E.g., Sunday, September 21, 2014
E.g., Sunday, September 21, 2014
E.g., Sunday, September 21, 2014
Jan 5th 2015

Learn about the inner workings of cryptographic primitives and protocols and how to apply this knowledge in real-world applications.

0
No votes yet
To Be Announced

A lo largo de este curso vamos a estudiar desde cero el fenómeno de las redes sociales, profundizando en las Comunidades virtuales y los nuevos roles como el de Community Manager o el de curador de contenidos.

0
No votes yet
Oct 27th 2014

Die Enthüllungen durch Edward Snowden haben noch einmal verdeutlicht, dass Sicherheit im Internet ein wichtiges Thema ist. Internetnutzer sind sich eher der vielfältigen Möglichkeiten bewusst, die das Internet bietet, weniger jedoch seiner potentiellen Gefahren. Dieser openHPI-Kurs führt in die Grundbegriffe der Internetsicherheit ein: Hier lernen Sie nicht nur, was formelle Sicherheitsziele sind sondern auch, warum das Internet von seinem Grunddesign unsicher ist, was die häufigsten Schwachstellen sind und wie diese ausgenutzt werden können und schließlich auch, wie Sie sich schützen können.

0
No votes yet
Oct 14th 2014

Learn how police and intelligence agencies can access your data, and how the law (might) protect you! Hackers, attorneys, and concerned citizens are all welcome.

0
No votes yet
Oct 13th 2014

Our lives depend on online services. Gain essential cyber security knowledge and skills, to help protect your digital life.

0
No votes yet
Oct 6th 2014

In this course, you'll learn what every citizen should know about the security risks--and future potential — of electronic voting and Internet voting.

0
No votes yet
Sep 30th 2014

Learn everything you need to know to administer a MongoDB installation in production.

8
Average: 8 (1 vote)
Sep 30th 2014

This is an advanced course for operations staff and others interested in administering MongoDB deployments. It is a deeper dive into many of the topics of M102: MongoDB for DBAs and several additional subjects.

0
No votes yet
Sep 29th 2014

This class teaches algorithms for extracting models and other information from very large amounts of data. The emphasis is on techniques that are efficient and that scale well.

0
No votes yet
Sep 29th 2014

Se conocerán los distintos sistemas de georreferenciación/navegación aplicados a dispositivos móviles, la estructura de los Sistemas de Información Geográfica (SIG) y su aplicabilidad a la gestión del territorio y se describirán los sistemas de comunicación existentes (GPRS/UMTS, internet), con el objeto de analizar las aplicaciones a la ingeniería y la gestión del territorio que proporciona la integración de estos tres sistemas en los dispositivos móviles. Asimismo, se describirán los principales software de navegación y gestión de la información (SIG) existentes en el mercado para dispositivos móviles. Por último, se realizara una valoración de las distintas aplicaciones que pueden proporcionar los dispositivos móviles para la gestión del territorio, para la ingeniería, geografía, geología, ciencias medio ambientales…

0
No votes yet
Sep 23rd 2014

This course introduces concepts, algorithms, programming, theory and design of spatial computing technologies such as global positioning systems (GPS), Google Maps, location-based services and geographic information systems. Learn how to collect, analyze, and visualize your own spatial datasets while avoiding common pitfalls and building better location-aware technologies.

0
No votes yet
Sep 22nd 2014

This course provides an overview of the evolving field of cybersecurity, with an introduction to cybersecurity standards and law.

3
Average: 3 (2 votes)
Sep 20th 2014

学习运用计算思维分析社会学、经济学问题的方法,加深对某些生活现象的理解,体会计算与社会科学的互动。| Learn to analyze and reason about problems in social sciences with computational thinking.

0
No votes yet
Sep 20th 2014

In this course, you will learn to design the computer architecture of complex modern microprocessors.

10
Average: 10 (1 vote)
Sep 15th 2014

从操作系统与虚拟化平台面临的安全问题和应该采取的安全机制入手,帮助你学习和掌握计算机系统安全的基本理论、技术、方法和评测标准。Learn about operating systems, virtualization security issues, and related security theories, technologies, methods and evaluation criteria, as well as gain a deeper understanding of computer systems security.

0
No votes yet
Sep 15th 2014

本课程重点讲述计算机的内部结构和工作原理,着眼于软件和硬件的衔接互动,注重基本概念和真实系统的对应。

0
No votes yet

Pages

 

Tell your friends: