Computer security

Results: 47159



#Item
101Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ron Rivest Handout 3 February 24, 2012

Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ron Rivest Handout 3 February 24, 2012

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English
    102CS255: Cryptography and Computer Security  Winter 2008 Final Exam Instructions

    CS255: Cryptography and Computer Security Winter 2008 Final Exam Instructions

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2008-03-21 14:11:27
      103S214 Lab Schedule Spring 2018 S214 is not available for general computer use Last Open Lab Day: Weds May 16, 2018 Only students in security-related CNIT classes can use this lab. This restriction is for your protection,

      S214 Lab Schedule Spring 2018 S214 is not available for general computer use Last Open Lab Day: Weds May 16, 2018 Only students in security-related CNIT classes can use this lab. This restriction is for your protection,

      Add to Reading List

      Source URL: samsclass.info

      - Date: 2018-03-17 12:32:14
        104Colleen M. Swanson travellingcryptographer.com •  Research Interests Computer security and applied cryptography, privacy-enhancing technologies, security/privacy-related public policy, i

        Colleen M. Swanson travellingcryptographer.com • Research Interests Computer security and applied cryptography, privacy-enhancing technologies, security/privacy-related public policy, i

        Add to Reading List

        Source URL: travellingcryptographer.com

        - Date: 2017-10-03 15:50:40
          105Measuring the Security Harm of TLS Crypto Shortcuts Drew Springall† Zakir Durumeric†‡ J. Alex Halderman† † University of Michigan ‡ International Computer Science Institute {aaspring, zakir, jhalderm}@umich.e

          Measuring the Security Harm of TLS Crypto Shortcuts Drew Springall† Zakir Durumeric†‡ J. Alex Halderman† † University of Michigan ‡ International Computer Science Institute {aaspring, zakir, jhalderm}@umich.e

          Add to Reading List

          Source URL: jhalderm.com

          - Date: 2017-02-11 13:18:43
            106CSIRT - Computer Security Incid

            CSIRT - Computer Security Incid

            Add to Reading List

            Source URL: www.csirt.org

            - Date: 2011-07-04 18:32:30
              107Research Statement Michalis Faloutsos My research focuses on computer security and networks and can be grouped into the following, partiallyoverlapping areas: 1. Web security focusing on the detection of malware on websi

              Research Statement Michalis Faloutsos My research focuses on computer security and networks and can be grouped into the following, partiallyoverlapping areas: 1. Web security focusing on the detection of malware on websi

              Add to Reading List

              Source URL: www.cs.unm.edu

              - Date: 2011-01-29 14:01:59
                108CIRCL - Computer Incident Response Center Luxembourg  TRAINING AND TECHNICAL COURSES CATALOGUE 2017 from Incident Response to Operational Security

                CIRCL - Computer Incident Response Center Luxembourg TRAINING AND TECHNICAL COURSES CATALOGUE 2017 from Incident Response to Operational Security

                Add to Reading List

                Source URL: www.circl.lu

                - Date: 2017-02-15 04:13:31
                  109CIRCL - Computer Incident Response Center Luxembourg  TRAINING AND TECHNICAL COURSES CATALOGUE 2017 from Incident Response to Operational Security

                  CIRCL - Computer Incident Response Center Luxembourg TRAINING AND TECHNICAL COURSES CATALOGUE 2017 from Incident Response to Operational Security

                  Add to Reading List

                  Source URL: circl.lu

                  - Date: 2017-02-15 04:13:31
                    110A Security Analysis of Police Computer Systems Benjamin VanderSloot∗ Stuart Wheaton∗  J. Alex Halderman

                    A Security Analysis of Police Computer Systems Benjamin VanderSloot∗ Stuart Wheaton∗ J. Alex Halderman

                    Add to Reading List

                    Source URL: benjaminvandersloot.com

                    - Date: 2018-03-26 16:16:53