Security: Difference between revisions

6 bytes added ,  10 years ago
no edit summary
No edit summary
No edit summary
Line 237:
Dingledine, Roger. 2012. [http://www.freehaven.net/~arma/cv.htmlRoger Dingledine's Curriculum]. (If website is blocked, view through Tor/Vidalia enabled browser). Cambridge, MA: www.freehaven.net/~arma/cv.html
 
Eckersley, Peter. 2014. [https://www.eff.org/files/surveillance-todos.pdf How can we protect the Internet against surveillance? Seven TODO items for users, web developers and protocol engineers]. San Francisco, CA: Electronic Frontier Foundation.
 
Felten, Ed. 2003. [https://freedom-to-tinker.com/blog/felten/drm-and-first-rule-security-analysis DRM, and the First Rule of Security Analysis]. March 19th. freedom-to-tinker.com.
Line 382:
 
Privacy: http://worlduniversity.wikia.com/wiki/Privacy
 
Security: http://worlduniversity.wikia.com/wiki/Security
 
Programming: http://worlduniversity.wikia.com/wiki/Programming
Line 393 ⟶ 391:
Social Science: http://worlduniversity.wikia.com/wiki/Social_Science
 
SecuritySurveillance: http://worlduniversity.wikia.com/wiki/SecuritySurveillance
 
 
Anonymous user