Class Notes (923,036)
US (356,267)
Virginia Tech (2,539)
CS (54)
CS 2114 (24)
M O Ellis (24)
Lecture 21

CS 2114 Lecture 21: CS-2114 - Notes - Day 21 - Sorted Lists and Cybersecurity
Premium

2 Pages
16 Views

Department
Computer Science
Course Code
CS 2114
Professor
M O Ellis

This preview shows half of the first page. Sign up to view the full 2 pages of the document.
Daniel T. Eisert CS-2114
1
Lecture 21 Sorted Lists & Cybersecurity
April 04, 2018 (Week 11)
Class Business
GitHub workshop THIS week: Wednesday, April 4 or Thursday, April 5.
CodeWorkout Homework coming soon.
Start Reviewing for Test!
NO Reading Quiz this week!
Project V preliminary submission is due (including WebCat submission,
updated UML, and Window screenshot—buttons don’t have to work will be
due Monday, April 9; Project V final submission is due Thursday, April 26.
Test II will be Wednesday, April 11.
Project IV is due Monday, April 16 (less than two weeks away).
Sorted Lists
- Need to change for sorted list: different add(newEntry), new
remove(anEntry), new getPosition(anEntry), gone replace(position, newEntry).
- Other methods remain the same.
- Ensure add method are put in the proper order.
- Using encapsulation/protecting it.
- getPosition returns the position where anEntry would occur in the list,
but as a negative integer.
EXAMPLE: Linked Implementation of a Sorted List
public class LinkedSortedList<T extends Comparable<? super T>>
implements SortedListInterface<T>
Implementation Using the ADT List:
- An instance of a sorted list that contains a list of its entries.
- Compositionthe list is a field in the sorted list.
- An example of a Wrapper Class or an Adapter Design Patterncalls
other methods and makes some minor alterations. Wrapper classes use
competition where the sorted list has-a list inside it.
- Or use inheritance where sorted list is-a list. Inherit methods from the
parent class and override methods that don’t keep the list sorted i.e.
remove and add).
- Has a field of a list.
EXAMPLE: See M, Week 11 PPT.
Polymorphism
Designing Base Classes:
- Be generalized.
- Has lots of helper methods.
- ADT can inherit what is needed.
- Create an abstract base.
Cybersecurity
Cybersecurity
Cybersecurity Goals:
- Confidentiality, Integrity, Availability
- Authenticity, Anonymity, Assurance
Denial of Service (DOS) Attacks: attacker attempts to make a machine or
network resource available to users oftentimes overloading a system with fake
requests to prevent legitimate requests from being fulled.
Degradation of Service: a form of DOS not intended to disrupt service, but
rather to slow service (can appear as legitimate increased traffic flowflash
crowd).
- All DOS attacks can NOT be prevented.
find more resources at oneclass.com
find more resources at oneclass.com

Loved by over 2.2 million students

Over 90% improved by at least one letter grade.

Leah — University of Toronto

OneClass has been such a huge help in my studies at UofT especially since I am a transfer student. OneClass is the study buddy I never had before and definitely gives me the extra push to get from a B to an A!

Leah — University of Toronto
Saarim — University of Michigan

Balancing social life With academics can be difficult, that is why I'm so glad that OneClass is out there where I can find the top notes for all of my classes. Now I can be the all-star student I want to be.

Saarim — University of Michigan
Jenna — University of Wisconsin

As a college student living on a college budget, I love how easy it is to earn gift cards just by submitting my notes.

Jenna — University of Wisconsin
Anne — University of California

OneClass has allowed me to catch up with my most difficult course! #lifesaver

Anne — University of California
Description
Daniel T. Eisert CS-2114 Lecture 21 Sorted Lists & Cybersecurity April 04, 2018 (Week 11) Class Business GitHub workshop THIS week: Wednesday, April 4 or Thursday, April 5. CodeWorkout Homework coming soon. Start Reviewing for Test! NO Reading Quiz this week! Project V preliminary submission is due (including WebCat submission, updated UML, and Window screenshotbuttons dont have to work) will be due Monday, April 9; Project V final submission is due Thursday, April 26. Test II will be Wednesday, April 11. Project IV is due Monday, April 16 (less than two weeks away). Sorted Lists - Need to change for sorted list: different add(newEntry) , new remove(anEntry) , new getPosition(anEntry, gonereplace(position, newEntry). - Other methods remain the same. - Ensure add method are put in the proper order. - Using encapsulation/protecting it. - getPosition returns the position where anEntry would occur in the list, but as a negative integer. EXAMPLE: Linked Implementation of a Sorted List public class LinkedSortedList> implements SortedListInterface Implementation Using the ADT List: - An instance of a sorted list that contains a list of its entries. - Compositionthe list is a field in the sorted list. - An example of a Wrapper Class or an Adapter Design Patterncalls other methods and makes some minor alterations. Wrapper classes use competition where the sorted list has-a list inside it. - Or use inheritance where sorted list is-a list. Inherit methods from the parent class and override methods that dont keep the list sorted (i.e. remove and add). - Has a field of a list. EXAMPLE: See M, Week 11 PPT. Polymorphism Designing Base Classes: - Be generalized. - Has lots of helper methods. - ADT can inherit what is needed. - Create an abstract base. Cybersecurity Cybersecurity Goals: - Confidentiality, Integrity, Availability - Authenticity, Anonymity, Assurance Denial of Service (DOS) Attacks: attacker attempts to make a machine or network resource available to users oftentimes overloading a system with fake requests to prevent legitimate requests from being fulled. Degradation of Service: a form of DOS not intended to disrupt service, but rather to slow service (can appear as legitimate increased traffic flowflash crowd). - All DOS attacks can NOT be prevented. Cybersecurity 1 Daniel T. Eisert CS-2114 - Blacklist/Whitelist: access from blacklisted countries is prevented; access from whitelisted countries is always allowed. - Intrusion Prevention System (IPS) software/devices that detect and attempt to stop t
More Less
Unlock Document


Only half of the first page are available for preview. Some parts have been intentionally blurred.

Unlock Document
You're Reading a Preview

Unlock to view full version

Unlock Document

Log In


OR

Don't have an account?

Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


OR

By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.


Submit