6.858 Spring 2022 Lecture 2: Security architecture Nickolai Zeldovich 1:29:43 2 years ago 2 051 Далее Скачать
6.858 Spring 2020 Lecture 2: Security architecture Nickolai Zeldovich 1:22:48 4 years ago 12 299 Далее Скачать
6.858 Spring 2022 Lecture 10: Android security Nickolai Zeldovich 1:29:44 2 years ago 503 Далее Скачать
6.858 Spring 2022 Lecture 3: User authentication Nickolai Zeldovich 1:29:57 2 years ago 1 251 Далее Скачать
6.858 Spring 2022 Lecture 13: Network security Nickolai Zeldovich 1:29:57 2 years ago 772 Далее Скачать
6.858 Fall 2014 Lecture 2: Control hijacking attacks Nickolai Zeldovich 1:27:24 10 years ago 11 829 Далее Скачать
6.858 Spring 2022 Lecture 14: Secure channels Nickolai Zeldovich 1:29:59 2 years ago 414 Далее Скачать
6.858 Spring 2022 Lecture 5: Privilege separation Nickolai Zeldovich 1:29:58 2 years ago 635 Далее Скачать
6.858 Spring 2022 Lecture 22: Guest lecture by Max Krohn: Zoom security Nickolai Zeldovich 1:29:58 2 years ago 779 Далее Скачать
6.858 Spring 2022 Lecture 16: Guest lecture by Max Burkhardt: Information security in real life Nickolai Zeldovich 1:29:56 2 years ago 304 Далее Скачать
6.858 Spring 2022 Lecture 8: Sandboxing libraries Nickolai Zeldovich 1:29:58 2 years ago 555 Далее Скачать
6.858 Spring 2022 Lecture 21: Guest lecture by bunnie: Hardware security Nickolai Zeldovich 1:29:57 2 years ago 701 Далее Скачать
6.858 Spring 2022 Lecture 6: OS and VM isolation Nickolai Zeldovich 1:29:57 2 years ago 687 Далее Скачать
6.858 Spring 2022 Lecture 9: Client device security Nickolai Zeldovich 1:29:59 2 years ago 462 Далее Скачать
6.858 Spring 2022 Lecture 11: Symbolic execution Nickolai Zeldovich 1:29:39 2 years ago 441 Далее Скачать