|
This is the video of the fifth lecture. It's crude as I made it from my laptop, as the room has no video recording. I suspect it's still very amateurish.
|
|
This is the video of the third lecture. It's crude as I made it from my laptop, as the room has no video recording. Again.
|
|
Foundations of Computer and Information Security. This covers detection of covert channels. The class starts at 7:35 into the video.
|
|
|
|
Foundations of Computer and Information Security. This covers class administration, the basic components, reference monitors, and part of access control matrices. The class begins 16:06 minutes into…
|
|
BIS180L Lecture 3, part 2. Using for loops at the Linux command line to automate repetitive tasks.
|
|
Lecture 01 for Bis180L Genome Biology. Brief Introduction to the course, cloud computing, and markdown.
|
|
ECS40 Lecture 2015-02-11 at 11:00
|