|
ECS-235A, Lecture 11, October 14, 2022
|
|
ECS-235A, Lecture 10, October 12, 2022
|
|
|
|
This is the video of the twelfth lecture. It's crude as I made it from my laptop, as the room has no video recording. Still rough.
|
|
This is the video of the ninth lecture. It's crude as I made it from my laptop, as the room has no video recording. Still not top of the line.
|
|
ECS 153 Spring 2021. Computer Security. This covers authentication with a brief overview of rainbow tables and begins access control mechanisms. The video begins at 5:13 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This covers the POODLE attack on SSL and begins authentication. The video begins at 8:16 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This covers attacks, authenticated encryption, networks and cryptography, and TLS security. The video begins at 4:09 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This covers key exchange, generation, and PKIs The video begins at 10:16 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This is the second discussion section of the week of April 5. The video begins at 2:22 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This is the first discussion section of the week of April 5. The video begins at 13:21 from the beginning.
|
|
PHY 255 Lecture 22 (Bitcoin Second Part) Lecture 23 (Kelly)
|