Course Description : Basic data protection methods such as discretionary and mandatory access controls, secure database design, data integrity, secure architectures, secure transaction processing, information flow controls, and auditing, Copyright and database protection, privacy issues (including employee records and HIPAA). Security models for relational and object-oriented databases, Security of databases in a distributed environment, survey of commercial systems, and research prototypes.
Click here for the full syllabus
Lecture | Download PPT Slides | ||
Lecture 1 : | |||
Lecture 2 : | |||
Lecture 3 : | |||
Lecture 4 : | |||
Lecture 5 : | |||
Lecture 6 : | |||
Lecture 7 : | |||
Lecture 8 : | |||
Lecture 9 : | |||
Lecture 10: | |||
Lecture 11: | |||
Lecture 12: | |||
Lecture 13: | |||
Student | Report Title | ||
Erica Thomas | |||
Alvaro I. Gálvez | |||
Daniel Blevins | |||
T. Nguyen | |||
Charles Mahoney | |||
Due Date | Assignment/Report | ||
February 3 | |||
February 8 | |||
February 22 | |||
March 1 | |||
March 22 | |||
March 22 | |||
April 14 | |||
April 19 |
1 comment:
thanks for sharing step by step guide on "Computer Science Assignment" its really helpful for me has MCS student.
Post a Comment