Delves into building efficient safety-critical systems, emphasizing the importance of worst-case execution times and the challenges of integrating efficiency considerations into design processes.
Explores the evolution of TLS protocols, the role of certificate authorities, vulnerabilities in outdated encryption, and real-world certificate-related attacks.
Covers network flow algorithms, including Max Flow, Min Cut, and Negative Cost Cycle Algorithm, progressing from basic definitions to advanced algorithms like Bellman-Ford and Dijkstra's.