Monday, October 26, 2009
Lec 10- CYBERLAW
›
In this chapter, we make a group and do some research about topic that he provides. Our topic is about "Communication and Multimedia (T...
Lec 9 - LEGAL AND ETHICAL ISSUES IN COMPUTER SECURITY
›
Legal & Ethical *Law *imply imposition by the obligation of obedience on the part of all subject to that authority *Ethics *a set of mor...
Lec 8 - Wireless LAN Security
›
WEP use to provide comparable confidentiality to a traditional wired network in particular it does not protect users of the network from eac...
Lab 7 - SECURITY IN APPLICATIONS
›
Email has two part, header and body. Header part used to state the sender and email recipient. Body part is content of the message or email....
Lec 6 - COMPUTER NETWORKS
›
A computer network is a group of computer that are connected to each other for the purpose of communication. Networks may be classified acco...
Lab 5 - Web Application
›
On this lab, we need to describe the flaw of web application and how it is exploited. Besides that, we also have to exploit the web vulnerab...
Lec 5 - Database Security
›
Databases need to have level of security in order to protect the database against both malicious and accidental threats. A threat is any typ...
›
Home
View web version