6.858 Computer Systems Security is a class about the design and implementation …
6.858 Computer Systems Security is a class about the design and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and techniques for achieving security, based on recent research papers. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware security, and security in web applications.
The goal of this course is to review grammar and develop vocabulary …
The goal of this course is to review grammar and develop vocabulary building strategies to refine oral and written expression. Speaking and writing assignments are designed to expand communicative competence. Assignments are based on models and materials drawn from contemporary media (newspapers and magazines, television, Web). The models, materials, topics and assignments vary from semester to semester.
In virtually every industry and every firm, information technology is driving change, …
In virtually every industry and every firm, information technology is driving change, creating opportunities and challenges. Leaders who don’t understand at least the fundamentals of information systems will be at a strategic disadvantage. This course provides broad coverage of technology concepts and trends underlying current and future developments in information technology, and fundamental principles for the effective use of computer-based information systems. There will be a special emphasis on manufacturing. Information Systems topics that will be covered include networks and distributed computing, including the World Wide Web, hardware and operating systems, software development tools and processes, relational databases, security and cryptography, enterprise applications, B2B, the semantic web and electronic commerce. Sloan LFM students with an interest in Information Systems are encouraged to register for this course.
The strategic importance of information technology is now widely accepted. It has …
The strategic importance of information technology is now widely accepted. It has also become increasingly clear that the identification of strategic applications alone does not result in success for an organization. A careful coordination of strategic applications, information technologies, and organizational structures must be made to attain success. This course addresses strategic, technological, and organizational connectivity issues to support effective and meaningful integration of information and systems. This course is especially relevant to those who wish to effectively exploit information technology and create new business processes and opportunities.
6.171 is a course for students who already have some programming and software …
6.171 is a course for students who already have some programming and software engineering experience. The goal is to give students some experience in dealing with those challenges that are unique to Internet applications, such as:
concurrency; unpredictable load; security risks; opportunity for wide-area distributed computing; creating a reliable and stateful user experience on top of unreliable connections and stateless protocols; extreme requirements and absurd development schedules; requirements that change mid-way through a project, sometimes because of experience gained from testing with users; user demands for a multi-modal interface.
This course on software engineering covers design and implementation of medium-scale software …
This course on software engineering covers design and implementation of medium-scale software systems, using web applications as a platform. In the course, students learn the fundamentals of structuring a web application and writing modular code, with an emphasis on conceptual design to achieve clarity, simplicity, and modularity. Topics also include functional programming, relational databases, and security.
Think Python is an introduction to Python programming for beginners. It starts …
Think Python is an introduction to Python programming for beginners. It starts with basic concepts of programming, and is carefully designed to define all terms when they are first used and to develop each new concept in a logical progression. Larger pieces, like recursion and object-oriented programming are divided into a sequence of smaller steps and introduced over the course of several chapters.
This resource contains the 7 units that are inside of quarter 1 …
This resource contains the 7 units that are inside of quarter 1 of my Web Development I course at Mountain Heights Academy. This course was written to align Utah's Web Development I Standards (quarters 3 and 4 have not been written yet). Each unit provided takes up about a week. At the end of each unit, I assess my students with an assignment (provided) and quiz (not provided). At the end of the quarter, I assess my students with a midterm exam (not provided). In the first week of my course, I go over my syllabus and other class procedures.
Diversity begets creativity—in this seminar we tap the amazing power of swarm …
Diversity begets creativity—in this seminar we tap the amazing power of swarm creativity on the Web by studying and working together as Collaborative Innovation Networks (COINs). As interdisciplinary teams of MIT management, SCAD design, University of Cologne informatics, and Aalto University software engineering students we will explore how to discover latest trends on the Web, and how to make them succeed in online social networks. We study a wide range of methods for predictive analytics (coolhunting) and online social marketing (coolfarming), mostly based on social network analysis and the emerging science of collaboration. Students will also learn to use our own unique MIT-developed Condor tool for Web mining, social network analysis, and trend prediction.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.