Size: 1351
Comment:
|
Size: 943
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 3: | Line 3: |
== DES programming Assignment == | During this year we used Security In Computing 4th edition, Hacking Exposed 6th edition and the Code Book. |
Line 5: | Line 5: |
You must implement the following interface that I will use to grade your DES implementation: IDesGradeable. | == Exam Reviews == |
Line 7: | Line 7: |
General Requirements: | * Cptr427MidtermExam |
Line 9: | Line 9: |
* Use unsigned long integers for your data and key. * You may NOT use any cryptographic functions built by someone else - this must be all your code. * You may use standard data structures such as arrays, lists etc as needed. However you may not use the BitArray or any other similar device. * The program must use a GUI interface in C#. == Secure Computing Chapter Summaries == |
== Secure Computing Chapters == |
Line 17: | Line 12: |
1. SecureComputingChapter02 1. SecureComputingChapter12 1. SecureComputingChapter02 |
1. SecureComputingChapter02and12 |
Line 24: | Line 17: |
1. SecureComputingChapter10 1. SecureComputingChapter11 |
1. SecureComputingChapter10and11 |
Line 43: | Line 35: |
== Lab Project == 1. [[SpamLab|Spam]] |
Cptr427Winter2010
During this year we used Security In Computing 4th edition, Hacking Exposed 6th edition and the Code Book.
Exam Reviews
Secure Computing Chapters
Hacking Exposed Chapters
Make sure to include your quiz with answers here after you have given it!