Slides
The slides are still under construction and will be posted as they are completed. They are in both Powerpoint and PDF formats.
- Part I. Introduction
- Chapter 1. An Overview of Computer Security
[PPTX]
[PDF]
- Part II. Foundations
- Chapter 2. Access Control Matrix
[PPTX]
[PDF]
- Chapter 3. Foundational Results
[PPTX]
[PDF]
- Part III. Policy
- Chapter 4. Security Policies
[PPTX]
[PDF]
- Chapter 5. Confidentiality Policies
[PPTX]
[PDF]
- Chapter 6. Integrity Policies
[PPTX]
[PDF]
- Chapter 7. Availability Policies
[PPTX]
[PDF]
- Chapter 8. Hybrid Policies
[PPTX]
[PDF]
- Chapter 9. Noninterference and Policy Composition
[PPTX]
[PDF]
- Part IV. Implementation I: Cryptography
- Chapter 10. Basic Cryptography
[PPTX]
[PDF]
- Chapter 11. Key Management
[PPTX]
[PDF]
- Chapter 12. Cipher Techniques
[PPTX]
[PDF]
- Chapter 13. Authentication
[PPTX]
[PDF]
- Part V. Implementation II: Systems
- Chapter 14. Design Principles
[PPTX]
[PDF]
- Chapter 15. Representing Identity
[PPTX]
[PDF]
- Chapter 16. Access Control Mechanisms
[PPTX]
[PDF]
- Chapter 17. Information Flow
[PPTX]
[PDF]
- Chapter 18. Confinement Problem
[PPTX]
[PDF]
- Part VI. Assurance
- Chapter 19. Introduction to Assurance
[PPTX]
[PDF]
- Chapter 20. Building Systems with Assurance
[PPTX]
[PDF]
- Chapter 21. Formal Methods
[PPTX]
[PDF]
- Chapter 22. Evaluating Systems
[PPTX]
[PDF]
- Part VII. Special Topics
- Chapter 23. Malware
[PPTX]
[PDF]
- Chapter 24. Vulnerability Analysis
[PPTX]
[PDF]
- Chapter 25. Auditing
[PPTX]
[PDF]
- Chapter 26. Intrusion Detection
[PPTX]
[PDF]
- Chapter 27. Attacks and Responses
[PPTX]
[PDF]
- Part VIII. Practicum
- Chapter 28. Network Security
[PPTX]
[PDF]
- Chapter 29. System Security
[PPTX]
[PDF]
- Chapter 30. User Security
[PPTX]
[PDF]
- Chapter 31. Program Security
[PPTX]
[PDF]
- Part IX. Appendices
- Appendix A. Lattices
[PPTX]
[PDF]
- Appendix B. The Extended Euclidean Algorithm
[PPTX]
[PDF]
- Appendix C. Entropy and Uncertainty
[PPTX]
[PDF]
- Appendix D. Virtual Machines
[PPTX]
[PDF]
- Appendix E. Symbolic Logic
[PPTX]
[PDF]
- Appendix F. The Encryption Standards
[PPTX]
[PDF]
- Appendix G. Example Academic Security Policy
- Appendix H. Programming Rules
[PPTX]
[PDF]
“Power corrupts, PowerPoint corrupts absolutely.”
—Edward Tufte, Yale Emeritus professor
Last updated on Monday, November 5, 2018 at 11:27:50 PM
|
|