点击切换搜索课件文库搜索结果(894)
文档格式:PPT 文档大小:119KB 文档页数:53
◼ 第一节:危险品生产的发展 ◼ 第二节:船舶运输危险货物形式的变化 ◼ 第三节:危险品事故及原因 ◼ 第四节:安全预防措施
文档格式:PPTX 文档大小:4.32MB 文档页数:80
6.1 入侵检测原理 6.2 入侵检测实验 6.3 Snort扩展实验 6.4 基于虚拟蜜网的网络攻防实验 6.5 工控入侵检测实验
文档格式:PDF 文档大小:1.23MB 文档页数:26
• Define cloud services, including types and service models • How to define cloud service requirements and identify appropriate services • Survey cloud-based security capabilities and offerings • Discuss cloud storage encryption considerations • Protection of cloud-based applications and infrastructures • Explain the major federated identity management standards and how they differ
文档格式:PDF 文档大小:231.3KB 文档页数:12
• Define the Internet of Things and discuss associated emerging security issues • Discuss nascent efforts to financially measure cybersecurity to make sound investment decisions • Explore the evolving field of electronic voting, which has been an important and open security research problem for over a decade • Study potential examples of cyber warfare and their policy implications
文档格式:PDF 文档大小:168.09KB 文档页数:15
• Define privacy and fundamental computer-related privacy challenges • Privacy principles and laws • Privacy precautions for web surfing • Spyware • Email privacy • Privacy concerns in emerging technologies
文档格式:PPTX 文档大小:15.98MB 文档页数:152
1 船舶火灾概论 2 船舶消防理论 3 船舶消防器材 4 固定水灭火系统 5 固定二氧化碳系统 6 固定泡沫灭火系统 7 固定干粉灭火系统 8 自动喷淋系统 9 船舶火灾自动探测报警系统 10 船舶防火 11 船舶消防演习
文档格式:PDF 文档大小:3.99MB 文档页数:65
• Networking basics • Network threats and vulnerabilities • WiFi security • Denial-of-service attacks • Network encryption concepts and tools • Types of firewalls and what they do • Intrusion detection and prevention systems • Security information and event management tools
文档格式:PDF 文档大小:546.94KB 文档页数:34
• Study the contents of a good security plan • Learn to plan for business continuity and responding to incidents • Outline the steps and best practices of risk analysis • Learn to prepare for natural and human-caused disasters
文档格式:PDF 文档大小:1.2MB 文档页数:36
• Learn about memory organization, buffer overflows, and relevant countermeasures • Common programming bugs, such as off-by-one errors, race conditions, and incomplete mediation • Survey of past malware and malware capabilities • Virus detection • Tips for programmers on writing code for security
文档格式:PPTX 文档大小:4.32MB 文档页数:80
6.1 入侵检测原理 6.2 入侵检测实验 6.3 Snort扩展实验 6.4 基于虚拟蜜网的网络攻防实验 6.5 工控入侵检测实验
首页上页5859606162636465下页末页
热门关键字
搜索一下,找到相关课件或文库资源 894 个  
©2008-现在 cucdc.com 高等教育资讯网 版权所有