protocols | two-party secure computation | two-party secure computation | multiparty secure computation | multiparty secure computation | chosen-ciphertext security | chosen-ciphertext security | 6.876 | 6.876 | 18.426 | 18.426

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-6.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT) 6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment. 6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | network | computer security | computer security | security | security | cryptography | cryptography | secret-key | secret-key | public-key | public-key | digital signature | digital signature | authentication | authentication | identification | identification | intrusion detection | intrusion detection | virus | virus | operating system | operating system | software | software | protection | protection | electronic mail | electronic mail | email | email | electronic commerce | electronic commerce | electronic cash | electronic cash | firewall | firewall | computer | computer | digital | digital | signature | signature | electronic | electronic | cash | cash | commerce | commerce | mail | mail | operating | operating | system | system | intrustion | intrustion | detection | detection | distributed | distributed | physical | physical | discretionary | discretionary | mandatory | mandatory | access | access | control | control | biometrics | biometrics | information | information | flow | flow | models | models | covert | covert | channels | channels | integrity | integrity | logic | logic | voting | voting | risk | risk | assessment | assessment | secure | secure | web | web | browsers | browsers | architecture | architecture | engineering | engineering | certificates | certificates | multi-user computer systems | multi-user computer systems | distributed computer systems | distributed computer systems | physical security | physical security | discretionary access control | discretionary access control | mandatory access control | mandatory access control | information-flow models | information-flow models | covert channels | covert channels | integrity models | integrity models | elementary cryptography | elementary cryptography | authentication logic;electronic cash | authentication logic;electronic cash | viruses | viruses | firewalls | firewalls | electronic voting | electronic voting | risk assessment | risk assessment | secure web browsers | secure web browsers | network security | network security | architecture engineering | architecture engineering | digital signatures | digital signatures | authentication schemes | authentication schemes | identification schemes | identification schemes | formal models | formal models | secure operating systems | secure operating systems | software protection | software protection | electronic mail security | electronic mail security | World Wide Web | World Wide Web | ecommerce | ecommerce | email security | email security | www | www | payment protocols | payment protocols | authentication logic | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.858 Computer Systems Security (MIT) 6.858 Computer Systems Security (MIT)

Description

Includes audio/video content: AV lectures. 6.858 Computer Systems Security is a class about the design and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and techniques for achieving security, based on recent research papers. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware security, and security in web applications. Includes audio/video content: AV lectures. 6.858 Computer Systems Security is a class about the design and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and techniques for achieving security, based on recent research papers. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware security, and security in web applications.

Subjects

computer system design | computer system design | secure computer systems | secure computer systems | threat model | threat model | computer systems security | computer systems security | operating system | operating system | operating system security | operating system security | capabilities | capabilities | information flow control | information flow control | language security | language security | network protocols | network protocols | hardware security | hardware security | web | web | web application security | web application security | secure web server | secure web server | web application | web application

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allavcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allpersiancourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.876J Advanced Topics in Cryptography (MIT)

Description

The topics covered in this course include interactive proofs, zero-knowledge proofs, zero-knowledge proofs of knowledge, non-interactive zero-knowledge proofs, secure protocols, two-party secure computation, multiparty secure computation, and chosen-ciphertext security.

Subjects

interactive proofs | zero-knowledge proofs | zero-knowledge proofs of knowledge | non-interactive zero-knowledge proofs | secure protocols | two-party secure computation | multiparty secure computation | chosen-ciphertext security | 6.876 | 18.426

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Secure Electronic Commerce Secure Electronic Commerce

Description

In this course we will study the threats and vulnerabilities in electronic commerce. Also, the security measures and mechanisms which are applicable in electronic commerce will be analyzed. In this course we will study the threats and vulnerabilities in electronic commerce. Also, the security measures and mechanisms which are applicable in electronic commerce will be analyzed.

Subjects

ón e Inteligencia Artificial | ón e Inteligencia Artificial | SET | SET | SSL/TLS | SSL/TLS | ía en Informática | ía en Informática | Digital certificates | Digital certificates | PKIs and TTPs | PKIs and TTPs | computer security | computer security | secure electronic commerce | secure electronic commerce | communications security | communications security | 2010 | 2010

License

Copyright 2015, UC3M http://creativecommons.org/licenses/by-nc-sa/4.0/

Site sourced from

http://ocw.uc3m.es/ocwuniversia/rss_all

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

The (Il)legitimacy of bankruptcies for the benefit of secured creditors

Description

Charles W. Mooney Jnr, Charles A. Heimbold, Jr. Professor of Law, University of Pennsylvania Law School - 5 November 2014 Wales; http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Subjects

bankruptcy | secured creditors | bankruptcy | secured creditors | 2014-11-05

License

http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://mediapub.it.ox.ac.uk/feeds/129057/audio.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.858 Computer Systems Security (MIT)

Description

6.858 Computer Systems Security is a class about the design and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and techniques for achieving security, based on recent research papers. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware security, and security in web applications.

Subjects

computer system design | secure computer systems | threat model | computer systems security | operating system | operating system security | capabilities | information flow control | language security | network protocols | hardware security | web | web application security | secure web server | web application

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Insecure internal network

Description

An interaction showing a potentially insecure computer network operation. (Copyright Swansea College 2005)

Subjects

emails | networks | insecure systems | security | data protection | data flow | computers | INFORMATION | Mathematical and Computer Sciences | Learning | Design and delivery of programmes | UK EL05 = SCQF 5 | Intermediate level | Intermediate | NICAT 2 | CQFW 2 | Intermediate | GSCE A-C | NVQ 2 | | UK EL06 = SCQF 6 | Advanced courses | NICAT 3 | CQFW 3 | Advanced | A/AS Level | NVQ 3 | Higher | SVQ 3 | Computer science | I100 | INFORMATION TECHNOLOGY and INFORMATION | C

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Symbol representing a secure website

Description

A website with secure site message.

Subjects

security | website | shopping cart | https | business | secure site | e-commerce | RETAILING | SALES MARKETING and RETAILING | B

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Secure site website

Description

Resource comprises an image of a website with a secure site message.

Subjects

security | websites | shopping carts | https | business | secure sites | e-commerce | RETAILING | Business and Administrative studies | Employability | Students | UK EL04 = SCQF 4 | Foundational Level | NICAT 1 | CQFW 1 | Foundation | GCSE D-G | NVQ 1 | Intermediate 1 | | UK EL05 = SCQF 5 | Intermediate level | Intermediate | NICAT 2 | CQFW 2 | Intermediate | GSCE A-C | NVQ 2 | | administrative studies | N000 | SALES MARKETING and RETAILING | B

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Maintaining a safe and secure environment for children - Overview

Description

Safety, Risk Assessment, Collection of children, Safety Equipment, Outside Play Guidelines, Hazards, Security Measures, The National Standards - Supervision, Helping to protect children from abuse, Types of Abuse, Child Protection Policy, Child Protection - Case Study, Maintain the safety of children on outings.

Subjects

safe and secure | accidents and emergencies | fire and emergency | fire estinguishers | first aid | health and safety | hazard | supervision | types of abuse | child protection | zip | HEALTH CARE / MEDICINE / HEALTH and SAFETY | P

License

Attribution-Noncommercial 2.0 UK: England & Wales Attribution-Noncommercial 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc/2.0/uk/ http://creativecommons.org/licenses/by-nc/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

DG0035 Network Infrastructure 2: Planning and Maintenance

Description

This unit is designed to introduce candidates to the issues involved in planning and maintaining a network infrastructure. It is intended for candidates undertaking an HNC or HND in computing, computer networking or a related area who require a detailed knowledge of planning and maintaining a network infrastructure. On completion of this unit, you should be able to: • Plan and implement server roles, and server security. • Plan, implement and maintain a network infrastructure. • Plan, implement and maintain routing and remote access. • Plan, implement and maintain server availability. • Plan and maintain network security.

Subjects

DG00 35 | secure baseline installation | TCP/IP | network traffic monitoring | routing strategy | system bottlenecks | NLB | PKI | SCQF Level 8

License

Licensed to colleges in Scotland only Licensed to colleges in Scotland only Except where expressly indicated otherwise on the face of these materials (i) copyright in these materials is owned by the Scottish Qualification Authority (SQA), and (ii) none of these materials may be Used without the express, prior, written consent of the Colleges Open Learning Exchange Group (COLEG) and SQA, except if and to the extent that such Use is permitted under COLEG's conditions of Contribution and Use of Learning Materials through COLEG’s Repository, for the purposes of which these materials are COLEG Materials. Except where expressly indicated otherwise on the face of these materials (i) copyright in these materials is owned by the Scottish Qualification Authority (SQA), and (ii) none of these materials may be Used without the express, prior, written consent of the Colleges Open Learning Exchange Group (COLEG) and SQA, except if and to the extent that such Use is permitted under COLEG's conditions of Contribution and Use of Learning Materials through COLEG’s Repository, for the purposes of which these materials are COLEG Materials. http://content.resourceshare.ac.uk/xmlui/bitstream/handle/10949/17761/LicenceSQAMaterialsCOLEG.pdf?sequence=1 http://content.resourceshare.ac.uk/xmlui/bitstream/handle/10949/17761/LicenceSQAMaterialsCOLEG.pdf?sequence=1 SQA

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata