The lectures and readings listed here are subject to change, including in response to current events (i.e., major new security holes).