CCSC:MS Nifty Assignments
http://ozark.hendrix.edu/~burch/ccsc-nifty/
[Authoring guidelines]
2014
- Using Steganography to Apply
Bitwise Operators and File Processing in C
- [File organization]
Use bitwise operators to reveal hidden image in an image file.
(Jim Kirk, Union Univ)
- Introducing Graph Algorithms
- [Algorithms]
Discover graph shortest paths (in-class exercise, no programming).
(Larry Morell, Arkansas Tech Univ)
- Network Administration with Raspberry Pi
- [Networks]
Set up DHCP, Web server, and Samba servers using Raspberry Pis.
(Bryan Foltz, Univ Tennessee at Martin)
- Integrating Mock Cybercrime Scenarios in Computer Forensics Courses
- [Computer Forensics]
Prove whether a laptop was used for stealing card numbers.
(Elizabeth Hawthorne, Univ of Maryland University College)