|
|
|
|
|
This is the video of the twentieth lecture. It's crude as I made it from my laptop, as the room has no video recording. This one recorded the full class.
|
|
|
|
|
|
This is the video of the fourteenth lecture. It's crude as I made it from my laptop, as the room has no video recording. So it goes . . .
|
|
This is the video of the thirteenth lecture. It's crude as I made it from my laptop, as the room has no video recording. Ah, well . . .
|
|
This is the video of the twelfth lecture. It's crude as I made it from my laptop, as the room has no video recording. Still rough.
|
|
|
|
This is the video of the ninth lecture. It's crude as I made it from my laptop, as the room has no video recording. Still not top of the line.
|
|
This is the video of the eighth lecture. It's crude as I made it from my laptop, as the room has no video recording. We moved to a different room.
|
|
This is the video of the seventh lecture. It's crude as I made it from my laptop, as the room has no video recording. I'm sure it is really very amateurish.
|
|
|
|
ECS 153 Spring 2021. Computer Security. This covers more on malware. The video begins at 2:57 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This is the section discussion section of the week of May 24. The video begins at 3:29 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This covers ACLs, C-Lists, locks and keys, secret sharing, and begins rings. The video begins at 1:42 from the beginning.
|