2IMS25 - Principles of Data Protection

.
└── notes
    ├── Homework discretionary access control.pdf
    ├── Homework lecture 11 → 12.pdf
    ├── Homework lecture 12 → 13.pdf
    ├── Homework lecture 13 → 14.pdf
    ├── Homework MAC.pdf
    ├── Ideas on low watermark.pdf
    ├── Lecture 10.pdf
    ├── Lecture 11.pdf
    ├── Lecture 12.pdf
    ├── Lecture 13 - exercise.pdf
    ├── Lecture 13.pdf
    ├── Lecture 14 - exercise.pdf
    ├── Lecture 14.pdf
    ├── Lecture 15 - exercise.pdf
    ├── Lecture 15.pdf
    ├── Lecture 1.pdf
    ├── Lecture 2.pdf
    ├── Lecture 3.pdf
    ├── Lecture 4.pdf
    ├── Lecture 5.pdf
    ├── Lecture 6.pdf
    ├── Lecture 7.pdf
    └── Lecture 9.pdf


1 directory, 23 files


tree v1.8.0 © 1996 - 2018 by Steve Baker and Thomas Moore
HTML output hacked and copyleft © 1998 by Francesc Rocher
JSON output hacked and copyleft © 2014 by Florian Sesser
Charsets / OS/2 support © 2001 by Kyosuke Tokoro