From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: 66ada5106f731677cd60fb71b54339ec2be117c870f812186326939edf35611e
Message ID: <199804101345.JAA24653@camel14.mindspring.com>
Reply To: N/A
UTC Datetime: 1998-04-10 13:45:11 UTC
Raw Date: Fri, 10 Apr 1998 06:45:11 -0700 (PDT)
From: John Young <jya@pipeline.com>
Date: Fri, 10 Apr 1998 06:45:11 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Denning 98
Message-ID: <199804101345.JAA24653@camel14.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain
Dorothy Denning's Spring 98 course schedule provides an informative
overview and recommended readings:
Information Warfare: Terrorism, Crime, National Security
http://guru.cosc.georgetown.edu/~denning/cosc511/spring98/schedule.html
The 1997 course was discussed here last year, along with criticism
of a parallel student web site on criminal use of encryption, as noted
by anonymous on UK Crypto:
http://infinity.nus.sg/cypherpunks/dir.97.07.10-97.07.16/msg00003.html
Return to April 1998
Return to “John Young <jya@pipeline.com>”