CCSC:MS Nifty Assignments

http://ozark.hendrix.edu/~burch/ccsc-nifty/

[Authoring guidelines]

2014

Using Steganography to Apply Bitwise Operators and File Processing in C
[File organization]
Use bitwise operators to reveal hidden image in an image file.
(Jim Kirk, Union Univ)
Introducing Graph Algorithms
[Algorithms]
Discover graph shortest paths (in-class exercise, no programming).
(Larry Morell, Arkansas Tech Univ)
Network Administration with Raspberry Pi
[Networks]
Set up DHCP, Web server, and Samba servers using Raspberry Pis.
(Bryan Foltz, Univ Tennessee at Martin)
Integrating Mock Cybercrime Scenarios in Computer Forensics Courses
[Computer Forensics]
Prove whether a laptop was used for stealing card numbers.
(Elizabeth Hawthorne, Univ of Maryland University College)