|
ECS-036A Lecture 2023-04-03 at 13:07
|
|
ECS 235A, Lecture 3, September 26, 2022
|
|
Lecture 6, on January 14, 2022 of ECS 235B, Foundations of Computer and Information Security
|
|
Lecture 2, on January 5, 2022 of ECS 235B, Foundations of Computer and Information Security
|
|
Lecture 1, on January 3, 2022 of ECS 235B, Foundations of Computer and Information Security
|
|
This is the video of the third lecture. It's crude as I made it from my laptop, as the room has no video recording. Again.
|
|
This workshop will show attendees how to automate their analyses using shell scripts, as well as run and manage software that takes minutes, hours, or days to execute. We’ll also show you how…
|
|
This workshop shows attendees how to connect to remote computers using ssh software, which is the most common way to do so. We will discuss usernames and passwords, introduce ssh software clients,…
|
|
This workshop introduces the UNIX command line, which is the main way to interact with remote computers. We will cover computing concepts, file systems and directory structure, and some of the most…
|
|
This workshop was put on by the Common Fund Data Ecosystem Training Team on July 14. Events are posted at http://www.nih-cfde.org/events/ and most are free to register for and attend.
|
|
ECS 153 Spring 2021. Computer Security. This is the second discussion section of the week of May 10. The video begins at 3:02 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This is the second discussion section of the week of May 3. The video begins at 14:44 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This is the first discussion section of the week of May 3. The video begins at 5:07 from the beginning.
|
|
Foundations of Computer and Information Security. This covers generalized noninterference, nondeducibility, and restrictiveness. The class starts at 8:24 into the video.
|
|
This tutorial goes over how to use the Ubuntu command screen. Screen or GNU Screen is a terminal multiplexer. In other words, it means that you can start a screen session and then open any number of…
|
|
Foundations of Computer and Information Security. This covers more about noninterference. The class starts at 8:09 into the video.
|