Unformatted text preview:

Data and Applications Security Developments and DirectionsReviewSlide 3Data and Applications Security Developments and DirectionsDr. Bhavani ThuraisinghamThe University of Texas at DallasReview for Exam #2May 4. 2009ReviewPart VIII: Data Warehousing, Data Mining and Security-Unit #21: Secure Data Warehousing (Lecture 17)-Unit #22: Data Mining for Security Applications (Lecture 18)-Unit #23: Privacy (Lecture 19)Part IX: Secure Information Management-Unit #24: Secure Digital Libraries (Lecture 25)-Unit #25: Secure Semantic Web (web services, XML security)Lectures 20, 22, 23 (3 questions)-Unit #26: Secure Information and Knowledge Management(Lecture 25)ReviewPart X: Emerging Technologies-Unit #27: Secure Dependable Data Management (Lecture 28)-Unit #28: Secure Sensor and Wireless Data Management (Lecture 28)-Unit #29: Other Emerging Technologies (Lecture 21, 30) – 1 questionDigital Forensics, Biometrics etc. -Extra Topics (Lecture 27, 31) – 1 questionGeospatial, Social networkUnit #30 Conclusion to the CourseGuest Lectures (1 extra credit question – 12 points total)-Lectures will be posted by 5pm May 5, 2009-Geospatial security (Lecture 16), Botnet (Lecture 24), Hadoop (Lecture


View Full Document

UTD CS 6V81 - CS 6V81 Review for Exam 2

Documents in this Course
Botnets

Botnets

33 pages

Privacy

Privacy

27 pages

Privacy

Privacy

27 pages

Load more
Download CS 6V81 Review for Exam 2
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view CS 6V81 Review for Exam 2 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view CS 6V81 Review for Exam 2 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?