|
EPS 131 Lecture 20 (First Part)
|
|
PHY 255 Lecture 12 (Second Part) Lecture 13 (First Part)
|
|
|
|
PHY 255 Lecture 11 Lecture 12 (First Part)
|
|
|
|
Foundations of Computer and Information Security. This covers DRM, RBAC, and begins Traducement. The class starts at 3:55 into the video.
|
|
|
|
|
|
Foundations of Computer and Information Security. This covers DRM, RBAC, and begins Traducement. The class starts at 10:07 into the video.
|
|
|
|
Foundations of Computer and Information Security. This finishes discussion of the Chinese Wall model, and covers the CISS and ORCON models. The class starts at 8:55 into the video.
|
|
Foundations of Computer and Information Security. This covers network flooding attacks anf the Chinese Wall model. The class starts at 7:37 into the video.
|
|
|
|
|
|
EPS 131 Lecture 14a (Second Part) Lecture 14b (Second Part)
|
|
|