Difference between revisions of "CSE539 Applied Cryptography"

From esoterum.org
Jump to: navigation, search
Line 10: Line 10:
 
=== [http://cactus.eas.asu.edu/Partha/Teaching/539.2007/HW2.htm Homework 2]: 28 February ===
 
=== [http://cactus.eas.asu.edu/Partha/Teaching/539.2007/HW2.htm Homework 2]: 28 February ===
 
*[http://en.wikipedia.org/wiki/SQL_injection SQL injection]
 
*[http://en.wikipedia.org/wiki/SQL_injection SQL injection]
 +
*[http://www.securiteam.com/securityreviews/5DP0N1P76E.html SQL Injection handbook]

Revision as of 18:49, 26 February 2007

Good to know

Ken Thompson's On Trusting Trust, 1984

Homework 1: 8 February 13 February

-Flash Enigma emulator (Germany)

Homework 2: 28 February