dc.contributor.author | Rivest, Ronald | en_US |
dc.coverage.temporal | Fall 2003 | en_US |
dc.date.issued | 2003-12 | |
dc.identifier | 6.857-Fall2003 | |
dc.identifier | local: 6.857 | |
dc.identifier | local: IMSCP-MD5-7c051b28ff8cec62c18626cb6bda0647 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/91676 | |
dc.description.abstract | 6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment. | en_US |
dc.language | en-US | en_US |
dc.relation | | en_US |
dc.rights.uri | Usage Restrictions: This site (c) Massachusetts Institute of Technology 2014. Content within individual courses is (c) by the individual authors unless otherwise noted. The Massachusetts Institute of Technology is providing this Work (as defined below) under the terms of this Creative Commons public license ("CCPL" or "license") unless otherwise noted. The Work is protected by copyright and/or other applicable law. Any use of the work other than as authorized under this license is prohibited. By exercising any of the rights to the Work provided here, You (as defined below) accept and agree to be bound by the terms of this license. The Licensor, the Massachusetts Institute of Technology, grants You the rights contained here in consideration of Your acceptance of such terms and conditions. | en_US |
dc.rights.uri | Usage Restrictions: Attribution-NonCommercial-ShareAlike 3.0 Unported | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/3.0/ | en_US |
dc.subject | network | en_US |
dc.subject | computer security | en_US |
dc.subject | security | en_US |
dc.subject | cryptography | en_US |
dc.subject | secret-key | en_US |
dc.subject | public-key | en_US |
dc.subject | digital signature | en_US |
dc.subject | authentication | en_US |
dc.subject | identification | en_US |
dc.subject | intrusion detection | en_US |
dc.subject | virus | en_US |
dc.subject | operating system | en_US |
dc.subject | software | en_US |
dc.subject | protection | en_US |
dc.subject | electronic mail | en_US |
dc.subject | email | en_US |
dc.subject | electronic commerce | en_US |
dc.subject | electronic cash | en_US |
dc.subject | firewall | en_US |
dc.subject | computer | en_US |
dc.subject | digital | en_US |
dc.subject | signature | en_US |
dc.subject | electronic | en_US |
dc.subject | cash | en_US |
dc.subject | commerce | en_US |
dc.subject | mail | en_US |
dc.subject | operating | en_US |
dc.subject | system | en_US |
dc.subject | intrustion | en_US |
dc.subject | detection | en_US |
dc.subject | distributed | en_US |
dc.subject | physical | en_US |
dc.subject | discretionary | en_US |
dc.subject | mandatory | en_US |
dc.subject | access | en_US |
dc.subject | control | en_US |
dc.subject | biometrics | en_US |
dc.subject | information | en_US |
dc.subject | flow | en_US |
dc.subject | models | en_US |
dc.subject | covert | en_US |
dc.subject | channels | en_US |
dc.subject | integrity | en_US |
dc.subject | logic | en_US |
dc.subject | voting | en_US |
dc.subject | risk | en_US |
dc.subject | assessment | en_US |
dc.subject | secure | en_US |
dc.subject | web | en_US |
dc.subject | browsers | en_US |
dc.subject | architecture | en_US |
dc.subject | engineering | en_US |
dc.subject | certificates | en_US |
dc.subject | multi-user computer systems | en_US |
dc.subject | distributed computer systems | en_US |
dc.subject | physical security | en_US |
dc.subject | discretionary access control | en_US |
dc.subject | mandatory access control | en_US |
dc.subject | biometrics | en_US |
dc.subject | information-flow models | en_US |
dc.subject | covert channels | en_US |
dc.subject | integrity models | en_US |
dc.subject | elementary cryptography | en_US |
dc.subject | authentication logic;electronic cash | en_US |
dc.subject | viruses | en_US |
dc.subject | firewalls | en_US |
dc.subject | electronic voting | en_US |
dc.subject | risk assessment | en_US |
dc.subject | secure web browsers | en_US |
dc.subject | network security | en_US |
dc.subject | computer security | en_US |
dc.subject | architecture engineering | en_US |
dc.subject | secret-key | en_US |
dc.subject | public-key | en_US |
dc.subject | digital signatures | en_US |
dc.subject | authentication schemes | en_US |
dc.subject | identification schemes | en_US |
dc.subject | intrusion detection | en_US |
dc.subject | formal models | en_US |
dc.subject | secure operating systems | en_US |
dc.subject | software protection | en_US |
dc.subject | electronic mail security | en_US |
dc.subject | World Wide Web | en_US |
dc.subject | electronic commerce | en_US |
dc.subject | ecommerce | en_US |
dc.subject | email security | en_US |
dc.subject | www | en_US |
dc.subject | payment protocols | en_US |
dc.subject | electronic cash | en_US |
dc.subject | authentication logic | en_US |
dc.title | 6.857 Network and Computer Security, Fall 2003 | en_US |
dc.title.alternative | Network and Computer Security | en_US |