点击切换搜索课件文库搜索结果(2813)
文档格式:PPT 文档大小:154KB 文档页数:30
3.1 程序设计概述 3.2 C语言的数据类型 3.3 常量和变量 3.4 整型数据 3.5 实型数据 3.6 字符型数据 3.7 算术运算与算术表达式 3.8 赋值运算与赋值表达式 3.9 C语言特有的运算和运算符
文档格式:PDF 文档大小:168.09KB 文档页数:15
• Define privacy and fundamental computer-related privacy challenges • Privacy principles and laws • Privacy precautions for web surfing • Spyware • Email privacy • Privacy concerns in emerging technologies
文档格式:PDF 文档大小:231.3KB 文档页数:12
• Define the Internet of Things and discuss associated emerging security issues • Discuss nascent efforts to financially measure cybersecurity to make sound investment decisions • Explore the evolving field of electronic voting, which has been an important and open security research problem for over a decade • Study potential examples of cyber warfare and their policy implications
文档格式:PDF 文档大小:1.23MB 文档页数:26
• Define cloud services, including types and service models • How to define cloud service requirements and identify appropriate services • Survey cloud-based security capabilities and offerings • Discuss cloud storage encryption considerations • Protection of cloud-based applications and infrastructures • Explain the major federated identity management standards and how they differ
文档格式:PDF 文档大小:660.25KB 文档页数:28
• Learn basic terms and primitives of cryptography • Deep dive into how symmetric encryption algorithms work • Study the RSA asymmetric encryption algorithm • Compare message digest algorithms • Explain the math behind digital signatures • Learn the concepts behind quantum cryptography
文档格式:PDF 文档大小:1.06MB 文档页数:29
• Basic security functions provided by operating systems • System resources that require operating system protection • Operating system design principles • How operating systems control access to resources • The history of trusted computing • Characteristics of operating system rootkits
文档格式:PDF 文档大小:735.96KB 文档页数:17
• Define computer security as well as basic computer security terms • Introduce the C-I-A Triad • Introduce basic access control terminology • Explain basic threats, vulnerabilities, and attacks • Show how controls map to threats
文档格式:PPTX 文档大小:4.36MB 文档页数:45
8.1 Windows操作系统探测及端口扫描实验 8.2 Back Track5系统的安装 8.3 Nmap网络扫描工具
文档格式:PPTX 文档大小:4.32MB 文档页数:80
6.1 入侵检测原理 6.2 入侵检测实验 6.3 Snort扩展实验 6.4 基于虚拟蜜网的网络攻防实验 6.5 工控入侵检测实验
文档格式:PPTX 文档大小:2.98MB 文档页数:39
4.1 协议与内容安全概述 4.2 FTP协议安全分析实验 4.3 网络嗅探与欺骗实验
首页上页184185186187188189190191下页末页
热门关键字
搜索一下,找到相关课件或文库资源 2813 个  
©2008-现在 cucdc.com 高等教育资讯网 版权所有