Show simple item record

dc.contributor.authorRivest, Ronalden_US
dc.coverage.temporalFall 2003en_US
dc.date.issued2003-12
dc.identifier6.857-Fall2003
dc.identifierlocal: 6.857
dc.identifierlocal: IMSCP-MD5-7c051b28ff8cec62c18626cb6bda0647
dc.identifier.urihttp://hdl.handle.net/1721.1/91676
dc.description.abstract6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.en_US
dc.languageen-USen_US
dc.relationen_US
dc.rights.uriUsage Restrictions: This site (c) Massachusetts Institute of Technology 2014. Content within individual courses is (c) by the individual authors unless otherwise noted. The Massachusetts Institute of Technology is providing this Work (as defined below) under the terms of this Creative Commons public license ("CCPL" or "license") unless otherwise noted. The Work is protected by copyright and/or other applicable law. Any use of the work other than as authorized under this license is prohibited. By exercising any of the rights to the Work provided here, You (as defined below) accept and agree to be bound by the terms of this license. The Licensor, the Massachusetts Institute of Technology, grants You the rights contained here in consideration of Your acceptance of such terms and conditions.en_US
dc.rights.uriUsage Restrictions: Attribution-NonCommercial-ShareAlike 3.0 Unporteden_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/3.0/en_US
dc.subjectnetworken_US
dc.subjectcomputer securityen_US
dc.subjectsecurityen_US
dc.subjectcryptographyen_US
dc.subjectsecret-keyen_US
dc.subjectpublic-keyen_US
dc.subjectdigital signatureen_US
dc.subjectauthenticationen_US
dc.subjectidentificationen_US
dc.subjectintrusion detectionen_US
dc.subjectvirusen_US
dc.subjectoperating systemen_US
dc.subjectsoftwareen_US
dc.subjectprotectionen_US
dc.subjectelectronic mailen_US
dc.subjectemailen_US
dc.subjectelectronic commerceen_US
dc.subjectelectronic cashen_US
dc.subjectfirewallen_US
dc.subjectcomputeren_US
dc.subjectdigitalen_US
dc.subjectsignatureen_US
dc.subjectelectronicen_US
dc.subjectcashen_US
dc.subjectcommerceen_US
dc.subjectmailen_US
dc.subjectoperatingen_US
dc.subjectsystemen_US
dc.subjectintrustionen_US
dc.subjectdetectionen_US
dc.subjectdistributeden_US
dc.subjectphysicalen_US
dc.subjectdiscretionaryen_US
dc.subjectmandatoryen_US
dc.subjectaccessen_US
dc.subjectcontrolen_US
dc.subjectbiometricsen_US
dc.subjectinformationen_US
dc.subjectflowen_US
dc.subjectmodelsen_US
dc.subjectcoverten_US
dc.subjectchannelsen_US
dc.subjectintegrityen_US
dc.subjectlogicen_US
dc.subjectvotingen_US
dc.subjectrisken_US
dc.subjectassessmenten_US
dc.subjectsecureen_US
dc.subjectweben_US
dc.subjectbrowsersen_US
dc.subjectarchitectureen_US
dc.subjectengineeringen_US
dc.subjectcertificatesen_US
dc.subjectmulti-user computer systemsen_US
dc.subjectdistributed computer systemsen_US
dc.subjectphysical securityen_US
dc.subjectdiscretionary access controlen_US
dc.subjectmandatory access controlen_US
dc.subjectbiometricsen_US
dc.subjectinformation-flow modelsen_US
dc.subjectcovert channelsen_US
dc.subjectintegrity modelsen_US
dc.subjectelementary cryptographyen_US
dc.subjectauthentication logic;electronic cashen_US
dc.subjectvirusesen_US
dc.subjectfirewallsen_US
dc.subjectelectronic votingen_US
dc.subjectrisk assessmenten_US
dc.subjectsecure web browsersen_US
dc.subjectnetwork securityen_US
dc.subjectcomputer securityen_US
dc.subjectarchitecture engineeringen_US
dc.subjectsecret-keyen_US
dc.subjectpublic-keyen_US
dc.subjectdigital signaturesen_US
dc.subjectauthentication schemesen_US
dc.subjectidentification schemesen_US
dc.subjectintrusion detectionen_US
dc.subjectformal modelsen_US
dc.subjectsecure operating systemsen_US
dc.subjectsoftware protectionen_US
dc.subjectelectronic mail securityen_US
dc.subjectWorld Wide Weben_US
dc.subjectelectronic commerceen_US
dc.subjectecommerceen_US
dc.subjectemail securityen_US
dc.subjectwwwen_US
dc.subjectpayment protocolsen_US
dc.subjectelectronic cashen_US
dc.subjectauthentication logicen_US
dc.title6.857 Network and Computer Security, Fall 2003en_US
dc.title.alternativeNetwork and Computer Securityen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record