The past decade has seen an explosion in the concern for the security of information. This course introduces students to the basic principles and practices of computer and information security. Focus ...
Taking action to personally ensure computer security helps protect everyone from data and identity theft, viruses, hackers, and other abuses. Everyone who uses a computer makes Purdue’s computing ...
A prominent computer scientist who has spent 20 years publishing academic papers on cryptography, privacy, and cybersecurity has gone incommunicado, had his professor profile, email account ...
This publication provides detailed guidance on developing, implementing, and integrating computer security as a key component of nuclear security. This guidance applies to computer security aspects of ...
The IAEA provides guidance and training to assist States in developing comprehensive computer and information security activities. The use of computer-based systems at nuclear and radiological ...
The program also provides current employees in the public and private sectors an opportunity to obtain advanced-level, high-quality training in the core areas of computer forensics, information ...
For topics in computer security, this course will cover an overview of operation systems security (particularly Linux), password security, access control mechanisms, patching, vulnerability analysis, ...
Please note that the Spring 2025 entry term is only open for MS degree programs and students who do not require a F-1 visa. Yes. Those without a prior degree in Computer Science, Software Engineering, ...
Britain’s National Cyber Security Centre (NCSC) has secretly censored detailed public computer security guidance provided to barristers, solicitors and legal firms without explanation or ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results