正在加载图片...
7 Threats to network communications Interception, or unauthorized viewing Modification, or unauthorized change Fabrication, or unauthorized creation Interruption, or preventing authorized access From Security in Computing, Fifth Edition, by Charles P Pfleeger, et aL. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reservedThreats to Network Communications • Interception, or unauthorized viewing • Modification, or unauthorized change •Fabrication, or unauthorized creation • Interruption, or preventing authorized access 7 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有