点击切换搜索课件文库搜索结果(547)
文档格式:PDF 文档大小:660.25KB 文档页数:28
• Learn basic terms and primitives of cryptography • Deep dive into how symmetric encryption algorithms work • Study the RSA asymmetric encryption algorithm • Compare message digest algorithms • Explain the math behind digital signatures • Learn the concepts behind quantum cryptography
文档格式:PDF 文档大小:1.2MB 文档页数:36
• Learn about memory organization, buffer overflows, and relevant countermeasures • Common programming bugs, such as off-by-one errors, race conditions, and incomplete mediation • Survey of past malware and malware capabilities • Virus detection • Tips for programmers on writing code for security
文档格式:PDF 文档大小:3.78MB 文档页数:40
• Survey authentication mechanisms • List available access control implementation options • Explain the problems encryption is designed to solve • Understand the various categories of encryption tools as well as the strengths, weaknesses, and applications of each • Learn about certificates and certificate authorities
文档格式:PDF 文档大小:1.23MB 文档页数:26
• Define cloud services, including types and service models • How to define cloud service requirements and identify appropriate services • Survey cloud-based security capabilities and offerings • Discuss cloud storage encryption considerations • Protection of cloud-based applications and infrastructures • Explain the major federated identity management standards and how they differ
文档格式:PDF 文档大小:735.96KB 文档页数:17
• Define computer security as well as basic computer security terms • Introduce the C-I-A Triad • Introduce basic access control terminology • Explain basic threats, vulnerabilities, and attacks • Show how controls map to threats
文档格式:PPT 文档大小:4.22MB 文档页数:210
第一章、电子商务概述 第二章、电子商务网络基础 第三章、电子商务过程 第四章、电子商务中的安全机制 第五章、企业电子商务解决方案
文档格式:PPT 文档大小:12.9MB 文档页数:187
防火墙概述 防火墙分类 防火墙硬件技术 防火墙软件技术 防火墙分级 防火墙功能 防火墙性能 防火墙安全性 防火墙部署 防火墙管理 防火墙可靠性 防火墙典型应用 防火墙技术发展展望 怎样选择防火墙
文档格式:PPTX 文档大小:1.67MB 文档页数:55
8.1 计算机安全的基本知识和概念 8.2 计算机安全服务的主要技术 8.3 计算机病毒和木马的基本知识与预防 8.4 系统更新与系统还原 8.5 网络道德
文档格式:PPT 文档大小:228KB 文档页数:21
一、 IBM第一次使用术语\电子商务\ 二、 一是要有商业背景,二是网络化和数字化 三、 电子商务形成和发展
文档格式:PPT 文档大小:123KB 文档页数:15
黑客攻击技术 一、黑客 二、网络攻击与防范 三、利用缓冲区溢出入侵系统例子
首页上页4041424344454647下页末页
热门关键字
搜索一下,找到相关课件或文库资源 547 个  
©2008-现在 cucdc.com 高等教育资讯网 版权所有