Size: 437
Comment:
|
Size: 798
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 2: | Line 2: |
== Purpose == This page contains information and links for Principles of Networking taught by Dr. A at Southern Adventist University. If you are a student, '''''dis is da place! ''''' |
|
Line 3: | Line 5: |
== Purpose == | == Security In Computing Wiki Pages == |
Line 5: | Line 7: |
This page contains information and links for Principles of Networking taught by Dr. A at Southern Adventist University. If you are a student, dis is da place! | * IsThereASecurityProblem * ElemetaryCryptography * ProgramSecurity * ProtectionInGeneralPurposeOperatingSystem * ... |
Line 7: | Line 13: |
== Tips for Presentations == | == Hacking Exposed 6 Chapters Wiki Pages == |
Line 9: | Line 15: |
1. A picture, chart, graph, table is worth a hundred slides. Use them 1. Complex ideas are best explored in examples - Dick Hardt is an excellent example of this |
* FootPrinting * [[Scanning]] This is just an overview chapter and we only really talk about delay in terms of problems to solve. In conjunction with queuing, you might consider the series discussed in SummingFiniteIntegerSeries. Otherwise, we're just looking for vocabulary. == Terms == {students you should edit this!} |
Principles of Networking, CPTR 328 Information Page
Purpose
This page contains information and links for Principles of Networking taught by Dr. A at Southern Adventist University. If you are a student, dis is da place!
Security In Computing Wiki Pages
- IsThereASecurityProblem
- ...
Hacking Exposed 6 Chapters Wiki Pages
This is just an overview chapter and we only really talk about delay in terms of problems to solve. In conjunction with queuing, you might consider the series discussed in SummingFiniteIntegerSeries. Otherwise, we're just looking for vocabulary.
Terms
{students you should edit this!}