Goldsmiths, University of London (GUL)
Latest uploads at Goldsmiths, University of London (GUL). Looking for notes at Goldsmiths, University of London (GUL)? We have lots of notes, study guides and study notes available for your school.
-
63
-
2
-
4
Majors at Goldsmiths, University of London (GUL)
Notes available for the following studies at Goldsmiths, University of London (GUL)
-
Accounting 1
-
Chemistry 1
-
Goldsmiths, University of London 13
-
History 1
-
Psychology 2
Latest content Goldsmiths, University of London (GUL)
This comprehensive study guide offers a complete breakdown of Hashing, starting with simple error-checking methods and progressing to the complex cryptographic functions that secure our digital world. The notes begin with the fundamentals, using parity checking as a basic example of error detection before defining a hash function as a computable function that maps an input of any size to a fixed-size output. A key concept explored is that of hash collisions and the famous "Birthday Problem,...
- Package deal
- Class notes
- • 8 pages's •
-
Goldsmiths, University of London•Computer Security
-
Introduction to Cryptography and Hashing• By milanamhy25
Preview 2 out of 8 pages
Getting your document ready...
This comprehensive study guide offers a complete breakdown of Hashing, starting with simple error-checking methods and progressing to the complex cryptographic functions that secure our digital world. The notes begin with the fundamentals, using parity checking as a basic example of error detection before defining a hash function as a computable function that maps an input of any size to a fixed-size output. A key concept explored is that of hash collisions and the famous "Birthday Problem,...
This comprehensive guide is structured to build your knowledge step-by-step. 
 
1. Introduction to RSA Public Key Cryptography 
Start with the core principles of asymmetric encryption and the geniuses behind the algorithm. 
- The RSA Algorithm: Named after its creators—Rivest, Shamir, and Adleman. 
- Public and Private Keys: Learn how RSA uses a public key (K) that is freely available and a private key (G) that is hidden. 
- One-Way Functions: Grasp the fundamental concept that makes RSA secur...
- Package deal
- Class notes
- • 8 pages's •
-
Goldsmiths, University of London•Computer Security
-
Introduction to Cryptography and Hashing• By milanamhy25
Preview 2 out of 8 pages
Getting your document ready...
This comprehensive guide is structured to build your knowledge step-by-step. 
 
1. Introduction to RSA Public Key Cryptography 
Start with the core principles of asymmetric encryption and the geniuses behind the algorithm. 
- The RSA Algorithm: Named after its creators—Rivest, Shamir, and Adleman. 
- Public and Private Keys: Learn how RSA uses a public key (K) that is freely available and a private key (G) that is hidden. 
- One-Way Functions: Grasp the fundamental concept that makes RSA secur...
This in-depth study guide on Understanding Cryptography is the perfect resource for any student of computer science, cybersecurity, or mathematics. 
 
From the simple ciphers of Julius Caesar to the advanced algorithms that protect our data today, these notes break down everything you need to know in an easy-to-understand format. Packed with historical context, detailed examples, and hands-on practice assignments, this guide will help you master the fundamentals and ace your exams.
- Package deal
- Class notes
- • 12 pages's •
-
Goldsmiths, University of London•Computer Security
-
Introduction to Cryptography and Hashing• By milanamhy25
Preview 2 out of 12 pages
Getting your document ready...
This in-depth study guide on Understanding Cryptography is the perfect resource for any student of computer science, cybersecurity, or mathematics. 
 
From the simple ciphers of Julius Caesar to the advanced algorithms that protect our data today, these notes break down everything you need to know in an easy-to-understand format. Packed with historical context, detailed examples, and hands-on practice assignments, this guide will help you master the fundamentals and ace your exams.
Topic 3: Operating System Security 
Dive into the heart of the computer to understand how to secure the operating system itself. 
 
OS Security Principles: 
- Understand OS security as the process of ensuring OS integrity, confidentiality, and availability. 
- Learn about key security components, including the Kernel, Reference Monitor, and the Trusted Computing Base (TCB). 
- Define Hardening: the process of making an OS more secure by removing unnecessary features and applying security configu...
- Package deal
- Class notes
- • 11 pages's •
-
Goldsmiths, University of London•Computer Security
-
Introduction to malware, network security and OS security• By milanamhy25
Preview 2 out of 11 pages
Getting your document ready...
Topic 3: Operating System Security 
Dive into the heart of the computer to understand how to secure the operating system itself. 
 
OS Security Principles: 
- Understand OS security as the process of ensuring OS integrity, confidentiality, and availability. 
- Learn about key security components, including the Kernel, Reference Monitor, and the Trusted Computing Base (TCB). 
- Define Hardening: the process of making an OS more secure by removing unnecessary features and applying security configu...
Topic 2: Network Security 
Build on the fundamentals by exploring how to protect networks from a wide array of attacks. 
 
Core Network Security: 
- Understand the main objectives of network security, revolving around Confidentiality, Integrity, and Availability. 
 
Denial of Service (DoS) Attacks: 
- Get a clear definition of a Denial of Service (DoS) attack, where legitimate users are prevented from accessing resources. 
- Learn how the attack surface extends across network layers, with exampl...
- Package deal
- Class notes
- • 11 pages's •
-
Goldsmiths, University of London•Computer Security
-
Introduction to malware, network security and OS security• By milanamhy25
Preview 2 out of 11 pages
Getting your document ready...
Topic 2: Network Security 
Build on the fundamentals by exploring how to protect networks from a wide array of attacks. 
 
Core Network Security: 
- Understand the main objectives of network security, revolving around Confidentiality, Integrity, and Availability. 
 
Denial of Service (DoS) Attacks: 
- Get a clear definition of a Denial of Service (DoS) attack, where legitimate users are prevented from accessing resources. 
- Learn how the attack surface extends across network layers, with exampl...
Are you studying computer science or cybersecurity and looking for a complete, well-structured, and easy-to-follow resource? These in-depth notes cover three essential topics: Introduction to Computer Security and malware 
 
Packed with detailed explanations, real-world examples, and integrated quizzes with correct answers, this guide is everything you need to solidify your understanding and prepare for your exams. 
 
What's Inside? 
Topic 1: Introduction to Computer Security and Malware 
- Thi...
- Package deal
- Class notes
- • 9 pages's •
-
Goldsmiths, University of London•Computer Security
-
Introduction to malware, network security and OS security• By milanamhy25
Preview 2 out of 9 pages
Getting your document ready...
Are you studying computer science or cybersecurity and looking for a complete, well-structured, and easy-to-follow resource? These in-depth notes cover three essential topics: Introduction to Computer Security and malware 
 
Packed with detailed explanations, real-world examples, and integrated quizzes with correct answers, this guide is everything you need to solidify your understanding and prepare for your exams. 
 
What's Inside? 
Topic 1: Introduction to Computer Security and Malware 
- Thi...
These notes summarise Week 20 of PS51005B: Psychology of the Person, covering the psychology of compliance and obedience. The lecture explores Cialdini’s six principles of compliance and Milgram’s obedience experiments, along with situational and dispositional factors influencing behaviour. 
 
 Topics covered: 
	•	Cialdini’s six principles of compliance: reciprocity, authority, scarcity, social validation, commitment, liking 
	•	Milgram’s obedience study: procedure, results, predicti...
- Package deal
- Class notes
- • 3 pages's •
-
Goldsmiths, University of London•Psychology of the Person
-
PS51005B Full Module Notes Bundle (Weeks 1–20, Goldsmiths BSc Psychology)• By hannah-warren
Preview 1 out of 3 pages
Getting your document ready...
These notes summarise Week 20 of PS51005B: Psychology of the Person, covering the psychology of compliance and obedience. The lecture explores Cialdini’s six principles of compliance and Milgram’s obedience experiments, along with situational and dispositional factors influencing behaviour. 
 
 Topics covered: 
	•	Cialdini’s six principles of compliance: reciprocity, authority, scarcity, social validation, commitment, liking 
	•	Milgram’s obedience study: procedure, results, predicti...
These notes summarise Week 19 of PS51005B: Psychology of the Person, focusing on the psychological processes behind majority and minority influence. Includes core models and studies on conformity, innovation, and social change. 
 
 Topics covered: 
	•	Definitions and differences between majority and minority influence 
	•	Key study: Moscovici’s blue-green slide experiment 
	•	Hogg & Vaughan’s three influence modalities: conformity, normalisation, innovation 
	•	Theoretical models: 
	...
- Package deal
- Class notes
- • 2 pages's •
-
Goldsmiths, University of London•Psychology of the Person
-
PS51005B Full Module Notes Bundle (Weeks 1–20, Goldsmiths BSc Psychology)• By hannah-warren
Preview 1 out of 2 pages
Getting your document ready...
These notes summarise Week 19 of PS51005B: Psychology of the Person, focusing on the psychological processes behind majority and minority influence. Includes core models and studies on conformity, innovation, and social change. 
 
 Topics covered: 
	•	Definitions and differences between majority and minority influence 
	•	Key study: Moscovici’s blue-green slide experiment 
	•	Hogg & Vaughan’s three influence modalities: conformity, normalisation, innovation 
	•	Theoretical models: 
	...
- Package deal
- Class notes
- • 3 pages's •
-
Goldsmiths, University of London•Psychology of the Person
-
PS51005B Full Module Notes Bundle (Weeks 1–20, Goldsmiths BSc Psychology)• By hannah-warren
Preview 1 out of 3 pages
Getting your document ready...
These notes summarise Week 17 of PS51005B: Psychology of the Person, focusing on the psychology of leadership in group settings. The lecture examines traits, styles, and major theories of leadership including transformational, contingency, and identity-based models. 
 
 Topics covered: 
	•	What defines a leader (Hogg & Vaughan, Crisp & Turner) 
	•	Personality traits linked to leadership (Judge et al., 2002) 
	•	Situational influences and cross-cultural leadership 
	•	Autocratic, democrat...
- Package deal
- Class notes
- • 3 pages's •
-
Goldsmiths, University of London•Psychology of the Person
-
PS51005B Full Module Notes Bundle (Weeks 1–20, Goldsmiths BSc Psychology)• By hannah-warren
Preview 1 out of 3 pages
Getting your document ready...
These notes summarise Week 17 of PS51005B: Psychology of the Person, focusing on the psychology of leadership in group settings. The lecture examines traits, styles, and major theories of leadership including transformational, contingency, and identity-based models. 
 
 Topics covered: 
	•	What defines a leader (Hogg & Vaughan, Crisp & Turner) 
	•	Personality traits linked to leadership (Judge et al., 2002) 
	•	Situational influences and cross-cultural leadership 
	•	Autocratic, democrat...