|
|
|
ECS 235A, Lecture 3, September 26, 2022
|
|
ECS-235A Lecture 2, September 23, 2022
|
|
ECS 235A Lecture 1, September 21, 2022
|
|
Lecture 6, on January 14, 2022 of ECS 235B, Foundations of Computer and Information Security
|
|
Lecture 5, on January 12, 2022 of ECS 235B, Foundations of Computer and Information Security
|
|
This is the video of the twelfth lecture. It's crude as I made it from my laptop, as the room has no video recording. Still rough.
|
|
This is the video of the eighth lecture. It's crude as I made it from my laptop, as the room has no video recording. We moved to a different room.
|
|
This is the video of the fifth lecture. It's crude as I made it from my laptop, as the room has no video recording. I suspect it's still very amateurish.
|
|
This is the video of the third lecture. It's crude as I made it from my laptop, as the room has no video recording. Just like before..
|
|
This is the video of the third lecture. It's crude as I made it from my laptop, as the room has no video recording. Again.
|
|
This is the video of the second lecture. It's crude as I made it from my laptop, as the room has no video recording. This will be true for all the videos I post for this class.
|
|
A panel with questions regarding legal matters people might encounter in the seed industry.
|
|
ECS 153 Spring 2021. Computer Security. This finishes symmetric key cryptography, covers public key cryptography and cryptographic hash functions and begins digital signatures.
|
|
ECS 153 Spring 2021. Computer Security. This finishes the discussion of security policies. The video begins at 10:28 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This finishes the discussion of access control matrices and begins one on security policies. The video begins at 2:47 from the beginning.
|