Difference between revisions of "Slides"

From WLCS
Line 60: Line 60:
 
* C.6 - The intelligent web - [[Media:WebScience_Part6_IntelligentWeb.pptx]]
 
* C.6 - The intelligent web - [[Media:WebScience_Part6_IntelligentWeb.pptx]]
  
== Case Study: Network Security ==
+
== Current Case Study ==
* [[Media:IBCS_CaseStudy2014.pdf]]
+
* [[Media:IBCS_CaseStudy2015.pdf]]
* Period 2 - Case Study Presentations
+
 
** [[Media:BringYourOwnDevice2.pptx]]
+
== Archived Case Studies ==
** [[Media:DOSAttacks2.pptx]]
+
* [[IBCS2 - 1314 - Case Study]]
** [[Media:GuanjongHighSchool2.pptx]]
 
** [[Media:WesternHeightsPharmaceuticals2.pptx]]
 
* Period 4 - Case Study Presentations
 
** [[Media:BringYourOwnDevice4.pptx]]
 
** [[Media:DOSAttacks4.pptx]]
 
** [[Media:GuanjongHighSchool4.pptx]]
 
** [[Media:WesternHeightsPharmaceuticals4.pptx]]
 
* Additional Resources
 
** [http://technet.microsoft.com/en-us/library/cc959354.aspx Microsoft - Common Types of Network Attacks]
 
** [http://www.symantec.com/connect/articles/security-11-part-3-various-types-network-attacks Symantec - Various Types of Network Attacks]
 
** [http://computernetworkingnotes.com/network-security-access-lists-standards-and-extended/types-of-attack.html Computer Networking Notes - Types of Attack]
 
** [http://en.wikipedia.org/wiki/Attack_(computing)#Types_of_attacks Wikipedia - Type of Attacks]
 

Revision as of 09:35, 29 January 2015

Syllabus Content Guide

Wiki Textbook

Topic 1: System fundamentals

Topic 2: Computer organization

Topic 3: Networks

Topic 4: Computational thinking, problem-solving, & programming

Topic 5: Abstract data structures

Topic 6: Resource management

Topic 7: Control

Option C: Web science

Current Case Study

Archived Case Studies