• Learn basic terms and primitives of cryptography • Deep dive into how symmetric encryption algorithms work • Study the RSA asymmetric encryption algorithm • Compare message digest algorithms • Explain the math behind digital signatures • Learn the concepts behind quantum cryptography
文件格式: PDF大小: 660.25KB页数: 28
• Study the contents of a good security plan • Learn to plan for business continuity and responding to incidents • Outline the steps and best practices of risk analysis • Learn to prepare for natural and human-caused disasters
文件格式: PDF大小: 546.94KB页数: 34
• Networking basics • Network threats and vulnerabilities • WiFi security • Denial-of-service attacks • Network encryption concepts and tools • Types of firewalls and what they do • Intrusion detection and prevention systems • Security information and event management tools
文件格式: PDF大小: 3.99MB页数: 65
• Learn about memory organization, buffer overflows, and relevant countermeasures • Common programming bugs, such as off-by-one errors, race conditions, and incomplete mediation • Survey of past malware and malware capabilities • Virus detection • Tips for programmers on writing code for security
文件格式: PDF大小: 1.2MB页数: 36
• Basic database terminology and concepts • Security requirements for databases • Implementing access controls in databases • Protecting sensitive data • Data mining and big data
文件格式: PDF大小: 427.22KB页数: 19
• Basic security functions provided by operating systems • System resources that require operating system protection • Operating system design principles • How operating systems control access to resources • The history of trusted computing • Characteristics of operating system rootkits
文件格式: PDF大小: 1.06MB页数: 29
• Survey authentication mechanisms • List available access control implementation options • Explain the problems encryption is designed to solve • Understand the various categories of encryption tools as well as the strengths, weaknesses, and applications of each • Learn about certificates and certificate authorities
文件格式: PDF大小: 3.78MB页数: 40
• Define computer security as well as basic computer security terms • Introduce the C-I-A Triad • Introduce basic access control terminology • Explain basic threats, vulnerabilities, and attacks • Show how controls map to threats
文件格式: PDF大小: 735.96KB页数: 17
针对大学非计算机专业学生的实际情况,本文从大学计算机基础教育的教学目标入手,层次化教学内容,结合现代教学手段,提出多种在教学实践中行之有效的教学方法,并给出一些切实可行的改革建议
文件格式: PDF大小: 2.23MB页数: 4
复旦大学:《计算机网络与网页制作》课程教学大纲 Computer Network and Webpage Design
文件格式: PDF大小: 102.2KB页数: 2










