This shows you the differences between two versions of the page.
isc:lectures:10 [2016/03/14 15:17] mihai.bucicoiu created |
isc:lectures:10 [2024/12/08 16:57] (current) florin.stancu |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | ==== Lecture 10 - Usable Security ==== | + | ==== Lecture 10 - Tunnels. Remote Security. ==== |
+ | |||
+ | <HTML> | ||
+ | <iframe src="https://docs.google.com/presentation/d/e/2PACX-1vRyl-S3Edi5pZ3kogHBgMAdxYw11MBVYawOMWFfr5AyYRTEvNQdlJ5zcIth7OcWJA/embed?start=false&loop=false&delayms=60000" frameborder="0" width="100%" height="600" allowfullscreen="true" mozallowfullscreen="true" webkitallowfullscreen="true"></iframe> | ||
+ | </HTML> | ||
+ | |||
+ | [[https://docs.google.com/presentation/d/e/2PACX-1vRyl-S3Edi5pZ3kogHBgMAdxYw11MBVYawOMWFfr5AyYRTEvNQdlJ5zcIth7OcWJA/pub?start=false&loop=false&delayms=60000| Lecture 10 - Tunnels. Remote Security.]] | ||
+ | |||
+ | === More resources === | ||
+ | |||
+ | * //[[https://people.scs.carleton.ca/~paulv/toolsjewels.html|Computer Security and the Internet: Tools and Jewels]]// => [[https://people.scs.carleton.ca/~paulv/toolsjewels/TJrev1/ch10-rev1.pdf|Chapter 10 (pdf)]] | ||
+ |