点击切换搜索课件文库搜索结果(1584)
文档格式:PPTX 文档大小:862.5KB 文档页数:56
◼ 9.1概述 ◼ 9.2密码学基础知识 ◼ 9.3数字签名 ◼ 9.4认证协议 ◼ 9.5网络安全协议 ◼ 9.6网络攻击与防护
文档格式:PDF 文档大小:231.3KB 文档页数:12
• Define the Internet of Things and discuss associated emerging security issues • Discuss nascent efforts to financially measure cybersecurity to make sound investment decisions • Explore the evolving field of electronic voting, which has been an important and open security research problem for over a decade • Study potential examples of cyber warfare and their policy implications
文档格式:PPT 文档大小:12.78MB 文档页数:71
第一节 农业生态系统 农业生态系统的概念 农业生态系统的结构 农业生态系统的生产力 农业生态系统的养分循环 农业生态系统的能量流动 第二节 农业生态安全 农业生态安全基本内涵 农业生态安全管理与生态建设对策
文档格式:DOC 文档大小:183KB 文档页数:39
【1】寻求食品安全的长效机制 1 【2】由食品安全看老百姓的生存状态 2 【3】问责制 3 【4】房价控制问题 5
文档格式:PDF 文档大小:168.09KB 文档页数:15
• Define privacy and fundamental computer-related privacy challenges • Privacy principles and laws • Privacy precautions for web surfing • Spyware • Email privacy • Privacy concerns in emerging technologies
文档格式:PPT 文档大小:0.99MB 文档页数:44
16.1 IP安全性概述 6.2 IP安全体系结构 16.3 认证头标 Authentication Header 16.4 封装安全载荷ESP 16.5 安全关联组合 16.6 密钥管理 Key Management
文档格式:PDF 文档大小:660.25KB 文档页数:28
• Learn basic terms and primitives of cryptography • Deep dive into how symmetric encryption algorithms work • Study the RSA asymmetric encryption algorithm • Compare message digest algorithms • Explain the math behind digital signatures • Learn the concepts behind quantum cryptography
文档格式:PDF 文档大小:546.94KB 文档页数:34
• Study the contents of a good security plan • Learn to plan for business continuity and responding to incidents • Outline the steps and best practices of risk analysis • Learn to prepare for natural and human-caused disasters
文档格式:PDF 文档大小:3.99MB 文档页数:65
• Networking basics • Network threats and vulnerabilities • WiFi security • Denial-of-service attacks • Network encryption concepts and tools • Types of firewalls and what they do • Intrusion detection and prevention systems • Security information and event management tools
文档格式:PDF 文档大小:1.2MB 文档页数:36
• Learn about memory organization, buffer overflows, and relevant countermeasures • Common programming bugs, such as off-by-one errors, race conditions, and incomplete mediation • Survey of past malware and malware capabilities • Virus detection • Tips for programmers on writing code for security
首页上页112113114115116117118119下页末页
热门关键字
搜索一下,找到相关课件或文库资源 1584 个  
©2008-现在 cucdc.com 高等教育资讯网 版权所有