General
About CSC
Organisation

People
Process for CSC hosting
School Models
Role of Local Organisers
Other Roles

Participants
Past Schools

2004 2005 2006 2007 2008 2009 2010 2011

Diploma at CSC
Sport at CSC
Inverted CSCs

iCSC05 iCSC06 iCSC08 iCSC10 iCSC11

Special schools

School@chep06

Inverted School 2005

CSC 2005

CSC2005 Overview

Practical Information

Programme

Schedule

Lecturers

Participants

Organisers

 
Examination results
 
Grants from EU -FP6

Eligibility Conditions

Level of grant support

How to apply
CSC-Live
New  Lecture videos
New  Photo-Contest
New  Updated news
New  Social activities

CSC-Live

     

CERN School of Computing 2005 4 September - 17 September 2005 in Saint Malo, France

Programme Overview

Grid Track

Software Track

Physics Comp. Track

Schedule

Lecturers

Lecturer Bios

CSC-Live

 Printable Version  

CSC2005 Special Lectures by iCSC2005 lecturers

Coordinator:

Francois Fluckiger CERN
 

 

"iCSC, Where student turn into teachers", the inverted CSC,  is a novel idea prototyped in 2005.

iCSC2005 was a three-day series of lectures, organized and delivered by selected students of the previous CERN School of Computing (CSC2004), but where the students went one step further, combining their skills and elaborating on CSC related subjects. iCSC2005  took place the 23-25 February 200 at CERN six months after the previous CSC.

CSC2004 students made proposals via an electronic discussion forum. CSC organizers selected the best proposals and appointed their authors as theme coordinators. From this point on, they were on their own to design the content and invite other lecturers, all former CSC students.

As a result of the process, the three-day iCSC2005 programme consisted of 16 hours of tuition delivered by 11 young lecturers. Two of them have been invited as special lecturers at CSC2005. They will team database fundamental and advanced features, as well as methods for creating secure software.

Overview

Type

Series

Lecture

Description

Lecturer

     

 

 

Lectures

 

Data Bases

Lecture 1

An introduction to databases, database design and Structured Query Language (SQL)

The objective of the lecture is to briefly introduce the notion of a database system and then to give a practical overview of the process of designing a database schema – starting from the raw data, passing through the conceptual (entity-relationship model) and logical (relational model) design and ending up with a database model ready to be implemented.
The participants will become acquainted with the Structured Query Language (SQL) as means to interact with the database and with the Data Definition Language (DDL), Data Manipulation Language (DML), and Data Control Language (DCL) as part of SQL.
 

Zornitsa Zaharieva

Lecture 2

Advanced database features

This lecture will give an overview of what can be done in order to improve the performance of big databases (index-organized tables, partitioning, materialized views, etc.) and certain features for protecting the data when working in a multi-user environment in a database. The lecture will also show how to put more logic into the database layer and make the database ‘smarter’ by capturing database events through triggers or adding programming logic to the execution of SQL commands - PL/SQL functions, procedures, etc. The lecture is heavily based on the Oracle database management system implementation of all these features.

Zornitsa Zaharieva

     

 

 

Lectures

Creating Secure Software
 

Lecture 1

Creating Secure Software

Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this.

This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle.
The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like rules for networking applications, and social engineering threats.
 

Sebastian Lopienski

Feedback: Computing (dot) School (at) cern (dot) ch
Last update: Thursday, 14. November 2013 11:49

Copyright CERN