SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Author Archives: stubblj
Writing my practical cryptography paper requires a lot of time and effort. Firstly and most importantly, I have found all of the sources I need in writing this paper. This took a great amount of time to find the perfect articles on the internet to address my topic, phishing. After finding and printing out all […] Continue reading
The government should not be given free reign to use electronic surveillance for “national security” when compromising the privacy of citizens. I understand that the government would compromise privacy in the best interests of the state; however, the efficiency of … Continue reading → Continue reading
Photo Credit: david.nikonvscanon via Compfight cc Although the Enigma machine at first seemed nearly impossible to decode, eventually the Allies successfully were able to get breakthroughs in the machine and finally solve the Enigma machine. A major reason for … Continue reading → Continue reading
The overwhelming theme of the novel Little Brother concerns the privacy of an individual and a society in all aspects of life. From the moment in which Marcus is first questioned by the National Homeland Security (NHS) until the end … Continue reading → Continue reading
For some time before the development of the Vigenère cipher, “anybody sending an encrypted message had to accept that an expert enemy codebreaker might intercept and decipher their most precious secrets.” (Singh, p. 45) How is this environment different from … Continue reading → Continue reading