Covers the principles and strategies of privacy engineering, emphasizing the importance of embedding privacy into IT systems and the challenges faced in achieving privacy by design.
Explores BGP security weaknesses, real-world incidents, and defenses against BGP hijacking, emphasizing the importance of cryptography in securing routing information.
Explores adversarial thinking, common weaknesses, and ineffective defenses in software systems, emphasizing the importance of mitigating prevalent vulnerabilities.