Searching for browsers : 9 results found | RSS Feed for this search

6.857 Network and Computer Security (MIT) 6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment. 6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | network | computer security | computer security | security | security | cryptography | cryptography | secret-key | secret-key | public-key | public-key | digital signature | digital signature | authentication | authentication | identification | identification | intrusion detection | intrusion detection | virus | virus | operating system | operating system | software | software | protection | protection | electronic mail | electronic mail | email | email | electronic commerce | electronic commerce | electronic cash | electronic cash | firewall | firewall | computer | computer | digital | digital | signature | signature | electronic | electronic | cash | cash | commerce | commerce | mail | mail | operating | operating | system | system | intrustion | intrustion | detection | detection | distributed | distributed | physical | physical | discretionary | discretionary | mandatory | mandatory | access | access | control | control | biometrics | biometrics | information | information | flow | flow | models | models | covert | covert | channels | channels | integrity | integrity | logic | logic | voting | voting | risk | risk | assessment | assessment | secure | secure | web | web | browsers | browsers | architecture | architecture | engineering | engineering | certificates | certificates | multi-user computer systems | multi-user computer systems | distributed computer systems | distributed computer systems | physical security | physical security | discretionary access control | discretionary access control | mandatory access control | mandatory access control | information-flow models | information-flow models | covert channels | covert channels | integrity models | integrity models | elementary cryptography | elementary cryptography | authentication logic;electronic cash | authentication logic;electronic cash | viruses | viruses | firewalls | firewalls | electronic voting | electronic voting | risk assessment | risk assessment | secure web browsers | secure web browsers | network security | network security | architecture engineering | architecture engineering | digital signatures | digital signatures | authentication schemes | authentication schemes | identification schemes | identification schemes | formal models | formal models | secure operating systems | secure operating systems | software protection | software protection | electronic mail security | electronic mail security | World Wide Web | World Wide Web | ecommerce | ecommerce | email security | email security | www | www | payment protocols | payment protocols | authentication logic | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allpersiancourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Internet cookie

Description

An animation depicting how cookies expire after a certain period of time.

Subjects

e-commerce | business | web browsers | cookies | internet | RETAILING | INFORMATION | Mathematical and Computer Sciences | Employability | Design and delivery of programmes | UK EL03 = SCQF 3 | Level 3 | Entry level 2 | NICAT Entry | Access 3 | Foundation SG | UK EL04 = SCQF 4 | Foundational Level | NICAT 1 | CQFW 1 | Foundation | GCSE D-G | NVQ 1 | Intermediate 1 | | UK EL05 = SCQF 5 | Intermediate level | Intermediate | NICAT 2 | CQFW 2 | Intermediate | GSCE A-C | NVQ 2 | | Computer science | I100 | INFORMATION TECHNOLOGY and INFORMATION | SALES MARKETING and RETAILING | C | B

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Searching a commercial website for photographic material

Description

This resource is an illustration showing a search box on a business website. It shows how a search can be restricted to the website in question or extended to the entire World Wide Web. (Copyright Swansea College 2005)

Subjects

searching | search facilities | business | web browsers | search terms | websites | search boxes | search text fields | world wide web | internet | RETAILING | Business and Administrative studies | BUSINESS / MANAGEMENT / OFFICE STUDIES | INFORMATION | Mathematical and Computer Sciences | Learning | Teaching | Employability | Design and delivery of programmes | UK EL05 = SCQF 5 | Intermediate level | Intermediate | NICAT 2 | CQFW 2 | Intermediate | GSCE A-C | NVQ 2 | | UK EL06 = SCQF 6 | Advanced courses | NICAT 3 | CQFW 3 | Advanced | A/AS Level | NVQ 3 | Higher | SVQ 3 | UK EL07 = SCQF 7 | Higher Certificate | NICAT 4 | CQFW 4 | NVQ 4 | Advanced Higher | SVQ 4 | HN Certificate | UK EL08 = SCQF 8 | Higher Diploma | NICAT 5 | CQFW 5 | HN Diploma | Diploma in HE | administrative studies | Computer science | N000 | I100 | EDUCATION / TRAINING / TEACHING | INFORMATION TECHNOLOGY and INFORMATION | SALES MARKETING and RETAILING | A | G | C | B

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

How a cookie works

Description

This resource is an animation illustrating how a cookie works in the context of Web browsing. Cookies are text files sent by servers to Web browsers, which are sent back unchanged by the browser each time it accesses that server. Cookies are used for authenticating, tracking and maintaining specific information about users. In this animation, users are invited to type in their name, which becomes the piece of information sent from the server to the Web browser.

Subjects

e-commerce | business | cookies | internet | web browsers | world wide web | RETAILING | Mathematical and Computer Sciences | INFORMATION | Employability | Learning | Design and delivery of programmes | UK EL05 = SCQF 5 | Intermediate level | Intermediate | NICAT 2 | CQFW 2 | Intermediate | GSCE A-C | NVQ 2 | | UK EL06 = SCQF 6 | Advanced courses | NICAT 3 | CQFW 3 | Advanced | A/AS Level | NVQ 3 | Higher | SVQ 3 | UK EL07 = SCQF 7 | Higher Certificate | NICAT 4 | CQFW 4 | NVQ 4 | Advanced Higher | SVQ 4 | HN Certificate | UK EL08 = SCQF 8 | Higher Diploma | NICAT 5 | CQFW 5 | HN Diploma | Diploma in HE | Computer science | I100 | INFORMATION TECHNOLOGY and INFORMATION | SALES MARKETING and RETAILING | C | B

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Webpage from an example website

Description

This resource is an example website for the Welsh Dresser Company. It shows the website content, together with all the features of the browser being used, such as the forward and back buttons, and search box.

Subjects

websites | browsers | internet | world wide web | RETAILING | Mathematical and Computer Sciences | INFORMATION | UK EL04 = SCQF 4 | Foundational Level | NICAT 1 | CQFW 1 | Foundation | GCSE D-G | NVQ 1 | Intermediate 1 | | UK EL05 = SCQF 5 | Intermediate level | Intermediate | NICAT 2 | CQFW 2 | Intermediate | GSCE A-C | NVQ 2 | | Employability | Design and delivery of programmes | Computer science | I100 | INFORMATION TECHNOLOGY and INFORMATION | SALES MARKETING and RETAILING | C | B

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Connecting to a website

Description

This is an animation to illustrate what happens when a server connects to a website. The animation shows the server's cookie - a text file containing information about the user - being picked up by the Web browser. This results in the user being recognised by the website to which he or she is connecting.

Subjects

e-commerce | business | cookies | internet | websites | web browsers | world wide web | RETAILING | Mathematical and Computer Sciences | INFORMATION | Business and Administrative studies | BUSINESS / MANAGEMENT / OFFICE STUDIES | Employability | Learning | Design and delivery of programmes | UK EL06 = SCQF 6 | Advanced courses | NICAT 3 | CQFW 3 | Advanced | A/AS Level | NVQ 3 | Higher | SVQ 3 | UK EL05 = SCQF 5 | Intermediate level | Intermediate | NICAT 2 | CQFW 2 | Intermediate | GSCE A-C | NVQ 2 | | UK EL07 = SCQF 7 | Higher Certificate | NICAT 4 | CQFW 4 | NVQ 4 | Advanced Higher | SVQ 4 | HN Certificate | UK EL08 = SCQF 8 | Higher Diploma | NICAT 5 | CQFW 5 | HN Diploma | Diploma in HE | administrative studies | Computer science | N000 | I100 | INFORMATION TECHNOLOGY and INFORMATION | SALES MARKETING and RETAILING | A | C | B

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata