Search Results (43)

View
Selected filters:
  • Security
Advanced Computer Security
Conditions of Use:
No Strings Attached
Rating

There are both practical and theoretical reasons to study algorithms. From a practical standpoint, you have to know a standard set of important algorithms from different areas of computing; in addition, you should be able to design new algorithms and analyze their efficiency. From the theoretical standpoint, the study of algorithms, sometimes called algorithmics, has come to be as the cornerstone of computer science.

Subject:
Computer Science
Material Type:
Module
Provider:
African Virtual University
Provider Set:
OER@AVU
Author:
Richard Musabe
Date Added:
04/20/2018
Algorithim Design and Analysis
Conditions of Use:
No Strings Attached
Rating

There are both practical and theoretical reasons to study algorithms. From a practical standpoint, you have to know a standard set of important algorithms from different areas of computing; in addition, you should be able to design new algorithms and analyze their efficiency. From the theoretical standpoint, the study of algorithms, sometimes called algorithmics, has come to be as the cornerstone of computer science.

This course aim to provide an in-depth understanding of the fundamental algorithmic techniques for design and analysis, in turn impart knowledge and practical competence in use of advanced data structures and the design and Welcome to Advanced computer Security Module. This module provides a study of high-level computer security issues in computer networks and advanced methods of data encryption. It focuses on advanced aspects of computer security, such as encryption, security practices, system security, security for authentication on the Web and password management techniques. Finally this module, students should be able to create secure network architectures adapted to the investment level and required security. Take responsibility for installation, configuration and network security maintenance.

The module aims to give IT infrastructure management skills, where the role of computer security is critical to ensure the integrity of data and the normal operation of the various systems: computer networks, servers and personal computers in the organization. The course will also explore various Information Security controls, how to handle various risk assessment in an organization and finally creating a security policy in organization.

Today, we note that the information is considered the key business of an organization / company due to its usefulness and importance, however, the issue of the company’s Information Security is a priority task for managers, because they recognize the value it has and therefore organizations must make sure that it is managed effectively. For this reason, this module is important because you will learn the methods and tools for computer security that can ensure the confidentiality of information in organizations and also learn how to protect their information and systems in a network environment.

Subject:
Computer Science
Material Type:
Module
Provider:
African Virtual University
Provider Set:
OER@AVU
Author:
Richard Musabe
Date Added:
02/22/2018
Attacks on American Soil: Pearl Harbor and September 11
Conditions of Use:
No Strings Attached
Rating

This collection uses primary sources to compare American responses to Pearl Harbor and September 11. Digital Public Library of America Primary Source Sets are designed to help students develop their critical thinking skills and draw diverse material from libraries, archives, and museums across the United States. Each set includes an overview, ten to fifteen primary sources, links to related resources, and a teaching guide. These sets were created and reviewed by the teachers on the DPLA's Education Advisory Committee.

Subject:
U.S. History
World History
Material Type:
Primary Source
Provider:
Digital Public Library of America
Provider Set:
Primary Source Sets
Author:
Albert Robertson
Date Added:
01/20/2016
Chinese Foreign Policy, Fall 2005
Conditions of Use:
Remix and Share
Rating

This lecture course provides students with a comprehensive introduction to the international relations of the People's Republic of China. China's foreign relations during the Cold War as well as contemporary diplomatic, security and economic issues will be examined to identify and explain China's foreign policy goals and their implementation since 1949. Throughout, this course will investigate the sources of conflict and cooperation in China's behavior, assessing competing explanations for key events and policies. Readings will be drawn from political science, history, and international relations theory.

Subject:
Political Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Fravel, M
Date Added:
01/01/2005
Comparative Grand Strategy and Military Doctrine, Fall 2004
Conditions of Use:
Remix and Share
Rating

A comparative study of the grand strategies and military doctrines of the great powers in Europe (Britain, France, Germany, and Russia) from the late nineteenth to the mid-twentieth century. Examines strategic developments in the years preceding and during World Wars I and II. What factors have exerted the greatest influence on national strategies? How may the quality of a grand strategy be judged? Exploration of comparative case study methodology also plays a central role. What consequences seem to follow from grand strategies of different types? Open to undergraduates with permission of instructor.

Subject:
Political Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Posen, Barry
Date Added:
01/01/2004
Comparative Security and Sustainability, Fall 2004
Conditions of Use:
Remix and Share
Rating

This course focuses on the complexities associated with security and sustainability of states in international relations. Covering aspects of theory, methods and empirical analysis, the course is in three parts, and each consists of seminar sessions focusing on specific topics.

Subject:
Political Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Choucri, Nazli
Date Added:
01/01/2004
Computing and Society
Conditions of Use:
No Strings Attached
Rating

The primary goal of the course is to develop computer professionals able to explore the implications of what computing professionals create as part of their work and how this impacts society at large. It will help the learner to understand the development, application and consequences of computing technology in relation to society.

In this course, you will learn about the history of computing; principles, concepts and terminology of computing, software uses, application and development; role of computing professionals; current computing technologies and their use in everyday life, examination of variety of computing perspectives such as access to information, privacy, computer security, virtual society, transformation of work and workplace; social, ethical and legal issues and their implications to computing in our daily lives as a society; professional aspects of computing.

Subject:
Computer Science
Material Type:
Module
Provider:
African Virtual University
Provider Set:
OER@AVU
Author:
William Korir
Date Added:
08/06/2018
Data Privacy Project: Curriculum
Conditions of Use:
No Strings Attached
Rating

Welcome to the curriculum page for the Data Privacy Project. We are pleased to share a set of learning tools that was created with and for library professionals. The curriculum contains a facilitator’s guide, presentation slides, and handouts, and permits remix and reuse under a Share Alike 4.0 Creative Commons license.

Subject:
Computer Science
Material Type:
Module
Provider:
Data Privacy Project
Date Added:
06/27/2017
Data Privacy Project: Overview
Conditions of Use:
No Strings Attached
Rating

The goal of our trainings is to learn the building blocks of privacy protection and digital security. Our teachings focus on activities patrons do every day at the library so that library staff can develop capacity.

Subject:
Computer Science
Material Type:
Module
Provider:
Data Privacy Project
Date Added:
06/27/2017
Database, Internet, and Systems Integration Technologies, Fall 2013
Conditions of Use:
Remix and Share
Rating

Survey of information technology covering database modeling, design, and implementation with an emphasis on relational databases and SQL. Internet technologies: http, html, XML, SOAP, security. Brief introduction to components and middleware. Introduction to design and implementation of multi-tier architectures, benchmarks, and performance. Data networking protocols and technologies. Students complete project that covers requirements/design, data model, database implementation, web site, and system architecture. This course is an intensive review of information technology. It covers topics in software development methods, data modeling and databases, application development, Web standards and development, system integration, security, and data communications. Most of the homework sets lead the class through a project in which a database and Web application are designed and constructed, using good software process and addressing security, network and other issues. The project, which is done in two-person teams, provides hands-on experience to complement the lectures and readings. Recitations discuss readings and provide more detailed information on the software tools used. The course goal is to cover the key concepts in the major areas of information technology, to enable students to successfully understand, work with and manage IT efforts as part of supply chain, transportation or civil engineering projects.

Subject:
Computer Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Kocur, George
Date Added:
01/01/2013
Database Management Systems
Conditions of Use:
Remix and Share
Rating

A more formal approach to Relational Database Management Systems, compared the way they were covered during Web Applications. Database systems are discussed from the physical layer of B-trees and file servers to the abstract layer of relational design. Also includes alternative and generic approaches to database design and database management system including relational, object-relational, and object-oriented systems, SQL standards, algebraic query languages, integrity constraints, triggers, functional dependencies, and normal forms. Other topics include tuning database transactions, security from the application perspective, and data warehousing.

Material Type:
Assessment
Full Course
Homework/Assignment
Lecture
Reading
Provider:
ArsDigita University
Provider Set:
ArsDigita University
Author:
Ravi Jasuja
Date Added:
02/16/2011
Defense Politics, Spring 2006
Conditions of Use:
Remix and Share
Rating

This course focuses on the institutional relationships that affect the raising, maintenance and use of military forces in the United States. It is about civil/military, government/industry, military/science and military service/military service relations. It examines how politicians, defense contractors, and military officers determine the military might of the United States and analyzes the military strategies of the nation and the bureaucratic strategies of the armed services, contractors, and defense scientists. It offers a combination of military sociology, organizational politics, and the political economy of defense.

Subject:
Sociology
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Sapolsky, Harvey
Date Added:
01/01/2006
Ethical Hacking for Effective Defense (Modules, Labs, and Lectures)
Conditions of Use:
No Strings Attached
Rating

The following set of materials is used in the Textbook Transformation Grants implementation of Ethical Hacking for Effective Defense:

https://oer.galileo.usg.edu/compsci-collections/8/

Topics include:

TCP/IP Level Attacks
Port Scanning
DDoS
Footprinting and Social Engineering
Enumeration
Programming for Security Professionals
Operating System Vulnerabilities
Embedded System Security
Hacking Web Servers
Hacking Wireless Networks
Cryptography
Protecting Networks with Security Devices

Subject:
Computer Science
Material Type:
Full Course
Provider:
University System of Georgia
Provider Set:
Galileo Open Learning Materials
Author:
Hossain Shahriar
Date Added:
06/20/2018
Finance Theory II, Spring 2003
Conditions of Use:
Remix and Share
Rating

Continuation of Finance Theory I, concentrating on corporate financial management. Topics: Capital investment decisions, security issues, dividend policy, optimal capital structure, hedging and risk management, futures markets and real options analysis. The objective of this course is to learn the financial tools needed to make good business decisions. The course presents the basic insights of corporate finance theory, but emphasizes the application of theory to real business decisions. Each session involves class discussion, some centered on lectures and others around business cases.

Subject:
Business and Communication
Finance
Management
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Jenter, Dirk
Date Added:
01/01/2003
Globalization, Migration, and International Relations, Spring 2006
Conditions of Use:
Remix and Share
Rating

Tracing the evolution of international interactions, this course examines the dimensions of globalization in terms of scale and scope. It is divided into three parts; together they are intended to provide theoretical, empirical, and policy perspectives on source and consequences of globalization, focusing on emergent structures and processes, and on the implications of flows of goods and services across national boundaries -- with special attention to the issue of migration, on the assumption that people matter and matter a lot. An important concern addressed pertains to the dilemmas of international policies that are shaped by the macro-level consequences of micro-level behavior. 17.411 fulfills undergraduate public policy requirement in the major and minor. Graduate students are expected to explore the subject in greater depth through reading and individual research.

Subject:
Political Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Choucri, Nazli
Date Added:
01/01/2006
Great Power Military Intervention, Fall 2013
Conditions of Use:
Remix and Share
Rating

This course examines systematically, and comparatively, great and middle power military interventions, and candidate military interventions, into civil wars from the 1990s to the present. These civil wars did not easily fit into the traditional category of vital interest. These interventions may therefore tell us something about broad trends in international politics including the nature of unipolarity, the erosion of sovereignty, the security implications of globalization, and the nature of modern western military power.

Subject:
Journalism
Political Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Peterson, Roger
Posen, Barry
Date Added:
01/01/2013
Growing Up Digital-Provided by Baltimore County Public Schools
Conditions of Use:
Remix and Share
Rating

This website is a comprehensive look at digital citizenship for K-12 students, parents and teachers. It covers a wide variety of topics including: online security, online relationships and cyberbullying, digital footprint, digital citizenship, the use of copyrighted information and much more.

Subject:
Education
Material Type:
Activity/Lab
Diagram/Illustration
Student Guide
Author:
MSDE Admin
andrew robertson
Date Added:
07/11/2018
Hidden in Plain Sight
Conditions of Use:
Read the Fine Print
Rating

Steganography is the science and art of hiding messages in plain sight so only the sender and intended recipient know the existence of a message. Steganography can be characterized as security through obscurity. Through this lesson, students experience a portion of the engineering design process as they research steganography and steganographic methods; identify problems, criteria and constraints; brainstorm possible solutions; and generate ideas. These are the critical first steps in the engineering design process, often overlooked by students who want to get to the "doing" phases—designing, building and testing. In computer science, a thorough design phase makes program implementation much easier and more effective. Students obtain practice with a portion of the design process that may be less exciting, but is just as important as the other steps in the process.

Subject:
Computer Science
Engineering
Material Type:
Lesson Plan
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Derek Babb
Date Added:
09/18/2014
An Implementation of Steganography
Conditions of Use:
Read the Fine Print
Rating

Students apply the design process to the problem of hiding a message in a digital image using steganographic methods, a PictureEdit Java class, and API (provided as an attachment). They identify the problems and limitations associated with this task, brainstorm solutions, select a solution, and implement it. Once their messages are hidden, classmates attempt to decipher them. Based on the outcome of the testing phase, students refine and improve their solutions.

Subject:
Computer Science
Engineering
Material Type:
Activity/Lab
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Brian Sandall
Derek Babb
Date Added:
09/18/2014
Information Technology Essentials, Spring 2005
Conditions of Use:
Remix and Share
Rating

Subject covers technology concepts and trends underlying current and future developments in information technology, and fundamental principles for the effective use of computer-based information systems. Special emphasis on networks and distributed computing, including the web. Other topics include: hardware and operating systems, software development tools and processes, relational databases, security and cryptography, enterprise applications and business process redesign, and electronic commerce. Hands-on exposure to Web, database, and graphical user interface (GUI) tools. Primarily for Sloan master's students.

Subject:
Information Science
Material Type:
Full Course
Provider:
M.I.T.
Provider Set:
M.I.T. OpenCourseWare
Author:
Malone, Thomas
Date Added:
01/01/2005