This shows you the differences between two versions of the page.
|
isc:lectures:01 [2024/10/18 16:25] florin.stancu |
isc:lectures:01 [2025/02/07 19:06] (current) florin.stancu |
||
|---|---|---|---|
| Line 6: | Line 6: | ||
| [[https://docs.google.com/presentation/d/e/2PACX-1vSxTnKzyuCgi1qMnolLf54ubI7GmfnwISulSRlFBdxXYNSWso9xf7LdFvGi2446sg/pub?start=false&loop=false&delayms=3000 | Lecture 01 - Introduction ]] | [[https://docs.google.com/presentation/d/e/2PACX-1vSxTnKzyuCgi1qMnolLf54ubI7GmfnwISulSRlFBdxXYNSWso9xf7LdFvGi2446sg/pub?start=false&loop=false&delayms=3000 | Lecture 01 - Introduction ]] | ||
| + | |||
| + | === More resources === | ||
| + | |||
| + | * {{isc:lectures:isc_cursuri_pdf_2024-2025.zip|All ISC lecture slides (*.pdf .zip)}} | ||
| + | * //[[https://people.scs.carleton.ca/~paulv/toolsjewels.html|Computer Security and the Internet: Tools and Jewels]]// by Paul C. van Oorschot. Springer, 2021 | ||
| + | |||