• Basic security functions provided by operating systems • System resources that require operating system protection • Operating system design principles • How operating systems control access to resources • The history of trusted computing • Characteristics of operating system rootkits
• Survey authentication mechanisms • List available access control implementation options • Explain the problems encryption is designed to solve • Understand the various categories of encryption tools as well as the strengths, weaknesses, and applications of each • Learn about certificates and certificate authorities
• Define computer security as well as basic computer security terms • Introduce the C-I-A Triad • Introduce basic access control terminology • Explain basic threats, vulnerabilities, and attacks • Show how controls map to threats
REVIEWS The Art and Science of Total Synthesis at the Dawn of the Twenty-First Century** K. C. Nicolaou, Dionisios Vourloumis, Nicolas Winssinger, and Phil S. Baran Dedicated to Professor E. J. Corey for his outstanding contributions to organic synthesis At the dawn of the twenty-first cen-of the most exciting and important covery and invention of new synthetic tury, the state of the art and science of discoveries of the twentieth century in strategies and technologies; and explo- vnth