Size: 986
Comment:
|
Size: 943
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 3: | Line 3: |
== Lectures Notes (not in book) == * [[DES]] * [[RSA]] |
During this year we used Security In Computing 4th edition, Hacking Exposed 6th edition and the Code Book. |
Line 12: | Line 9: |
== Secure Computing Chapter Summaries == | == Secure Computing Chapters == |
Line 15: | Line 12: |
1. SecureComputingChapter02 1. SecureComputingChapter12 1. SecureComputingChapter02 |
1. SecureComputingChapter02and12 |
Line 22: | Line 17: |
1. SecureComputingChapter10 1. SecureComputingChapter11 |
1. SecureComputingChapter10and11 |
Cptr427Winter2010
During this year we used Security In Computing 4th edition, Hacking Exposed 6th edition and the Code Book.
Exam Reviews
Secure Computing Chapters
Hacking Exposed Chapters
Make sure to include your quiz with answers here after you have given it!