This video discusses the Rust Object model and language facilities for representing user-defined types. Rust does not have support for classes, but does provide structs, which are similar to classes used in other object-oriented languages like C++. "Traits" are similar to interfaces or abstract classes and support polymorphic operations. Rust provides
CS Digest Section: CSIAC ANNOUNCEMENTS
This video discusses the Rust Language Ownership model which uses a type safety policy for avoiding undefined program behavior. The Rust type system ensures memory safety and prevents data races in multi-thread programs. The language rules for program variable (data) mutation, and the differences between value copies and moves is discussed in detail.
This presentation begins with a brief summary of Rust's features and the needs that motivate them. It then focuses on one particular important feature-set, Rust's error handling mechanisms. The discussion provides code snippets that illustrate how error handling works in Rust with annotated comments, accompanied by discussion explaining code operations.
This video provides an introduction and a brief overview of the Rust Programming Language. It covers the prerequisites required for getting started. This includes: the setup of a development environment using Visual Studio Code, and the Rust package manager and build tool known as "Cargo."
This is a 6-part video series entitled C++ Models by Dr. James Fawcett. Each video describes different conceptual models underlying the C++ programming language. Discussion with exemplars is used to illustrate how the models apply to aspects of the language for effective use. In this series, eight fundamental models are covered: Code Structure, Compilation,
Part 3 of this 6-part video series discusses the memory model paradigm, and foundational concepts behind the usage of memory: static, stack, and heap. The Class Model is described using illustrations of the relationships between code residing in static memory, and instances of objects in stack memory.
This presentation will examine the 76 SWEG approach from selection, onboarding, integration, and continuing education. Are we doing all the right things? The answer to that should be represented by the performance of the resilient products that we deliver. We haven't gotten all the training right, but our evolutions are continuing to bring us closer.
The Security Engineering Risk Analysis (SERA) Method defines a systematic approach for evaluating cybersecurity risk in highly complex networked environments. The SERA Method uses a scenario-based approach to analyze how an attacker could leverage available attack vectors and technology vulnerabilities to compromise confidentiality, integrity, and
In this CSIAC podcast, Jim West discusses how the CIA triad has played a part in the management of risk, but lacks the details of considering all aspects of risk. West, describes a 9-point core security principles star that will better prepare many organizations to seek out possible solutions to risks, and provide senior leadership a more detailed
Part 2 of this 6-part video series discusses the compilation process model, the preprocessor, and operations of the compile-link-load tool chain. The Execution model is described with a focus on function stack frames, memory, and use of streams.