(lecture slides will appear here)
Attachments
- 0-General info.pdf
- 1-Introduction.pdf
- 2-Applications_and_code_vulnerabilities.pdf
- 3-Applications and code security.pdf
- 4-Network vulnerabilities.pdf
- 5-Firewalls-Detection.pdf
- hackathon_2019_1.png
- 6-Cryptography.pdf
- 7a-Keys-mgmt-secret.pdf
- 7b-Keys-mgmt-public.pdf
- 8-Authentication.pdf
- 9ab-Secure-channels_and_wifi.pdf
- 9e-VPNs-IPsec.pdf
- 9f-TLS-SSH.pdf
- 10-Authorization.pdf