点击切换搜索课件文库搜索结果(3236)
文档格式:PDF 文档大小:1.14MB 文档页数:24
• Attacks against browsers • Fake and malicious websites • Attacks targeting sensitive data • Injection attacks • Spam • Phishing attacks
文档格式:PDF 文档大小:168.09KB 文档页数:15
• Define privacy and fundamental computer-related privacy challenges • Privacy principles and laws • Privacy precautions for web surfing • Spyware • Email privacy • Privacy concerns in emerging technologies
文档格式:PDF 文档大小:660.25KB 文档页数:28
• Learn basic terms and primitives of cryptography • Deep dive into how symmetric encryption algorithms work • Study the RSA asymmetric encryption algorithm • Compare message digest algorithms • Explain the math behind digital signatures • Learn the concepts behind quantum cryptography
文档格式:DOC 文档大小:174KB 文档页数:8
1、复习上节课内容 2、讲述回填灌浆、接缝灌浆的方法 3、讲述灌浆施工的安全技术 4、小结本次课内容
文档格式:PDF 文档大小:3.99MB 文档页数:65
• Networking basics • Network threats and vulnerabilities • WiFi security • Denial-of-service attacks • Network encryption concepts and tools • Types of firewalls and what they do • Intrusion detection and prevention systems • Security information and event management tools
文档格式:PDF 文档大小:1.2MB 文档页数:36
• Learn about memory organization, buffer overflows, and relevant countermeasures • Common programming bugs, such as off-by-one errors, race conditions, and incomplete mediation • Survey of past malware and malware capabilities • Virus detection • Tips for programmers on writing code for security
文档格式:PDF 文档大小:427.22KB 文档页数:19
• Basic database terminology and concepts • Security requirements for databases • Implementing access controls in databases • Protecting sensitive data • Data mining and big data
文档格式:PDF 文档大小:1.06MB 文档页数:29
• Basic security functions provided by operating systems • System resources that require operating system protection • Operating system design principles • How operating systems control access to resources • The history of trusted computing • Characteristics of operating system rootkits
文档格式:PPTX 文档大小:6.97MB 文档页数:154
3.1 网络分析原理 3.2 网络分析实验 3.3 扩展实验
文档格式:PDF 文档大小:3.78MB 文档页数:40
• Survey authentication mechanisms • List available access control implementation options • Explain the problems encryption is designed to solve • Understand the various categories of encryption tools as well as the strengths, weaknesses, and applications of each • Learn about certificates and certificate authorities
首页上页9596979899100101102下页末页
热门关键字
搜索一下,找到相关课件或文库资源 3236 个  
©2008-现在 cucdc.com 高等教育资讯网 版权所有