点击切换搜索课件文库搜索结果(716)
文档格式:PDF 文档大小:231.3KB 文档页数:12
• Define the Internet of Things and discuss associated emerging security issues • Discuss nascent efforts to financially measure cybersecurity to make sound investment decisions • Explore the evolving field of electronic voting, which has been an important and open security research problem for over a decade • Study potential examples of cyber warfare and their policy implications
文档格式:PPT 文档大小:642.5KB 文档页数:51
局域网的特点及安全性分析 VLAN安全技术及应用 VPN安全技术及应用 3.1 局域网安全问题 3.2 访问控制技术 3.3 VLAN安全技术及应用 3.4 VPN安全技术及应用 3.5 备份技术 3.6 归档技术 3.7 容错技术
文档格式:PPT 文档大小:242KB 文档页数:32
第13章安全管理 13.1安全控制 13.2 SQL Server的安全控制 13.3管理 SQL Server登录账号 13.4管理数据库用户 13.5管理权限 13.6角色
文档格式:PDF 文档大小:168.09KB 文档页数:15
• Define privacy and fundamental computer-related privacy challenges • Privacy principles and laws • Privacy precautions for web surfing • Spyware • Email privacy • Privacy concerns in emerging technologies
文档格式:PDF 文档大小:660.25KB 文档页数:28
• Learn basic terms and primitives of cryptography • Deep dive into how symmetric encryption algorithms work • Study the RSA asymmetric encryption algorithm • Compare message digest algorithms • Explain the math behind digital signatures • Learn the concepts behind quantum cryptography
文档格式:PDF 文档大小:546.94KB 文档页数:34
• Study the contents of a good security plan • Learn to plan for business continuity and responding to incidents • Outline the steps and best practices of risk analysis • Learn to prepare for natural and human-caused disasters
文档格式:PDF 文档大小:3.99MB 文档页数:65
• Networking basics • Network threats and vulnerabilities • WiFi security • Denial-of-service attacks • Network encryption concepts and tools • Types of firewalls and what they do • Intrusion detection and prevention systems • Security information and event management tools
文档格式:PDF 文档大小:1.2MB 文档页数:36
• Learn about memory organization, buffer overflows, and relevant countermeasures • Common programming bugs, such as off-by-one errors, race conditions, and incomplete mediation • Survey of past malware and malware capabilities • Virus detection • Tips for programmers on writing code for security
文档格式:PPT 文档大小:174.5KB 文档页数:38
第十二章 SQL Server安全管理 12.1 SQL Server安全的相关概念 12.2服务器的安全性管理 12.3数据库安全性管理 12.4数据备份与还原综述 12.5备份与还原操作 12.6备份与还原计 12.7案例中的安全 12.8案例中的备份和还原操作
文档格式:PDF 文档大小:1.06MB 文档页数:29
• Basic security functions provided by operating systems • System resources that require operating system protection • Operating system design principles • How operating systems control access to resources • The history of trusted computing • Characteristics of operating system rootkits
首页上页6364656667686970下页末页
热门关键字
搜索一下,找到相关课件或文库资源 716 个  
©2008-现在 cucdc.com 高等教育资讯网 版权所有