General
About CSC
Organisation

People
Process for CSC hosting
School Models
Role of Local Organisers
Other Roles

Participants
Past Schools

2004 2005 2006 2007 2008 2009 2010 2011

Diploma at CSC
Sport at CSC
Inverted CSCs

iCSC05 iCSC06 iCSC08 iCSC10 iCSC11

Special schools

School@chep06


Inverted School 2011

3-4 March 2011


CSC2011

 

CSC2011 Overview

Practical Information
Programme
Schedule
Lecturers
Participants
Organizers

 
Examination results
How to apply
 
CSC-Live

inverted CERN School of Computing 2011 3-4 March 2011, CERN

Programme Overview

 

All questions

Virtualization and Clouds

Computer Security

Hot Topics in Software Engineering Details of All Lectures

Schedule

Lecturers

Lecturer Bios

 

Mentors

Printable Version

Questions
  • Are modern encryption systems really secure?

  • What lessons after 2000 years of encryption?

  • Ever wondered how asymmetric ciphers work?

  • How can you keep your secrets?

All the answers at  iCSC Lecture 4: Understanding Cryptography: From Caesar to Public-Key

 

iCSC
 
New Handouts
All on iCSCs
News
Registration
Handouts
Programme
Schedule
All questions

Virtualization and Clouds

Lecture1

Lecture2

Lecture3

All theme lectures

Computer Security

Lecture4

Hot Topics in Software Engineering

Lecture5

Lecture6

All theme lectures

 
All iCSC Lectures
 
FAQ
 
Social event
   

Feedback: Computing (dot) School (at) cern (dot) ch
Last update: Monday, 18. June 2012 09:43

Copyright CERN