|
Foundations of Computer and Information Security. This covers attribute-based access control matrices and the HRU result. The class starts at 14:27 into the video.
|
|
Foundations of Computer and Information Security. This covers access control matrices, primitive operations, commands, and miscellaneous rights and principles. The class starts at 6:53 into the video.
|
|
This tutorial goes over how to use the Ubuntu command screen. Screen or GNU Screen is a terminal multiplexer. In other words, it means that you can start a screen session and then open any number of…
|
|
Library prep, using software modules, and PacBio data types: PacBio Iso-Seq Workshop Online 30 September 2020
|
|
|
|
|
|
Need links to documentation
|
|
|
|
|
|
|
|
BIS180L Lecture 4. Brief introduction to R and RStudio.
|
|
BIS180L Lecture 3, part 2. Using for loops at the Linux command line to automate repetitive tasks.
|
|
BIS180L Lecture 3, part one. Review of BLAST.
|
|
Lecture 02 for BIS180L. Brief introduction to version control with GIT.
|
|
Lecture 01 for Bis180L Genome Biology. Brief Introduction to the course, cloud computing, and markdown.
|
|
ECS40 Lecture 2015-01-05 at 11:00
|