Searching for discretionary : 7 results found | RSS Feed for this search
6.857 Network and Computer Security (MIT) 6.857 Network and Computer Security (MIT)
Description
6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment. 6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.Subjects
network | network | computer security | computer security | security | security | cryptography | cryptography | secret-key | secret-key | public-key | public-key | digital signature | digital signature | authentication | authentication | identification | identification | intrusion detection | intrusion detection | virus | virus | operating system | operating system | software | software | protection | protection | electronic mail | electronic mail | email | email | electronic commerce | electronic commerce | electronic cash | electronic cash | firewall | firewall | computer | computer | digital | digital | signature | signature | electronic | electronic | cash | cash | commerce | commerce | mail | mail | operating | operating | system | system | intrustion | intrustion | detection | detection | distributed | distributed | physical | physical | discretionary | discretionary | mandatory | mandatory | access | access | control | control | biometrics | biometrics | information | information | flow | flow | models | models | covert | covert | channels | channels | integrity | integrity | logic | logic | voting | voting | risk | risk | assessment | assessment | secure | secure | web | web | browsers | browsers | architecture | architecture | engineering | engineering | certificates | certificates | multi-user computer systems | multi-user computer systems | distributed computer systems | distributed computer systems | physical security | physical security | discretionary access control | discretionary access control | mandatory access control | mandatory access control | information-flow models | information-flow models | covert channels | covert channels | integrity models | integrity models | elementary cryptography | elementary cryptography | authentication logic;electronic cash | authentication logic;electronic cash | viruses | viruses | firewalls | firewalls | electronic voting | electronic voting | risk assessment | risk assessment | secure web browsers | secure web browsers | network security | network security | architecture engineering | architecture engineering | digital signatures | digital signatures | authentication schemes | authentication schemes | identification schemes | identification schemes | formal models | formal models | secure operating systems | secure operating systems | software protection | software protection | electronic mail security | electronic mail security | World Wide Web | World Wide Web | ecommerce | ecommerce | email security | email security | www | www | payment protocols | payment protocols | authentication logic | authentication logicLicense
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htmSite sourced from
http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadata6.857 Network and Computer Security (MIT)
Description
6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.Subjects
network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logicLicense
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htmSite sourced from
http://ocw.mit.edu/rss/all/mit-allcourses.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadata6.857 Network and Computer Security (MIT)
Description
6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.Subjects
network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logicLicense
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htmSite sourced from
http://ocw.mit.edu/rss/all/mit-allpersiancourses.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadata6.857 Network and Computer Security (MIT)
Description
6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.Subjects
network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logicLicense
Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htmSite sourced from
https://ocw.mit.edu/rss/all/mit-allarchivedcourses.xmlAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadataEmployment relations and employee engagement
Description
This free course, Employment relations and employee engagement, looks at raising levels of employee engagement, which is the latest in a long line of managerial strategies aimed at releasing employee ?discretionary effort? and aligning employee interests more closely with managerial goals, on the assumption that this will in turn boost organisational performance. Employees who are more engaged with their work are thus viewed to be more likely to behave in positive and cooperative ways, to the benefit of both the firm and themselves. First published on Mon, 22 Aug 2016 as Employment relations and employee engagement. To find out more visit The Open University's Openlearn website. Creative-Commons 2016Subjects
Money & Business | Human Resources | B866_1 | human resource management | employee engagement | people | employee | employer | Skills for work: CommunicationLicense
Licensed under a Creative Commons Attribution - NonCommercial-ShareAlike 2.0 Licence - see http://creativecommons.org/licenses/by-nc-sa/2.0/uk/Site sourced from
http://www.open.edu/openlearn/rss/try-contentAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadataEmployment relations and employee engagement
Description
This free course looks at raising levels of employee engagement which is the latest in a long line of managerial strategies aimed at releasing employee ‘discretionary effort’ and aligning employee interests more closely with managerial goals on the assumption that this will in turn boost organisational performance. Employees who are more engaged with their work are thus viewed to be more likely to behave in positive and cooperative waysSubjects
Management | Human Resources | B866_1 | human resource management | employee engagement | people | employee | employer | skills for work: communicationLicense
Except for third party materials and otherwise stated in the acknowledgement section (see our terms and conditions http://www.open.ac.uk/conditions) this content is made available under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence. - http://creativecommons.org/licenses/by-nc-sa/4.0 Except for third party materials and otherwise stated in the acknowledgement section (see our terms and conditions http://www.open.ac.uk/conditions) this content is made available under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence. - http://creativecommons.org/licenses/by-nc-sa/4.0Site sourced from
http://www.open.edu/openlearn/feeds/oai?verb=ListRecords&metadataPrefix=oai_dcAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadataEmployment relations and employee engagement
Description
This free course looks at raising levels of employee engagement ?discretionary effort? and aligning employee interests more closely with managerial goals on the assumption that this will in turn boost organisational performance. Employees who are more engaged with their work are thus viewed to be more likely to behave in positive and cooperative waysSubjects
Business | Human Resources | B866_1 | human resource management | employee engagement | people | employee | employer | Skills for work: CommunicationLicense
Except for third party materials and otherwise stated in the acknowledgement section (see our terms and conditions http://www.open.ac.uk/conditions) this content is made available under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence. - http://creativecommons.org/licenses/by-nc-sa/4.0 Except for third party materials and otherwise stated in the acknowledgement section (see our terms and conditions http://www.open.ac.uk/conditions) this content is made available under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence. - http://creativecommons.org/licenses/by-nc-sa/4.0Site sourced from
http://www.open.edu/openlearn/feeds/oai?verb=ListRecords&metadataPrefix=oai_dcAttribution
Click to get HTML | Click to get attribution | Click to get URLAll metadata
See all metadata