<----------------------------------------------------------------->
       Week 05 -- Class notes
       
       Reading assignment:  Parmer chapter 7 and Weller chapter 5 and 6.
       
       This week we saw how hardware uses isolation of memory space, or 
       instruction set, or device access to prevent unauthorized access 
       to hardware resources, then we looked at malicious code (malware)
        and some of its characteristics.
       
       
       No assignment for this week.
       
 (BIN) Slide deck for week 5
 (BIN) Tools Report on Anti-Malware
       
 (DIR) <= go back
       <----------------------------------------------------------------->