In Software We Trust. Really?

From the course by University of Colorado System
Design and Analyze Secure Networked Systems
53 ratings
University of Colorado System
53 ratings
Course 1 of 4 in the Specialization Fundamentals of Computer Network Security
From the lesson
Protect Data Access and Verify Source of Trust

Meet the Instructors

  • Edward Chow
    Edward Chow
    Computer Science

Explore our Catalog

Join for free and get personalized recommendations, updates and offers.