|
Foundations of Computer and Information Security. This covers trust models, introduces availability models, and presents constraint-based availability models. The class starts at 9:46 into the video.
|
|
|
|
|
|
Name: Maril Stratton, Patricia Bailey, Laurie LewisDate interviewed:6/21/18 Date appointed: Stratton, 1986; Bailey, 1983; Lewis, 1987Date retired: Stratton, 2011; Bailey, 2017; Lewis, 2014…
|