|
ECS-235A, Lecture 13, October 19, 2022
|
|
This is the video of the thirteenth lecture. It's crude as I made it from my laptop, as the room has no video recording. Ah, well . . .
|
|
ECS 153 Spring 2021. Computer Security. This covers ACLs, C-Lists, locks and keys, secret sharing, and begins rings. The video begins at 1:42 from the beginning.
|
|
Foundations of Computer and Information Security. This finishes discussion of the Chinese Wall model, and covers the CISS and ORCON models. The class starts at 8:55 into the video.
|
|
This is a recording of the tenth lecture, made by Zoom.
|
|
This is a recording of the ninth lecture, made by Zoom.
|
|
Return to your Canvas course to find the link for your Literacy Sponsor Padlet so you can add your own list. Literacy Sponsor Slideshow Link
|
|
routing data from external MIDI controllers
|
|
ECS40 Lecture 2015-02-13 at 11:00
|
|
ECS40 Lecture 2015-02-11 at 11:00
|
|
ECS40 Lecture 2015-02-09 at 11:00
|