Completed
8. Web Security Model
Class Central Classrooms beta
YouTube playlists curated by Class Central.
Classroom Contents
Computer Systems Security (Fall 2014)
Automatically move to the next video in the Classroom when playback concludes
- 1 1. Introduction, Threat Models
- 2 2. Control Hijacking Attacks
- 3 3. Buffer Overflow Exploits and Defenses
- 4 4. Privilege Separation
- 5 6. Capabilities
- 6 7. Sandboxing Native Code
- 7 8. Web Security Model
- 8 9. Securing Web Applications
- 9 10. Symbolic Execution
- 10 11. Ur/Web
- 11 12. Network Security
- 12 13. Network Protocols
- 13 14. SSL and HTTPS
- 14 15. Medical Software
- 15 16. Side-Channel Attacks
- 16 17. User Authentication
- 17 18. Private Browsing
- 18 19. Anonymous Communication
- 19 20. Mobile Phone Security
- 20 21. Data Tracking
- 21 22. Guest Lecture by MIT IS&T
- 22 23. Security Economics