点击切换搜索课件文库搜索结果(990)
文档格式:PDF 文档大小:168.09KB 文档页数:15
• Define privacy and fundamental computer-related privacy challenges • Privacy principles and laws • Privacy precautions for web surfing • Spyware • Email privacy • Privacy concerns in emerging technologies
文档格式:PDF 文档大小:1.23MB 文档页数:26
• Define cloud services, including types and service models • How to define cloud service requirements and identify appropriate services • Survey cloud-based security capabilities and offerings • Discuss cloud storage encryption considerations • Protection of cloud-based applications and infrastructures • Explain the major federated identity management standards and how they differ
文档格式:PDF 文档大小:231.3KB 文档页数:12
• Define the Internet of Things and discuss associated emerging security issues • Discuss nascent efforts to financially measure cybersecurity to make sound investment decisions • Explore the evolving field of electronic voting, which has been an important and open security research problem for over a decade • Study potential examples of cyber warfare and their policy implications
文档格式:PDF 文档大小:546.94KB 文档页数:34
• Study the contents of a good security plan • Learn to plan for business continuity and responding to incidents • Outline the steps and best practices of risk analysis • Learn to prepare for natural and human-caused disasters
文档格式:PDF 文档大小:1.2MB 文档页数:36
• Learn about memory organization, buffer overflows, and relevant countermeasures • Common programming bugs, such as off-by-one errors, race conditions, and incomplete mediation • Survey of past malware and malware capabilities • Virus detection • Tips for programmers on writing code for security
文档格式:PDF 文档大小:1.06MB 文档页数:29
• Basic security functions provided by operating systems • System resources that require operating system protection • Operating system design principles • How operating systems control access to resources • The history of trusted computing • Characteristics of operating system rootkits
文档格式:PDF 文档大小:7.62MB 文档页数:53
中版数字图书馆(试用) 异彩纷呈的网络免费电子图书资源(内部交流)
文档格式:PDF 文档大小:735.96KB 文档页数:17
• Define computer security as well as basic computer security terms • Introduce the C-I-A Triad • Introduce basic access control terminology • Explain basic threats, vulnerabilities, and attacks • Show how controls map to threats
文档格式:DOC 文档大小:2.05MB 文档页数:375
程序设计 线性代数 数据结构 运筹学 计算机网络 数据库原理及应用 管理信息系统开发方法 电子商务技术 基于网络的信息系统设计与实现》 计算机组成原理 会计学原理 理学院《操作系统 生产与运作管理 高级运筹学 管理沟通 管理礼仪 技术经济学 市场营销学 金融学 财务管理 面向对象程序设计 经济预测与决策分析 资本投资学 会计电算化 国际商务 Web 程序设计 项目管理 物流管理 信息系统的管理 决策支持系统 风险管理 ERP 系统 信息管理与信息系统专题 JAVA 编程语言 电子商务概论
文档格式:PPTX 文档大小:4.36MB 文档页数:48
课程目标: 了解图书馆、数据库、网络个性化信息服务 掌握个性化信息服务定制操作 内容提纲: 图书馆个性化服务总览 数据库个性化信息获取 网络个性化信息订制
首页上页5354555657585960下页末页
热门关键字
搜索一下,找到相关课件或文库资源 990 个  
©2008-现在 cucdc.com 高等教育资讯网 版权所有