start
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| start [2010/09/08 19:27] – bil | start [2010/09/10 14:49] (current) – bil | ||
|---|---|---|---|
| Line 4: | Line 4: | ||
| ===== Description | ===== Description | ||
| - | The course | + | This course |
| + | |||
| + | Access Control - Identification, | ||
| + | |||
| + | Network Security - attacks, intrusion detection, auditing, firewalls, packet monitoring | ||
| + | |||
| + | Operating System Security - threats, vulnerability scanning, password cracking, accounts | ||
| + | |||
| + | Application Software Security - design of secure systems, Java security, buffer overflows, database security, client-side and server-side securities, tamper resistant software, finding vulnerabilities. | ||
| ===== Lectures ===== | ===== Lectures ===== | ||
start.1283974046.txt.gz · Last modified: by bil
