Difference between revisions of "Biological Approaches to Computer Security: Winter 2012"
Jump to navigation
Jump to search
m (→Readings) |
|||
Line 58: | Line 58: | ||
</td> | </td> | ||
</tr> | </tr> | ||
<tr> | |||
<td> | |||
<p>Jan. 18,20 | |||
</p> | |||
</td> | |||
<td> | |||
<p>Evolution | |||
</p> | |||
</td> | |||
<td> | |||
<p>Darwin, [http://www.gutenberg.org/ebooks/2009 The Origin of Species, 6th Ed.], 2 Chapters assigned, and Conclusion | |||
</p> | |||
</td> | |||
<td> | |||
<p>[[BioSec: Evolution|Evolution Notes]] | |||
</p> | |||
</td> | |||
</tr> | |||
</table> | </table> | ||
Revision as of 13:48, 18 January 2012
This is the main page for the Winter 2012 run of Carleton University's Biological Approaches to Computer Security (COMP 5900X). The instructor for this course is Anil Somayaji.
Course Outline
The course outline for this course can be found here.
Readings
Week |
Topics |
Readings |
Notes |
---|---|---|---|
Jan. 4, 6 |
Introduction |
Tom Ray, Tierra (1992) |
|
Jan. 11,13 |
Evolution |
Darwin, The Origin of Species, 6th Ed., Chapter 1 |
|
Jan. 18,20 |
Evolution |
Darwin, The Origin of Species, 6th Ed., 2 Chapters assigned, and Conclusion |
Discussion Notes
Course Discussion Notes A place for things where you don't know where to put them yet