SCCI Digital Library and Forum

MIT

S# Lecture Course Institute Instructor Discipline
476
Lecture 6 |Computer System Engineering, Spring 2005 (M-I-T)
Computer System Engineering (M-I-T) MIT Prof. Dr. Katrina LaCurts Applied Sciences
477
Lecture 7 |Computer System Engineering, Spring 2005 (M-I-T)
Computer System Engineering (M-I-T) MIT Prof. Dr. Katrina LaCurts Applied Sciences
478
Lecture 8 |Computer System Engineering, Spring 2005 (M-I-T)
Computer System Engineering (M-I-T) MIT Prof. Dr. Katrina LaCurts Applied Sciences
479
Lecture 9 |Computer System Engineering, Spring 2005 (M-I-T)
Computer System Engineering (M-I-T) MIT Prof. Dr. Katrina LaCurts Applied Sciences
480
1. Introduction, Threat Models (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
481
10. Symbolic Execution (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
482
11. Ur/Web (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
483
12. Network Security (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
484
13. Network Protocols (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
485
14. SSL and HTTPS (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
486
15. Medical Software (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
487
16. Side-Channel Attacks (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
488
17. User Authentication (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
489
18. Private Browsing (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
490
19. Anonymous Communication (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
491
2. Control Hijacking Attacks (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
492
20. Mobile Phone Security (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
493
21. Data Tracking (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
494
22. Guest Lecture by MIT IS&T (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
495
23. Security Economics (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
496
3. Buffer Overflow Exploits and Defenses (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
497
4. Privilege Separation (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
498
6. Capabilities (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
499
7. Sandboxing Native Code (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences
500
8. Web Security Model (M-I-T)
Computer Systems Security (M-I-T) MIT Prof. Dr. Nickolai Zeldovich Applied Sciences