Digital Forensics

This course offers a broad introduction to the forensic investigation of digital devices. We cover the preservation, recovery, harvesting, and courtroom presentation of information from file systems, operating systems, networks, database systems applications, media files, and embedded systems. The primary goal of the class is to understand why and from where information is recoverable in these systems. We also cover relevant issues from criminology, law, and the study of privacy.

S-Reading/SouthAfricanConstutn

This course is dedicated to the history, theory, and dilemmas of South Africa?s 1996 Constitution. We will begin by considering the genesis of the Constitution in the negotiations of 1991-1994, culminating in the Interim Constitution of 1994. We shall then consider the Constitution on its own terms, paying close attention to Chapters and Sections that have proven especially controversial in the last twenty years. We will conclude by reflecting upon the limits of constitutionalism in and for the project of the post-apartheid.

S-PureStrat:BoardGametoRoom

This course draws upon two ancient board games, one with a long history predominantly in the west (Chess) and the other deeply rooted predominantly in the east (Go), to build concepts of business strategy and entrepreneurial dynamics. The first half of the semester will entail playing these games and selectively reading some of the vast literature on these two games. In the second half of the course, we will join the concepts so learned with modern thinking about competitive dynamics in the world of business and entrepreneurship.

Digital Forensics

This course offers a broad introduction to the forensic investigation of digital devices. We cover the preservation, recovery, harvesting, and courtroom presentation of information from file systems, operating systems, networks, database systems applications, media files, and embedded systems. The primary goal of the class is to understand why and from where information is recoverable in these systems. We also cover relevant issues from criminology, law, and the study of privacy.

Caribbean Cultures

The emergence of gender, race, and class conflict in settler Caribbean societies. Slavery, independence, the rise of capitalism, and the impact on workers and families. Structural adjustment and struggles to oppose its impact. Focus on Afro-Caribbean struggles and their spread to non-Caribbean societies.

Music in Film

The use of music in film, a "grand tour" of the aesthetics and dramatic techniques of film music since 1895. Excerpts from "silent era" and sound films will be viewed and studied as examples of film music development and the composer's art. (Gen.Ed. AT)

ST-Crypto Engineering

Cryptographic algorithms are the "engine" that drive virtually every security solution, from email encryption to biometric passports. This course will start with a review of the most important symmetric and public-key crypto algorithm. The focus on the course will then be on the efficient implementation and the secure implementation of cryptographic algorithms. Both pose considerable challenges. We will treat topics such as efficient arithmetic with very long numbers and side-channel attacks.

ST-Crypto Engineering

Cryptographic algorithms are the "engine" that drive virtually every security solution, from email encryption to biometric passports. This course will start with a review of the most important symmetric and public-key crypto algorithm. The focus on the course will then be on the efficient implementation and the secure implementation of cryptographic algorithms. Both pose considerable challenges. We will treat topics such as efficient arithmetic with very long numbers and side-channel attacks.
Subscribe to