Goldsmiths, University of London (GUL)
Meest recente samenvattingen op de Goldsmiths, University of London (GUL). Op zoek naar een samenvatting op de Goldsmiths, University of London (GUL)? Wij hebben diverse samenvattingen voor jouw school of universiteit.
-
63
-
2
-
4
Studies op de Goldsmiths, University of London (GUL)
Er zijn samenvattingen beschikbaar voor de volgende opleidingen op Goldsmiths, University of London (GUL)
-
Accounting 1
-
Chemistry 1
-
Goldsmiths, University of London 13
-
History 1
-
Psychology 2
Laatste content Goldsmiths, University of London (GUL)
This comprehensive study guide offers a complete breakdown of Hashing, starting with simple error-checking methods and progressing to the complex cryptographic functions that secure our digital world. The notes begin with the fundamentals, using parity checking as a basic example of error detection before defining a hash function as a computable function that maps an input of any size to a fixed-size output. A key concept explored is that of hash collisions and the famous "Birthday Problem,...
- Voordeelbundel
- College aantekeningen
- • 8 pagina's's •
-
Goldsmiths, University of London•Computer Security
-
Introduction to Cryptography and Hashing• Door milanamhy25
Voorbeeld 2 van de 8 pagina's
Document laden...
This comprehensive study guide offers a complete breakdown of Hashing, starting with simple error-checking methods and progressing to the complex cryptographic functions that secure our digital world. The notes begin with the fundamentals, using parity checking as a basic example of error detection before defining a hash function as a computable function that maps an input of any size to a fixed-size output. A key concept explored is that of hash collisions and the famous "Birthday Problem,...
This comprehensive guide is structured to build your knowledge step-by-step. 
 
1. Introduction to RSA Public Key Cryptography 
Start with the core principles of asymmetric encryption and the geniuses behind the algorithm. 
- The RSA Algorithm: Named after its creators—Rivest, Shamir, and Adleman. 
- Public and Private Keys: Learn how RSA uses a public key (K) that is freely available and a private key (G) that is hidden. 
- One-Way Functions: Grasp the fundamental concept that makes RSA secur...
- Voordeelbundel
- College aantekeningen
- • 8 pagina's's •
-
Goldsmiths, University of London•Computer Security
-
Introduction to Cryptography and Hashing• Door milanamhy25
Voorbeeld 2 van de 8 pagina's
Document laden...
This comprehensive guide is structured to build your knowledge step-by-step. 
 
1. Introduction to RSA Public Key Cryptography 
Start with the core principles of asymmetric encryption and the geniuses behind the algorithm. 
- The RSA Algorithm: Named after its creators—Rivest, Shamir, and Adleman. 
- Public and Private Keys: Learn how RSA uses a public key (K) that is freely available and a private key (G) that is hidden. 
- One-Way Functions: Grasp the fundamental concept that makes RSA secur...
This in-depth study guide on Understanding Cryptography is the perfect resource for any student of computer science, cybersecurity, or mathematics. 
 
From the simple ciphers of Julius Caesar to the advanced algorithms that protect our data today, these notes break down everything you need to know in an easy-to-understand format. Packed with historical context, detailed examples, and hands-on practice assignments, this guide will help you master the fundamentals and ace your exams.
- Voordeelbundel
- College aantekeningen
- • 12 pagina's's •
-
Goldsmiths, University of London•Computer Security
-
Introduction to Cryptography and Hashing• Door milanamhy25
Voorbeeld 2 van de 12 pagina's
Document laden...
This in-depth study guide on Understanding Cryptography is the perfect resource for any student of computer science, cybersecurity, or mathematics. 
 
From the simple ciphers of Julius Caesar to the advanced algorithms that protect our data today, these notes break down everything you need to know in an easy-to-understand format. Packed with historical context, detailed examples, and hands-on practice assignments, this guide will help you master the fundamentals and ace your exams.
Topic 3: Operating System Security 
Dive into the heart of the computer to understand how to secure the operating system itself. 
 
OS Security Principles: 
- Understand OS security as the process of ensuring OS integrity, confidentiality, and availability. 
- Learn about key security components, including the Kernel, Reference Monitor, and the Trusted Computing Base (TCB). 
- Define Hardening: the process of making an OS more secure by removing unnecessary features and applying security configu...
- Voordeelbundel
- College aantekeningen
- • 11 pagina's's •
-
Goldsmiths, University of London•Computer Security
-
Introduction to malware, network security and OS security• Door milanamhy25
Voorbeeld 2 van de 11 pagina's
Document laden...
Topic 3: Operating System Security 
Dive into the heart of the computer to understand how to secure the operating system itself. 
 
OS Security Principles: 
- Understand OS security as the process of ensuring OS integrity, confidentiality, and availability. 
- Learn about key security components, including the Kernel, Reference Monitor, and the Trusted Computing Base (TCB). 
- Define Hardening: the process of making an OS more secure by removing unnecessary features and applying security configu...
Topic 2: Network Security 
Build on the fundamentals by exploring how to protect networks from a wide array of attacks. 
 
Core Network Security: 
- Understand the main objectives of network security, revolving around Confidentiality, Integrity, and Availability. 
 
Denial of Service (DoS) Attacks: 
- Get a clear definition of a Denial of Service (DoS) attack, where legitimate users are prevented from accessing resources. 
- Learn how the attack surface extends across network layers, with exampl...
- Voordeelbundel
- College aantekeningen
- • 11 pagina's's •
-
Goldsmiths, University of London•Computer Security
-
Introduction to malware, network security and OS security• Door milanamhy25
Voorbeeld 2 van de 11 pagina's
Document laden...
Topic 2: Network Security 
Build on the fundamentals by exploring how to protect networks from a wide array of attacks. 
 
Core Network Security: 
- Understand the main objectives of network security, revolving around Confidentiality, Integrity, and Availability. 
 
Denial of Service (DoS) Attacks: 
- Get a clear definition of a Denial of Service (DoS) attack, where legitimate users are prevented from accessing resources. 
- Learn how the attack surface extends across network layers, with exampl...
Are you studying computer science or cybersecurity and looking for a complete, well-structured, and easy-to-follow resource? These in-depth notes cover three essential topics: Introduction to Computer Security and malware 
 
Packed with detailed explanations, real-world examples, and integrated quizzes with correct answers, this guide is everything you need to solidify your understanding and prepare for your exams. 
 
What's Inside? 
Topic 1: Introduction to Computer Security and Malware 
- Thi...
- Voordeelbundel
- College aantekeningen
- • 9 pagina's's •
-
Goldsmiths, University of London•Computer Security
-
Introduction to malware, network security and OS security• Door milanamhy25
Voorbeeld 2 van de 9 pagina's
Document laden...
Are you studying computer science or cybersecurity and looking for a complete, well-structured, and easy-to-follow resource? These in-depth notes cover three essential topics: Introduction to Computer Security and malware 
 
Packed with detailed explanations, real-world examples, and integrated quizzes with correct answers, this guide is everything you need to solidify your understanding and prepare for your exams. 
 
What's Inside? 
Topic 1: Introduction to Computer Security and Malware 
- Thi...
These notes summarise Week 20 of PS51005B: Psychology of the Person, covering the psychology of compliance and obedience. The lecture explores Cialdini’s six principles of compliance and Milgram’s obedience experiments, along with situational and dispositional factors influencing behaviour. 
 
 Topics covered: 
	•	Cialdini’s six principles of compliance: reciprocity, authority, scarcity, social validation, commitment, liking 
	•	Milgram’s obedience study: procedure, results, predicti...
- Voordeelbundel
- College aantekeningen
- • 3 pagina's's •
-
Goldsmiths, University of London•Psychology of the Person
-
PS51005B Full Module Notes Bundle (Weeks 1–20, Goldsmiths BSc Psychology)• Door hannah-warren
Voorbeeld 1 van de 3 pagina's
Document laden...
These notes summarise Week 20 of PS51005B: Psychology of the Person, covering the psychology of compliance and obedience. The lecture explores Cialdini’s six principles of compliance and Milgram’s obedience experiments, along with situational and dispositional factors influencing behaviour. 
 
 Topics covered: 
	•	Cialdini’s six principles of compliance: reciprocity, authority, scarcity, social validation, commitment, liking 
	•	Milgram’s obedience study: procedure, results, predicti...
These notes summarise Week 19 of PS51005B: Psychology of the Person, focusing on the psychological processes behind majority and minority influence. Includes core models and studies on conformity, innovation, and social change. 
 
 Topics covered: 
	•	Definitions and differences between majority and minority influence 
	•	Key study: Moscovici’s blue-green slide experiment 
	•	Hogg & Vaughan’s three influence modalities: conformity, normalisation, innovation 
	•	Theoretical models: 
	...
- Voordeelbundel
- College aantekeningen
- • 2 pagina's's •
-
Goldsmiths, University of London•Psychology of the Person
-
PS51005B Full Module Notes Bundle (Weeks 1–20, Goldsmiths BSc Psychology)• Door hannah-warren
Voorbeeld 1 van de 2 pagina's
Document laden...
These notes summarise Week 19 of PS51005B: Psychology of the Person, focusing on the psychological processes behind majority and minority influence. Includes core models and studies on conformity, innovation, and social change. 
 
 Topics covered: 
	•	Definitions and differences between majority and minority influence 
	•	Key study: Moscovici’s blue-green slide experiment 
	•	Hogg & Vaughan’s three influence modalities: conformity, normalisation, innovation 
	•	Theoretical models: 
	...
- Voordeelbundel
- College aantekeningen
- • 3 pagina's's •
-
Goldsmiths, University of London•Psychology of the Person
-
PS51005B Full Module Notes Bundle (Weeks 1–20, Goldsmiths BSc Psychology)• Door hannah-warren
Voorbeeld 1 van de 3 pagina's
Document laden...
These notes summarise Week 17 of PS51005B: Psychology of the Person, focusing on the psychology of leadership in group settings. The lecture examines traits, styles, and major theories of leadership including transformational, contingency, and identity-based models. 
 
 Topics covered: 
	•	What defines a leader (Hogg & Vaughan, Crisp & Turner) 
	•	Personality traits linked to leadership (Judge et al., 2002) 
	•	Situational influences and cross-cultural leadership 
	•	Autocratic, democrat...
- Voordeelbundel
- College aantekeningen
- • 3 pagina's's •
-
Goldsmiths, University of London•Psychology of the Person
-
PS51005B Full Module Notes Bundle (Weeks 1–20, Goldsmiths BSc Psychology)• Door hannah-warren
Voorbeeld 1 van de 3 pagina's
Document laden...
These notes summarise Week 17 of PS51005B: Psychology of the Person, focusing on the psychology of leadership in group settings. The lecture examines traits, styles, and major theories of leadership including transformational, contingency, and identity-based models. 
 
 Topics covered: 
	•	What defines a leader (Hogg & Vaughan, Crisp & Turner) 
	•	Personality traits linked to leadership (Judge et al., 2002) 
	•	Situational influences and cross-cultural leadership 
	•	Autocratic, democrat...