Completed
) Post-War Computing and Communication
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Internet History, Technology, and Security - Full Course from Dr. Chuck
Automatically move to the next video in the Classroom when playback concludes
- 1 ) Introduction
- 2 ) High Stakes Research in Computing and Communication
- 3 ) IEEE Computer: Alan Turing at Bletchley Park
- 4 ) The "First" Electronic Computers Around the World
- 5 ) Monash Museum of Computing History Interviews
- 6 ) Post-War Computing and Communication
- 7 ) Early Academic Networking Research
- 8 ) Len Kleinrock: The First Two Packets on the Internet
- 9 ) Packet Switched Networks
- 10 ) Computing Conversations: Len Kleinrock on the Theory of Packets
- 11 ) Packet Switching and the ARPANET
- 12 ) Katie Hafner on the history of the ARPANET project
- 13 ) Supercomputers as Technology Drivers
- 14 ) Networked Computing, lecture by Larry Smarr on Scientific Computing
- 15 ) From Super Computers to NSFNet
- 16 ) Doug Van Houweling: Building the NSFNet
- 17 ) Expanding NSFNet Around the World
- 18 ) Nii Quaynor: Bringing the Internet to Africa
- 19 ) The World-Wide-Web Emerges at CERN
- 20 ) Building the Web Around the World
- 21 ) Steve Job's Second-Order Effects (High resolution)
- 22 ) Mosaic at NCSA - The Browser for Everybody
- 23 ) Joseph Hardin: NCSA Mosaic
- 24 ) Reflecting on Mosaic
- 25 ) Computing Conversations with Brendan Eich
- 26 ) Computing Conversations: Mitchell Baker on the Mozilla Foundation
- 27 ) The Web, the World, and the Economy
- 28 ) Computing Conversations: Brian Behlendorf on the Apache Software Foundation
- 29 ) Open Source Wrap Up
- 30 ) Introduction: Link Layer
- 31 ) Computing Conversations: Bob Metcalfe on the First Ethernet LAN
- 32 ) The InterNetwork Protocol (IP)
- 33 ) Computing Conversations: Vint Cerf on the History of Packets
- 34 ) DNS - The Domain Name System
- 35 ) Transport Layer
- 36 ) Van Jacobson: The Slow-Start Algorithm
- 37 ) TCP Wrap Up
- 38 ) Application Layer
- 39 ) Security Introduction
- 40 ) Bruce Schneier: The Security Mindset
- 41 ) Understanding Security
- 42 ) Encryption and Confidentiality
- 43 ) Cryptographic Hashes and Integrity
- 44 ) Bruce Schneier: Building Cryptographic Systems
- 45 ) Hashing and Digital Signatures
- 46 ) Security Public/Private Key - Secure Sockets
- 47 ) Security - Integrity and Certificate Authorities