点击切换搜索课件文库搜索结果(710)
文档格式:PDF 文档大小:546.94KB 文档页数:34
• Study the contents of a good security plan • Learn to plan for business continuity and responding to incidents • Outline the steps and best practices of risk analysis • Learn to prepare for natural and human-caused disasters
文档格式:PDF 文档大小:3.99MB 文档页数:65
• Networking basics • Network threats and vulnerabilities • WiFi security • Denial-of-service attacks • Network encryption concepts and tools • Types of firewalls and what they do • Intrusion detection and prevention systems • Security information and event management tools
文档格式:PDF 文档大小:1.2MB 文档页数:36
• Learn about memory organization, buffer overflows, and relevant countermeasures • Common programming bugs, such as off-by-one errors, race conditions, and incomplete mediation • Survey of past malware and malware capabilities • Virus detection • Tips for programmers on writing code for security
文档格式:PPT 文档大小:174.5KB 文档页数:38
第十二章 SQL Server安全管理 12.1 SQL Server安全的相关概念 12.2服务器的安全性管理 12.3数据库安全性管理 12.4数据备份与还原综述 12.5备份与还原操作 12.6备份与还原计 12.7案例中的安全 12.8案例中的备份和还原操作
文档格式:PDF 文档大小:1.06MB 文档页数:29
• Basic security functions provided by operating systems • System resources that require operating system protection • Operating system design principles • How operating systems control access to resources • The history of trusted computing • Characteristics of operating system rootkits
文档格式:PPT 文档大小:43.5KB 文档页数:13
1.8.1 基本概念 1.8.2 劳动保护 1.8.3 安全防护技术 1.8.4 文明施工与环境保护
文档格式:PDF 文档大小:3.78MB 文档页数:40
• Survey authentication mechanisms • List available access control implementation options • Explain the problems encryption is designed to solve • Understand the various categories of encryption tools as well as the strengths, weaknesses, and applications of each • Learn about certificates and certificate authorities
文档格式:PDF 文档大小:735.96KB 文档页数:17
• Define computer security as well as basic computer security terms • Introduce the C-I-A Triad • Introduce basic access control terminology • Explain basic threats, vulnerabilities, and attacks • Show how controls map to threats
文档格式:PDF 文档大小:15.57MB 文档页数:304
第1章 网络安全概论 第2章 TCP/IP协议基础 第3章 网络入侵初步分析 第4章 网络人侵(黑客)工具分类 第5章 网络安全策略 第6章 网络安全专题
文档格式:DOC 文档大小:26KB 文档页数:1
1.美国麻省理工学院利用可降解的聚合物材料取代病毒,作为向人体运送基因 的新载体。这一突破将使基因疗法更加安全有效。他们研制出的“聚合物 DNA”纳米粒子类似一种人造病毒,注入人体后,能把基因成功运到目的地 聚合物材料比病毒安全,不会引发排异反应,完成任务后还可自行降解
首页上页6162636465666768下页末页
热门关键字
搜索一下,找到相关课件或文库资源 710 个  
©2008-现在 cucdc.com 高等教育资讯网 版权所有