Course Syllabus
Spring 2009
Lecture 1:
3/31/09
(mit)
|
Reading:
|
Part 1: Basics | |
Lecture 2:
4/ 2/09
(mit)
|
Reading:
|
Lecture 3:
4/ 7/09
(bon)
|
Reading:
|
Lecture 4:
4/ 9/09
(inv)
|
Reading:
|
Lecture 5:
4/14/09
(inv)
|
Reading:
|
Lecture 6:
4/16/09
(bon)
|
Reading:
|
Lecture 7:
4/21/09
(mit)
|
Use of cryptography in computer security
[ppt]
Reading:
|
Part 2: Network security | |
Lecture 8:
4/23/09
(bon)
|
Reading:
|
Lecture 9:
4/28/09
(mit)
|
Reading:
|
Lecture 10:
4/30/09
(bur)
|
Reading:
|
Lecture 11:
5/ 5/09
(bur)
|
Reading: |
Lecture 12:
5/ 7/09
(bon)
|
Reading:
|
Lecture 13:
5/12/09
(bur)
|
Reading:
|
Part 3: Web Security | |
Lecture 14:
5/14/09
(bur)
|
Reading:
|
Lecture 15:
5/19/09
(mit)
|
Reading:
|
Lecture 16:
5/21/09
(bon)
|
|
Lecture 17:
5/26/09
(mit)
|
Reading:
|
Part 5: Final topics | |
Lecture 18:
5/28/09
(bon)
|
Digital Rights Management
[ppt]
Reading:
|
Lecture 19:
6/ 2/09
(inv)
|
Final lecture
|