|
ECS-036A Lecture 2023-04-17 at 13:07
|
|
ECS-036A Lecture 2023-04-03 at 13:07
|
|
ECS-235A, Lecture 13, October 19, 2022
|
|
ECS-235A, Lecture 11, October 14, 2022
|
|
ECS 235A, Lecture 3, September 26, 2022
|
|
This is the video of the fifth lecture. It's crude as I made it from my laptop, as the room has no video recording. I suspect it's still very amateurish.
|
|
This is the video of the third lecture. It's crude as I made it from my laptop, as the room has no video recording. Again.
|
|
Foundations of Computer and Information Security. This covers detection of covert channels. The class starts at 7:35 into the video.
|
|
|
|
Foundations of Computer and Information Security. This covers class administration, the basic components, reference monitors, and part of access control matrices. The class begins 16:06 minutes into…
|
|
How to Set Up an Instance for Mac Users
|
|
BIS180L Lecture 3, part 2. Using for loops at the Linux command line to automate repetitive tasks.
|
|
Lecture 01 for Bis180L Genome Biology. Brief Introduction to the course, cloud computing, and markdown.
|
|
ECS40 Lecture 2015-02-11 at 11:00
|