|
 |
|
|
CSC2005
Special Lectures by iCSC2005 lecturers
Coordinator:
Francois Fluckiger CERN
|
|
"iCSC, Where student turn
into teachers",
the inverted CSC, is a novel idea prototyped in 2005.
iCSC2005
was a
three-day series
of lectures, organized and delivered by selected students of the
previous CERN School of Computing (CSC2004), but where the students
went one step further, combining their skills and elaborating on CSC
related subjects. iCSC2005
took place
the 23-25 February 200 at CERN
six
months after the previous CSC.
CSC2004 students made proposals via an
electronic discussion forum. CSC organizers selected
the best proposals and appointed their authors as
theme coordinators. From this point on, they were on their
own to design the content and invite other lecturers, all former
CSC students.
As a result of the process, the three-day iCSC2005
programme consisted of
16 hours of tuition delivered by
11 young lecturers. Two of them have been invited as special
lecturers at CSC2005. They will team database fundamental and
advanced features, as well as methods for creating secure
software. |
Overview
Type |
Series |
Lecture |
Description |
Lecturer |
|
|
|
|
|
Lectures
|
Data Bases |
Lecture 1 |
An
introduction to databases, database design and Structured
Query Language (SQL)
The objective of the lecture is to briefly introduce the
notion of a database system and then to give a practical
overview of the process of designing a database schema –
starting from the raw data, passing through the conceptual
(entity-relationship model) and logical (relational model)
design and ending up with a database model ready to be
implemented.
The participants will become acquainted with the Structured
Query Language (SQL) as means to interact with the database
and with the Data Definition Language (DDL), Data
Manipulation Language (DML), and Data Control Language (DCL)
as part of SQL.
|
Zornitsa Zaharieva
|
Lecture 2 |
Advanced database features
This lecture will give an overview of what can be done in
order to improve the performance of big databases
(index-organized tables, partitioning, materialized views,
etc.) and certain features for protecting the data when
working in a multi-user environment in a database. The
lecture will also show how to put more logic into the
database layer and make the database ‘smarter’ by capturing
database events through triggers or adding programming logic
to the execution of SQL commands - PL/SQL functions,
procedures, etc. The lecture is heavily based on the Oracle
database management system implementation of all these
features. |
Zornitsa Zaharieva
|
|
|
|
|
|
Lectures |
Creating
Secure Software
|
Lecture 1 |
Creating
Secure Software
Computer security has been an increasing concern for IT
professionals for a number of years, yet despite all the
efforts, computer systems and networks remain highly
vulnerable to attacks of different kinds. Design flaws and
security bugs in the underlying software are among the main
reasons for this.
This lecture addresses the following question: how to create
secure software? The lecture starts with a definition of
computer security and an explanation of why it is so
difficult to achieve. It then introduces the main security
principles (like least-privilege, or defense-in-depth) and
discusses security in different phases of the software
development cycle.
The emphasis is put on the implementation part: most common
pitfalls and security bugs are listed, followed by advice on
best practice for security development. The last part of the
lecture covers some miscellaneous issues like rules for
networking applications, and social engineering threats.
|
Sebastian Lopienski |
|
|