equal
deleted
inserted
replaced
20 \mbox{\infer{\Gamma \vdash F_1 \wedge F_2}{\Gamma \vdash F_1 & \Gamma \vdash F_2}} |
20 \mbox{\infer{\Gamma \vdash F_1 \wedge F_2}{\Gamma \vdash F_1 & \Gamma \vdash F_2}} |
21 \end{center} |
21 \end{center} |
22 |
22 |
23 for constructing a proof of the judgement. What do the premises look like? |
23 for constructing a proof of the judgement. What do the premises look like? |
24 |
24 |
25 \item The informal meaning of the formula \mbox{$P\;\mapsto\;Q$} is `$P$ speaks for |
25 %\item The informal meaning of the formula \mbox{$P\;\mapsto\;Q$} is `$P$ speaks for |
26 $Q$'. Give a definition for this formula in terms of $\textit{says}$. |
26 %$Q$'. Give a definition for this formula in terms of $\textit{says}$. |
27 |
27 |
28 \item In Unix, what should be the general architecture of a network application that |
28 %\item In Unix, what should be the general architecture of a network application that |
29 processes potentially hostile data from the Internet? (Hint: Focus on the fact that in Unix |
29 %processes potentially hostile data from the Internet? (Hint: Focus on the fact that in Unix |
30 you can give different privileges to processes.) |
30 %you can give different privileges to processes.) |
31 |
31 |
32 \item Explain what are the differences between dictionary and brute forcing attacks against passwords. |
32 %\item Explain what are the differences between dictionary and brute forcing attacks against passwords. |
33 |
33 |
34 \end{enumerate} |
34 \end{enumerate} |
35 \end{document} |
35 \end{document} |
36 |
36 |
37 %%% Local Variables: |
37 %%% Local Variables: |