点击切换搜索课件文库搜索结果(2930)
文档格式:PDF 文档大小:735.96KB 文档页数:17
• Define computer security as well as basic computer security terms • Introduce the C-I-A Triad • Introduce basic access control terminology • Explain basic threats, vulnerabilities, and attacks • Show how controls map to threats
文档格式:PDF 文档大小:1.06MB 文档页数:29
• Basic security functions provided by operating systems • System resources that require operating system protection • Operating system design principles • How operating systems control access to resources • The history of trusted computing • Characteristics of operating system rootkits
文档格式:PDF 文档大小:546.94KB 文档页数:34
• Study the contents of a good security plan • Learn to plan for business continuity and responding to incidents • Outline the steps and best practices of risk analysis • Learn to prepare for natural and human-caused disasters
文档格式:PDF 文档大小:660.25KB 文档页数:28
• Learn basic terms and primitives of cryptography • Deep dive into how symmetric encryption algorithms work • Study the RSA asymmetric encryption algorithm • Compare message digest algorithms • Explain the math behind digital signatures • Learn the concepts behind quantum cryptography
文档格式:PDF 文档大小:231.3KB 文档页数:12
• Define the Internet of Things and discuss associated emerging security issues • Discuss nascent efforts to financially measure cybersecurity to make sound investment decisions • Explore the evolving field of electronic voting, which has been an important and open security research problem for over a decade • Study potential examples of cyber warfare and their policy implications
文档格式:PDF 文档大小:396.7KB 文档页数:11
了解项目活动、项目活动排序的概念,掌握项目活动历时估算方法,掌握网络图、甘特图技术,熟练计算网络图时间参数,学会用P3,project2000等项目管理软件辅助项目的进度管理
文档格式:PDF 文档大小:4.05MB 文档页数:108
现有网络中数据组织的方式 计算机:各种数据文件的格式 网络:数据包格式 哪些信息需要合理表示? 交换数据格式 主流音视频流的数据组织方式 数字音乐 CD-DA 音乐文件 MP3 数字音频广播 DAB 数字电视 MPEG2  MPEG-4 AVC / H.264
文档格式:PPT 文档大小:323KB 文档页数:49
6.1 端口扫描 6.2 网络监听 6.3 IP电子欺骗 6.4 拒绝服务攻击 6.5 特洛伊木马 6.6 E-mail 炸 弹 6.7 缓冲区溢出
文档格式:PDF 文档大小:168.09KB 文档页数:15
• Define privacy and fundamental computer-related privacy challenges • Privacy principles and laws • Privacy precautions for web surfing • Spyware • Email privacy • Privacy concerns in emerging technologies
文档格式:PDF 文档大小:1.2MB 文档页数:36
• Learn about memory organization, buffer overflows, and relevant countermeasures • Common programming bugs, such as off-by-one errors, race conditions, and incomplete mediation • Survey of past malware and malware capabilities • Virus detection • Tips for programmers on writing code for security
首页上页284285286287288289290291下页末页
热门关键字
搜索一下,找到相关课件或文库资源 2930 个  
©2008-现在 cucdc.com 高等教育资讯网 版权所有