Slide 57
Slide 57 text
Beyond this lecture
15-349 Introduction to Computer and Network Security
• symmetric and asymmetric crypto-systems
• the TLS protocol
• network and host-based threat, vulnerabilities, attacks
and counter-measures
15-437 Web Application Development
• the HTTP protocol
• how to deploy your web application over HTTPS
• web-based threats, vulnerabilities, attacks and counter-measures