19304601
Lecture
SoSe 20: Computer Security
Volker Roth
Comments
Suggested reading
M. Gasser. Building Secure Computer Systems.
D. Denning. Cryptography and Data Security.
D. Kleidermacher, M. Kleidermacher. Embedded Systems Security.
M. Bishop. Computer Security Art and ... read more
25 Class schedule
Additional appointments
Thu, 2020-07-30 14:00 - 16:00Rechnersicherheit
Regular appointments
Tue, 2020-04-14 16:00 - 18:00
Tue, 2020-04-21 16:00 - 18:00
Tue, 2020-04-28 16:00 - 18:00
Tue, 2020-05-05 16:00 - 18:00
Tue, 2020-05-12 16:00 - 18:00
Tue, 2020-05-19 16:00 - 18:00
Tue, 2020-05-26 16:00 - 18:00
Tue, 2020-06-02 16:00 - 18:00
Tue, 2020-06-09 16:00 - 18:00
Tue, 2020-06-16 16:00 - 18:00
Tue, 2020-06-23 16:00 - 18:00
Tue, 2020-06-30 16:00 - 18:00
Tue, 2020-07-07 16:00 - 18:00
Rechnersicherheit (Serientermin 1)
Rechnersicherheit (Serientermin 1)
Rechnersicherheit (Serientermin 1)
Rechnersicherheit (Serientermin 1)
Rechnersicherheit (Serientermin 1)
Rechnersicherheit (Serientermin 1)
Rechnersicherheit (Serientermin 1)
Rechnersicherheit (Serientermin 1)
Rechnersicherheit (Serientermin 1)
Rechnersicherheit (Serientermin 1)
Rechnersicherheit (Serientermin 1)
Rechnersicherheit (Serientermin 1)
Rechnersicherheit (Serientermin 1)
Thu, 2020-04-16 12:00 - 14:00
Thu, 2020-04-23 12:00 - 14:00
Thu, 2020-04-30 12:00 - 14:00
Thu, 2020-05-07 12:00 - 14:00
Thu, 2020-05-14 12:00 - 14:00
Thu, 2020-05-28 12:00 - 14:00
Thu, 2020-06-04 12:00 - 14:00
Thu, 2020-06-11 12:00 - 14:00
Thu, 2020-06-18 12:00 - 14:00
Thu, 2020-06-25 12:00 - 14:00
Thu, 2020-07-02 12:00 - 14:00
Thu, 2020-07-09 12:00 - 14:00
Rechnersicherheit (Serientermin 2)
Rechnersicherheit (Serientermin 2)
Rechnersicherheit (Serientermin 2)
Rechnersicherheit (Serientermin 2)
Rechnersicherheit (Serientermin 2)
Rechnersicherheit (Serientermin 2)
Rechnersicherheit (Serientermin 2)
Rechnersicherheit (Serientermin 2)
Rechnersicherheit (Serientermin 2)
Rechnersicherheit (Serientermin 2)
Rechnersicherheit (Serientermin 2)
Rechnersicherheit (Serientermin 2)
Content
This course motivates the need for computer security and introduces central concepts of computer security such as security objectives, threats, threat analysis, security policy and ... read more