点击切换搜索课件文库搜索结果(990)
文档格式:PDF 文档大小:1.23MB 文档页数:26
• Define cloud services, including types and service models • How to define cloud service requirements and identify appropriate services • Survey cloud-based security capabilities and offerings • Discuss cloud storage encryption considerations • Protection of cloud-based applications and infrastructures • Explain the major federated identity management standards and how they differ
文档格式:PPT 文档大小:2.71MB 文档页数:44
第一节 食品安全性评价的发展进程 第二节 食品中危害成分的毒理学评价 第三节 食品安全性的风险评价 第四节 联合国机构对食品中农药和兽药的安全性评价概述
文档格式:PPT 文档大小:1.04MB 文档页数:31
第一节 环境污染与食品安全 第二节 大气污染对食品安全性的影响 第三节 水体污染对食品安全性的影响 第四节 土壤污染对食品安全性的影响 第五节 放射性物质对食品安全性的影响
文档格式:PDF 文档大小:231.3KB 文档页数:12
• Define the Internet of Things and discuss associated emerging security issues • Discuss nascent efforts to financially measure cybersecurity to make sound investment decisions • Explore the evolving field of electronic voting, which has been an important and open security research problem for over a decade • Study potential examples of cyber warfare and their policy implications
文档格式:PPT 文档大小:487.5KB 文档页数:119
9.1 典型信息系统的安全需求分析 9.2 信息系统安全策略 9.3 访问控制 9.4 开放系统互联安全体系结构 9.5 PPDR安全管理模型
文档格式:PDF 文档大小:168.09KB 文档页数:15
• Define privacy and fundamental computer-related privacy challenges • Privacy principles and laws • Privacy precautions for web surfing • Spyware • Email privacy • Privacy concerns in emerging technologies
文档格式:PDF 文档大小:660.25KB 文档页数:28
• Learn basic terms and primitives of cryptography • Deep dive into how symmetric encryption algorithms work • Study the RSA asymmetric encryption algorithm • Compare message digest algorithms • Explain the math behind digital signatures • Learn the concepts behind quantum cryptography
文档格式:PDF 文档大小:3.29MB 文档页数:90
8.1 防火墙技术 • 防火墙的概念、特性、技术, • 自适应代理技术,防火墙的体系结构 • 防火墙的应用与发展 8.2 入侵检测技术 • 入侵检测概述,入侵检测系统分类 • 分布式入侵检测,入侵检测技术发展趋势 8.3 “蜜罐”技术 • 概念,分类,关键机制,部署结构 8.4 应急响应技术 • 应急响应的概念,应急响应策略 • 应急事件处理流程,应急响应技术及工具
文档格式:PDF 文档大小:546.94KB 文档页数:34
• Study the contents of a good security plan • Learn to plan for business continuity and responding to incidents • Outline the steps and best practices of risk analysis • Learn to prepare for natural and human-caused disasters
文档格式:PDF 文档大小:3.99MB 文档页数:65
• Networking basics • Network threats and vulnerabilities • WiFi security • Denial-of-service attacks • Network encryption concepts and tools • Types of firewalls and what they do • Intrusion detection and prevention systems • Security information and event management tools
首页上页9293949596979899下页末页
热门关键字
搜索一下,找到相关课件或文库资源 990 个  
©2008-现在 cucdc.com 高等教育资讯网 版权所有