Biological Approaches to Computer Security: Winter 2012: Difference between revisions
No edit summary |
|||
(One intermediate revision by the same user not shown) | |||
Line 115: | Line 115: | ||
* [[BioSec 2012: Luc|Luc]] | * [[BioSec 2012: Luc|Luc]] | ||
* [[BioSec 2012: Mohammad|Mohammad]] | * [[BioSec 2012: Mohammad|Mohammad]] | ||
==Consolidated Notes== | |||
The notes for the whole class, consolidated, condensed, and edited are [[BioSec 2012: Consolidated Notes|here]]. Students in the class - please go ahead and add to it! |
Latest revision as of 16:11, 30 April 2012
This is the main page for the Winter 2012 run of Carleton University's Biological Approaches to Computer Security (COMP 5900X). The instructor for this course is Anil Somayaji.
Course Outline
The course outline for this course can be found here.
Readings
Week |
Topics |
Readings |
Notes |
---|---|---|---|
Jan. 4, 6 |
Introduction |
Tom Ray, Tierra (1992) |
|
Jan. 11,13 |
Evolution |
Darwin, The Origin of Species, 6th Ed., Chapter 1 |
|
Jan. 18,20 |
Evolution |
Darwin, The Origin of Species, 6th Ed., 2 Chapters assigned, and Conclusion |
|
Jan. 25,27 |
Unit 1: Setting the Stage |
Reading from Textbook: Biology: Exploring the Diversity of Life |
Other readings:
Discussion Notes
Course Discussion Notes A place for things where you don't know where to put them yet [Last updated on 20:19, 21 November 2024 (UTC)]
Discussion Notes from March 23 Class
Individual Notes
Consolidated Notes
The notes for the whole class, consolidated, condensed, and edited are here. Students in the class - please go ahead and add to it!