|
ECS-235A, Lecture 10, October 12, 2022
|
|
This is the video of the ninth lecture. It's crude as I made it from my laptop, as the room has no video recording. Still not top of the line.
|
|
This is the video of the eighth lecture. It's crude as I made it from my laptop, as the room has no video recording. We moved to a different room.
|
|
ECS 153 Spring 2021. Computer Security. This is the section discussion section of the week of May 24. The video begins at 3:29 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This is the second discussion section of the week of May 17. The video begins at 3:02 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This is the first discussion section of the week of May 17. The video begins at 1:47 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This covers attacks, authenticated encryption, networks and cryptography, and TLS security. The video begins at 4:09 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This finishes symmetric key cryptography, covers public key cryptography and cryptographic hash functions and begins digital signatures.
|
|
ECS 153 Spring 2021. Computer Security. This is the second discussion section of the week of April 19. The video begins at 5:10 from the beginning.
|
|
|
|
ECS-127 Lecture 2019-03-15 at 12:10
|
|
ECS-127 Lecture 2019-03-08 at 12:10
|
|
ECS-127 Lecture 2019-03-06 at 12:10
|
|
ECS-127 Lecture 2019-03-04 at 12:10
|
|
ECS-127 Lecture 2019-03-01 at 12:10
|
|
ECS-127 Lecture 2019-02-27 at 12:10
|