Digital Suppression and Cryptographic Defense of Social Movements Short Description: Defend Dissent …
Digital Suppression and Cryptographic Defense of Social Movements
Short Description: Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material—from surveillance used against contemporary US protests to the African National Congress’s use of partially manual encryption in fighting apartheid in South Africa in the 80s. This book can be read linearly, or you can pick and choose what you would like to learn about. Each chapter is prefaced with what you should read first (for background) and concludes with what you might want to read next. También disponible en Español Data dashboard
Word Count: 67802
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
Short Description: This book step-by-step explains how to configure FortiGate Firewall in …
Short Description: This book step-by-step explains how to configure FortiGate Firewall in the network. Each chapter begins with a learning objective and step-by-step explanations in GNS3 to beginners on how to build different security scenarios from scratch.
Visit BCcampus Open Education to learn about open education in British Columbia.
Word Count: 17064
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
This course focuses on the fundamentals of information security that are used …
This course focuses on the fundamentals of information security that are used in protecting both the information present in computer storage as well as information traveling over computer networks. Upon successful completion of this course, the student will be able to: explain the challenges and scope of information security; explain such basic security concepts as confidentiality, integrity, and availability, which are used frequently in the field of information security; explain the importance of cryptographic algorithms used in information security in the context of the overall information technology (IT) industry; identify and explain symmetric algorithms for encryption-based security of information; identify and explain public key-based asymmetric algorithms for encryption-based security of information; describe the access control mechanism used for user authentication and authorization; describe Secure Sockets Layer (SSL) as a common solution enabling security of many applications, including all Internet-based commerce; describe securing Internet Protocol (IP) communications by using Internet Protocol Security (IPSec); explain the importance of physical security and discuss ways to improve physical security of an enterprise; explain the use of such security tools as firewalls and intrusion prevention systems; explain malicious software issues, such as those brought forth by software-based viruses and worms; explain common software security issues, such as buffer overflow; describe the basic process of risk assessment in the context of overall IT security management. (Computer Science 406)
Simply put, this is one of my most favorite topics when it …
Simply put, this is one of my most favorite topics when it comes to talking about computers. In this video we layout the order of this lesson, as well as give basic definitions of: •Machine-Level Security •Network Security •Internet Security •Social Engineering
The act of physically protecting the computers. The first rule of any …
The act of physically protecting the computers. The first rule of any type of computer safety is restricting physical access to it. If a bad guy can get their hands on the computer assume they will be able to gain access to all data contained within.
Our third video in our Information Security series (part of the Introduction …
Our third video in our Information Security series (part of the Introduction to Computer course) focuses on Authentication. Authentication is basically proving you are who you say you are
There are three forms of authentication •Something you know •Something you have •Something about you
This video focuses on date protection. We look at how to migrate …
This video focuses on date protection. We look at how to migrate your data from old to new devices, the importance of data backup AND how to make sure no one can steal your data off a discarded hard drive.
Data is always priceless
Three topics: -Data migration -Data backup -Data disposal
Steps taken to protect computer networks. We cover permissions, user policies (especially …
Steps taken to protect computer networks. We cover permissions, user policies (especially how they can get you fired), expectations of privacy, and wireless security.
Links from Video: -The System Administrator Song http://youtu.be/OpGN3oT1thA
Our 6 video in the Information Security series (part of Introduction to …
Our 6 video in the Information Security series (part of Introduction to Computers). We introduce students to the concept of Internet Security.
Specifically we look at defining the players: hackers, crackers, and script kiddies. We also look at steps the home user should take to harden the computer: keep their computer updates, run anti-malware software, and have a firewall.
Video 7 of our information security series (part of Introduction to Computers) …
Video 7 of our information security series (part of Introduction to Computers) we examine malware. Malware is a blanket term that means malicious code, it includes things like viruses, Trojans, worms and spyware.
Links from Video: -AVG by Grisoft: http://free.avg.com/us-en/homepage -AVAST: http://www.avast.com -ClamWin: http://www.clamwin.com/ -Microsoft Security Essentials: http://windows.microsoft.com/en-us/windows/security-essentials-download
Our last video in the Information Security lesson covers my favorite topic, …
Our last video in the Information Security lesson covers my favorite topic, social engineering. In this video we look at: Dumpster Diving, Shoulder Surfing, Tailgating, and Spam & Phishing.
I also tell the story about how I used tailgating to get access to a classroom at the FBI Academy.
6.857 Network and Computer Security is an upper-level undergraduate, first-year graduate course …
6.857 Network and Computer Security is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the Computer Systems and Architecture Engineering concentration.
Short Description: This book step-by-step explains how to configure Palo Alto Firewall …
Short Description: This book step-by-step explains how to configure Palo Alto Firewall in the network. Each chapter begins with a learning objective and step-by-step explanations in GNS3 to beginners on how to build different security scenarios from scratch.
Visit BCcampus Open Education to learn about open education in British Columbia.
Word Count: 12420
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
This single instrumental qualitative case study explores and thickly describes job performance …
This single instrumental qualitative case study explores and thickly describes job performance outcomes based upon the manner in which self-directed learning activities of a purposefully selected sample of 3 construction managers are conducted, mediated by the use of Web 2.0 technology. The data collected revealed that construction managers are concerned with the performance expected of them, in addition to how well they perform their work-related activities (orientation to learning), indicating that organizations should provide guidelines on the use and expected outcomes of self-directed learning in addition to providing the tools, resources, and time (environmental factors) to match performance needs; construction managers feel that work-related activities expected of them, how well the work-related activities are performed, and consequences for poor performance at work are determining factors in selecting Web 2.0 technologies; while construction managers understand the need for rules restricting the use of Web 2.0 technologies in performing their jobs, they feel these rules do hinder their performance because access to specific information they need to answer a question, solve a problem, or research to learn something new is sometimes restricted; and successful performance outcomes are determined by compliance to expected performance behaviors of others, such as answering a question or solving a problem an architect or superintendent have presented, as well as expectations construction managers have set for themselves. The following are appended: (1) Call for Participation--Web 2.0 Technology Project; (2) Informed Consent Letter and Form/Template; (3) Semistructured Interview Guide; and (4) Permission to Conduct Research Study.
A Journey Through Trust, its Applications, Calculations and Limitations Short Description: This …
A Journey Through Trust, its Applications, Calculations and Limitations
Short Description: This is a short book, written partly as a personal reflection and partly as a scientific text. It is aimed at undergraduate to graduate classes in Trust Systems, with applicability to other information security domains, as well as general audiences interested in knowing more about how trust and security work in computational systems without getting overly technical. It covers trust from basics through to introducing formalizations of trust, including journeys through blockchains and zero trust systems.
Word Count: 80673
ISBN: 978-1-7779195-0-4
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.