This is the "Home" page of the "Computer security" guide.
Alternate Page for Screenreader Users
Skip to Page Navigation
Skip to Page Content

Computer security   Tags: csc 3355  

The objectives of this course are to provide an overview of the need for, and the technology, algorithms, and standards used in providing computer and communications security.
Last Updated: Feb 1, 2013 URL: http://libguides.aui.ma/content.php?pid=421464 Print Guide RSS Updates

Home Print Page
  Search: 
 
 

Vocabulary list

Please use the vocabulary list below to search the library catalog, through the keyword function, to identify materials relevant to this course.

  • Computing System
  • Computer security
  • Differential cryptanalysis
  • Ciphers
  • Discrete logarithms

 

 

Introduction

This course aims at teaching students principles of modern cryptography as a major tool in Computer Security. Topics will include block and stream ciphers, secret key encryption (DES, AES, RC-n), Public key encryption (RSA, Diffie-Hellman, Elliptic curve cryptography) …

 

Library of Congress Classes and Subclasses

Please use the call number below to search the library catalog, through the Call Number function, to browse the library collection listing materials relevant to this course.

CLASS Q - SCIENCE

Subclass QA

QA71-90                                       Instruments and machines

QA75-76.95                                  Calculating machines

QA75.5-76.95                                Electronic computers.  Computer science

QA76.75-76.765                            Computer software

Subject Guide

Profile Image
Amal El Omari
Contact Info
Circulation Desk
Mohammed VI Library
Al Akhawayn University in Ifrane
extension 2170
Send Email
 
Description

Loading  Loading...

Tip