LIS3353 - Technologies for Information Professionals

ATTENDANCE LINK - https://goo.gl/forms/dYhgClaMe6doKKw72

Welcome to the course! Note that the course is administered primarily at jrm4.com ( direct course link ) and secondarily through Canvas.

Most of the course, and anything suitable for public viewing will be at jrm4.com.

Canvas will be used for announcements and assignments, and that is all. Contacting me should only be done through regular email, at jmarks@fsu.edu (I have piloted Canvas Conversations and determined that it is not worth the trouble. Regular email is both required and more beneficial overall, so we will keep it simple and only use that.)

You don't need to do anything for the first day besides show up, the syllabus is below and the schedule will be discussed in class on the first day. See you then!

Syllabus
Calendar
Linux Install Info

Week 1 - Hardware
Week 2 - HURRICANE-CLASSES CANCELLED
Week 3 - From Numbers to Thinking
Week 4 - Operating Systems
Week 5 - Rise of FLOSS and Linux
Week 6 - The Internet

Week 7 - Algorithms and Milkshakes


./08 - LIS3353 - Milkshakes I - T1708.pdf
./09 - LIS3353 More Milkshakes-T1708.pdf

How Encryption Works
http://www.theguardian.com/technology/2013/sep/05/how-internet-encryption-works
http://computer.howstuffworks.com/encryption3.htm
https://en.wikipedia.org/wiki/Cryptographic_hash_function
http://www.pcworld.com/article/2905995/truecrypt-audit-shows-no-sign-of-nsa-backdoors-just-some-minor-glitches.html

How encryption fails
http://techreport.com/news/27946/report-cia-compromised-bitlocker-explored-attacking-apple-devices
http://www.tomsguide.com/us/truecrypt-may-be-compromised,news-18861.html

and fixed?
https://threatpost.com/veracrypt-patches-critical-vulnerabilities-uncovered-in-audit/121342/

Apple's Method
http://blog.cryptographyengineering.com/2014/10/why-cant-apple-decrypt-your-iphone.html

Hashing for Verification
http://www.howtogeek.com/67241/htg-explains-what-are-md5-sha-1-hashes-and-how-do-i-check-them/
https://tiptopsecurity.com/what-is-cryptographic-hashing-md5-sha-and-more/

Hashing for passwords
http://dustwell.com/how-to-handle-passwords-bcrypt.html

How Bitcoin Works
https://en.bitcoin.it/wiki/How_bitcoin_works
http://www.engadget.com/2015/01/21/cryptocurrency-explainer/



Backlinks: FSU Courses Home FSU Courses:LIS3353 FSU Courses:LIS3353:Syllabus