929
Comment:
|
← Revision 21 as of 2011-03-27 21:24:13 ⇥
987
Placing it in the hierarchy
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was renamed from Cptr427Winter2010 | |
Line 3: | Line 4: |
== Lectures Notes (not in book) == * [[DES]] * [[RSA]] |
During this year we used Security In Computing 4th edition, Hacking Exposed 6th edition and the Code Book. |
Line 12: | Line 10: |
== Secure Computing Chapter Summaries == | == Secure Computing Chapters == |
Line 15: | Line 13: |
1. SecureComputingChapter02 1. SecureComputingChapter12 |
1. SecureComputingChapter02and12 |
Line 21: | Line 18: |
1. SecureComputingChapter10_11 | 1. SecureComputingChapter10and11 |
Cptr427Winter2010
During this year we used Security In Computing 4th edition, Hacking Exposed 6th edition and the Code Book.
Exam Reviews
Secure Computing Chapters
Hacking Exposed Chapters
Make sure to include your quiz with answers here after you have given it!