Differences
This shows you the differences between two versions of the page.
events:individual_past_events:2009-02-23_edward_jung_lecture [2009/02/27 10:11] |
events:individual_past_events:2009-02-23_edward_jung_lecture [2009/02/27 10:11] (current) |
||
---|---|---|---|
Line 1: | Line 1: | ||
+ | /* If you have not already done so, please begin the heading below | ||
+ | with a date in YYYY-MM-DD format followed by a short description. | ||
+ | This is what will appear in the event listing and the event list | ||
+ | | ||
+ | |||
+ | ==== 2009-02-23 Edward Jung Lecture ==== | ||
+ | |||
+ | < | ||
+ | Edward Jung\\ | ||
+ | \\ | ||
+ | Murray Visiting Professor\\ | ||
+ | Dept. of Computer Science at Rutgers University\\ | ||
+ | Monday, February 23, 2009\\ | ||
+ | OLB classroom 105, 4pm\\ | ||
+ | \\ | ||
+ | **Information Security: Is this a good field to study?** | ||
+ | < | ||
+ | \\ | ||
+ | Historically, | ||
+ | |||
+ | In this talk, we will start with reviewing historical perspectives on information security. Two fundamental human activities, i.e., various types of attacks and their counter-measures, | ||
+ | |||
+ | Bio: \\ | ||
+ | |||
+ | Edward Jung is a Murray Visiting Professor in the Dept. of Computer Science at Rutgers University. His current research interest is in secure and reliable computing and networking with an emphasis on enhancing trustworthiness of mobile computing and wireless networks. From 1997 until 2003, he was a member of Technical Staff at Bell Labs, where he conducted research work in the areas of wireless data networks and network security. From 2003 until 2007, he worked on information security at Samsung Research, where he was director of the research group. He has co-authored about 30 technical publications and holds 60 US/ | ||
+ | |||