点击切换搜索课件文库搜索结果(516)
文档格式:PDF 文档大小:1.06MB 文档页数:29
• Basic security functions provided by operating systems • System resources that require operating system protection • Operating system design principles • How operating systems control access to resources • The history of trusted computing • Characteristics of operating system rootkits
文档格式:PDF 文档大小:1.2MB 文档页数:36
• Learn about memory organization, buffer overflows, and relevant countermeasures • Common programming bugs, such as off-by-one errors, race conditions, and incomplete mediation • Survey of past malware and malware capabilities • Virus detection • Tips for programmers on writing code for security
文档格式:PDF 文档大小:660.25KB 文档页数:28
• Learn basic terms and primitives of cryptography • Deep dive into how symmetric encryption algorithms work • Study the RSA asymmetric encryption algorithm • Compare message digest algorithms • Explain the math behind digital signatures • Learn the concepts behind quantum cryptography
文档格式:PDF 文档大小:231.3KB 文档页数:12
• Define the Internet of Things and discuss associated emerging security issues • Discuss nascent efforts to financially measure cybersecurity to make sound investment decisions • Explore the evolving field of electronic voting, which has been an important and open security research problem for over a decade • Study potential examples of cyber warfare and their policy implications
文档格式:PDF 文档大小:168.09KB 文档页数:15
• Define privacy and fundamental computer-related privacy challenges • Privacy principles and laws • Privacy precautions for web surfing • Spyware • Email privacy • Privacy concerns in emerging technologies
文档格式:PDF 文档大小:3.78MB 文档页数:40
• Survey authentication mechanisms • List available access control implementation options • Explain the problems encryption is designed to solve • Understand the various categories of encryption tools as well as the strengths, weaknesses, and applications of each • Learn about certificates and certificate authorities
文档格式:PDF 文档大小:735.96KB 文档页数:17
• Define computer security as well as basic computer security terms • Introduce the C-I-A Triad • Introduce basic access control terminology • Explain basic threats, vulnerabilities, and attacks • Show how controls map to threats
文档格式:PPT 文档大小:12.9MB 文档页数:187
防火墙概述 防火墙分类 防火墙硬件技术 防火墙软件技术 防火墙分级 防火墙功能 防火墙性能 防火墙安全性 防火墙部署 防火墙管理 防火墙可靠性 防火墙典型应用 防火墙技术发展展望 怎样选择防火墙
文档格式:PPT 文档大小:781.5KB 文档页数:104
1、如何添加网络组件 2、影响网络性能的因素和提高网络性能的方法; 3、TCP/IP的配置 4、使用网络监视器和性能监视器监控网络性 能并进行化; 5、win2000 server的自动优化系统功能; 6、使用命令行对网络进行管理; 7、提高win2000 server的安全性措施
文档格式:PPT 文档大小:804.5KB 文档页数:87
• 安全策略与安全网络设计 • 路由器 • 防火墙 • 虚拟专用网(VPN) • 蜜罐技术 • 入侵检测 • snort系统介绍
首页上页3839404142434445下页末页
热门关键字
搜索一下,找到相关课件或文库资源 516 个  
©2008-现在 cucdc.com 高等教育资讯网 版权所有