CS392 - Lecture 1 Introduction CS 392/6813 2010 Nitesh...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Lecture 1: Introduction* CS 392/6813 2010 Nitesh Saxena * Adopted from Previous Lectures by Nasir Memon 9/9/2010 Lecture 1 - Introduction 2 Outline ± Administrative Stuff ± Introductory Technical Stuff
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
9/9/2010 Lecture 1 - Introduction 3 Some Important Pointers ± Instructor: Nitesh Saxena ± Office: LC 228 ± Email: [email protected] (best way to reach me!) ± Phone No: 718-260-3116 ± Office Hours: Wednesdays 3-4pm (or by appointment) ± Course Web Page (also accessible through my web-page) http://isis.poly.edu/courses/cs392-f2010 ± (Unofficial) TA: ± Jon Voris: jvoris @isis.poly.edu ± Senior PhD student, research in security ± (Official) Grader: ± Sean (Justin) Lin: ± PhD student, just started at Poly ± MyPoly Web Page: http://my.poly.edu/ 9/9/2010 Lecture 1 - Introduction 4 About the Instructor ± PhD graduate from UC Irvine ± Research in computer and network security, and applied cryptography ± Web page: http://cis.poly.edu/~nsaxena
Background image of page 2
9/9/2010 Lecture 1 - Introduction 5 Prerequisites 1. Solid background in Mathematics 2. Good programming skills 3. Knowledge in Algorithms/Data Structures 4. [Others] 1. Operating Systems 2. Networks ± If you don’t satisfy the prerequisites ± Talk to me 9/9/2010 Lecture 1 - Introduction 6 What to expect ± The course would be quite tough ± Lot of math and programming ± Hectic schedule; heavy workload ± The grading will be curved ± I would love to give A’s but I won’t mind giving F’s when deserved / ± I might/will make mistakes ± Please point them out ± Talk to me if you have any complaints (or send me an anonymous email ) ± But, I guarantee that ± I will encourage you to do your best ± You’ll have fun ± I’ll help you learn as much as I can – don’t hesitate to ask for help whenever needed ± Although you won’t become experts, you will learn enough to move on! ± You’ll hopefully get motivated to pursue research in this area, ultimately ± You should not take this course if ± you are not serious ± you think it would be an easy substitute for something (believe me it will not be!) ± you think you will learn “hacking”
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
9/9/2010 Lecture 1 - Introduction 7 Other Security Courses at Poly ± Network Security: offered in spring (also online) ± Cryptography: offered in spring (also online) ± Other specialized courses Computer security Network security Crypto 9/9/2010 Lecture 1 - Introduction 8 Course References ± Introduction to Computer Security -- Matt Bishop ± Handbook of Applied Cryptography – Alfred Menezes, Paul van Oorschot, Scott Vanstone ± Free online copy http://www.cacr.math.uwaterloo.ca/hac/ ± Wikipedia can be a good reference at times ± Other references to be provided as we proceed
Background image of page 4
9/9/2010 Lecture 1 - Introduction 9 Grading ± 50% - Homeworks and Programming assignments ± 50% - 1 Midterm and 1 Final 9/9/2010 Lecture 1 - Introduction 10 Team Up ± This time, you will be asked to work in teams of strictly two each on homeworks ±
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/02/2010 for the course CS 392 taught by Professor Staff during the Spring '08 term at NYU Poly.

Page1 / 19

CS392 - Lecture 1 Introduction CS 392/6813 2010 Nitesh...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online