Security: Difference between revisions
Content added Content deleted
No edit summary |
No edit summary |
||
Line 237: | Line 237: | ||
Dingledine, Roger. 2012. [http://www.freehaven.net/~arma/cv.htmlRoger Dingledine's Curriculum]. (If website is blocked, view through Tor/Vidalia enabled browser). Cambridge, MA: www.freehaven.net/~arma/cv.html |
Dingledine, Roger. 2012. [http://www.freehaven.net/~arma/cv.htmlRoger Dingledine's Curriculum]. (If website is blocked, view through Tor/Vidalia enabled browser). Cambridge, MA: www.freehaven.net/~arma/cv.html |
||
Eckersley, Peter. 2014. [https://www.eff.org/files/surveillance-todos.pdf How can we protect the Internet against surveillance? Seven TODO items for users, web developers and protocol engineers]. San Francisco, CA: Electronic Frontier Foundation. |
Eckersley, Peter. 2014. [https://www.eff.org/files/surveillance-todos.pdf How can we protect the Internet against surveillance? Seven TODO items for users, web developers and protocol engineers]. San Francisco, CA: Electronic Frontier Foundation. |
||
Felten, Ed. 2003. [https://freedom-to-tinker.com/blog/felten/drm-and-first-rule-security-analysis DRM, and the First Rule of Security Analysis]. March 19th. freedom-to-tinker.com. |
Felten, Ed. 2003. [https://freedom-to-tinker.com/blog/felten/drm-and-first-rule-security-analysis DRM, and the First Rule of Security Analysis]. March 19th. freedom-to-tinker.com. |
||
Line 382: | Line 382: | ||
Privacy: http://worlduniversity.wikia.com/wiki/Privacy |
Privacy: http://worlduniversity.wikia.com/wiki/Privacy |
||
⚫ | |||
Programming: http://worlduniversity.wikia.com/wiki/Programming |
Programming: http://worlduniversity.wikia.com/wiki/Programming |
||
Line 393: | Line 391: | ||
Social Science: http://worlduniversity.wikia.com/wiki/Social_Science |
Social Science: http://worlduniversity.wikia.com/wiki/Social_Science |
||
⚫ | |||