833
Comment:
|
← Revision 21 as of 2011-03-27 21:24:13 ⇥
987
Placing it in the hierarchy
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was renamed from Cptr427Winter2010 | |
Line 2: | Line 3: |
During this year we used Security In Computing 4th edition, Hacking Exposed 6th edition and the Code Book. |
Cptr427Winter2010
During this year we used Security In Computing 4th edition, Hacking Exposed 6th edition and the Code Book.
Exam Reviews
Secure Computing Chapters
Hacking Exposed Chapters
Make sure to include your quiz with answers here after you have given it!