Summaries created for ETHZ courses. If you want to use some of these please be aware that:
- they are written to be helpful to memorize facts, and explicitly not to understand the course
- none has been reviewed by professors, and only a few ones by fellow students
- the perceived quality is not necessarily linked with how well I've liked and understood the course
I will list all summaries and my perceived level of quality. Generally, the newer the summary, the more consistent is the structure & the wording.
course | perceived quality of summary (not course) |
---|---|
2017-1 Data Modelling And Databases | ★★★☆☆ |
2017-1 Introduction To Negotiation Science | ★★☆☆☆ |
2017-1 Leadership II | ★★☆☆☆ |
2017-1 Networks | ★★★☆☆ |
2017-1 Operating Systems | ★★★☆☆ |
2017-1 Software Architecture And Engineering | ★★★☆☆ |
2017-2 Concepts of Object-Oriented Programming | ★★★★★ |
2017-2 Distributed Systems Part1 | ★★★★☆ |
2017-2 Distributed Systems Part2 | ★★★★☆ |
2017-2 Human Computer Interaction Cognition And Usability | ★★★☆☆ |
2017-2 Human Computer Interaction | ★★★★☆ |
2017-2 Network Security | ★★★★★ |
2018-1 Intellectual Property | ★★★★☆ |
2018-1 Internationale Politik | ★★★★★ |
2018-1 Case Studies From Practice | ★★★★☆ |
2018-1 Project Management | ★★★★☆ |
2018-1 Object Databases | ★★★☆☆ |
2018-1 Object Databases (short) | ★★★★☆ |
2018-1 Managerial Economics | ★★★★☆ |
2018-1 Information Retrieval | ★★★★☆ |
2018-1 Information Security Part1 | ★★★★☆ |
2018-1 Information Security Part2 | ★★★★☆ |
2018-1 Compiler Design | ★★★★☆ |
2019-2 Digital Sustainability | ★★☆☆☆ |
2019-2 E-Business Recht | ★★★★☆ |
2019-2 Security Engineering | ★★☆☆☆ |
2019-2 Algorithms Lab | ★★★★☆ |
2020-1 Advanced Systems Lab | ★★★★☆ |
2020-1 Advanced Systems Lab - FFT | ★★★☆☆ |
2020-1 Cryptographic Protocols | ★★★★☆ |
2020-1 Digital Signatures | ★★★★☆ |
2020-1 Startups und Steuern | ★★★☆☆ |
2020-1 Verteilte Algorithmen | ★★★★☆ |
2020-1 Wirtschaftssoziologie | ★★★★☆ |
2020-2 Applied Negotiation Seminar | ★★★★☆ |
2020-2 Contract Design | ★★★★☆ |
2020-2 Einfuehrung in die Cybersicherheitspolitik | ★★★☆☆ |
2020-2 Informal Methods | ★★☆☆☆ |
2020-2 System Security | ★★★★★ |
2021-1 Applied Cryptography (Part 1) | ★★★★★ |
2021-1 Applied Cryptography (Part 2) | ★★★★☆ |
2021-1 Formal Methods for Information Security | ★★★☆☆ |
2021-1 Spectacles of Measurement | ★★☆☆☆ |
2021-1 Grundzuege des Rechts | ★★★★☆ |
Comments:
Object Databases (short) is without general statements like "can be configured" and perceived irrelevant details (syntax for dead libraries) but may not be complete.
The summaries are written in the .fex format (https://github.com/famoser/FexCompiler), and then compiled to latex.
If you've found mistakes or spelling errors please feel free to create a pull request (edit .fex files only). If you make changes which are not obvious please cite a source (to ensure the summaries continuously improve).