◼ LC at the Phonological Level ◼ Research Method ◼ The Structure of Speech ◼ Perception of Isolated Speech Segments ◼ Perception of Continuous Speech ◼ Perception of Written Language ◼ LC at the Lexical Level ◼ Dimensions of Word knowledge ◼ Organization of the Internal Lexicon ◼ Models of Lexical Access ◼ Implications ◼ LC at the Sentence Level ◼ Comprehension of Sentence ◼ Sentence Memory For Sentences ◼ LC at the Discourse Level ◼ Comprehension of Discourse ◼ Memory for Discourse ◼ Educational Implications ◼ **Blending Theory and Discourse ◆ This analysis of language comprehension into four levels of processing is for convenience of exposition; it does not necessarily mean that we process language in a strictly serial manner
• Basic database terminology and concepts • Security requirements for databases • Implementing access controls in databases • Protecting sensitive data • Data mining and big data
• Define computer security as well as basic computer security terms • Introduce the C-I-A Triad • Introduce basic access control terminology • Explain basic threats, vulnerabilities, and attacks • Show how controls map to threats