Coordinator:
Francois Fluckiger CERN |
|
"iCSC, Where student turn into teachers", the inverted CSC, is a novel idea prototyped in 2005. iCSC2005 was a three-day series of lectures, organized and delivered by selected students of the previous CERN School of Computing (CSC2004), but where the students went one step further, combining their skills and elaborating on CSC related subjects. iCSC2005 took place the 23-25 February 200 at CERN six months after the previous CSC. CSC2004 students made proposals via an electronic discussion forum. CSC organizers selected the best proposals and appointed their authors as theme coordinators. From this point on, they were on their own to design the content and invite other lecturers, all former CSC students. As a result of the process, the three-day iCSC2005 programme consisted of 16 hours of tuition delivered by 11 young lecturers. Two of them have been invited as special lecturers at CSC2005. They will team database fundamental and advanced features, as well as methods for creating secure software. |
Type |
Series |
Lecture |
Description |
Lecturer |
|
||||
Lectures |
Data Bases |
Lecture 1 |
An introduction to databases, database design and Structured Query Language (SQL)
The objective of the lecture is to briefly introduce the
notion of a database system and then to give a practical
overview of the process of designing a database schema –
starting from the raw data, passing through the conceptual
(entity-relationship model) and logical (relational model)
design and ending up with a database model ready to be
implemented. |
|
Lecture 2 |
Advanced database features This lecture will give an overview of what can be done in order to improve the performance of big databases (index-organized tables, partitioning, materialized views, etc.) and certain features for protecting the data when working in a multi-user environment in a database. The lecture will also show how to put more logic into the database layer and make the database ‘smarter’ by capturing database events through triggers or adding programming logic to the execution of SQL commands - PL/SQL functions, procedures, etc. The lecture is heavily based on the Oracle database management system implementation of all these features. |
|||
|
||||
Lectures |
Creating
Secure Software |
Lecture 1 |
Creating Secure Software
Computer security has been an increasing concern for IT
professionals for a number of years, yet despite all the
efforts, computer systems and networks remain highly
vulnerable to attacks of different kinds. Design flaws and
security bugs in the underlying software are among the main
reasons for this. |