• Basic database terminology and concepts • Security requirements for databases • Implementing access controls in databases • Protecting sensitive data • Data mining and big data
文件格式: PDF大小: 427.22KB页数: 19
• Basic security functions provided by operating systems • System resources that require operating system protection • Operating system design principles • How operating systems control access to resources • The history of trusted computing • Characteristics of operating system rootkits
文件格式: PDF大小: 1.06MB页数: 29
• Survey authentication mechanisms • List available access control implementation options • Explain the problems encryption is designed to solve • Understand the various categories of encryption tools as well as the strengths, weaknesses, and applications of each • Learn about certificates and certificate authorities
文件格式: PDF大小: 3.78MB页数: 40
• Define computer security as well as basic computer security terms • Introduce the C-I-A Triad • Introduce basic access control terminology • Explain basic threats, vulnerabilities, and attacks • Show how controls map to threats
文件格式: PDF大小: 735.96KB页数: 17
3.1 网络分析原理 3.2 网络分析实验 3.3 扩展实验
文件格式: PPTX大小: 6.97MB页数: 154
3.1 网络分析原理 3.2 网络分析实验 3.3 扩展实验
文件格式: PPTX大小: 6.97MB页数: 154
8.1 Windows操作系统探测及端口扫描实验 8.2 Back Track5系统的安装 8.3 Nmap网络扫描工具
文件格式: PPTX大小: 4.36MB页数: 45
6.1 入侵检测原理 6.2 入侵检测实验 6.3 Snort扩展实验 6.4 基于虚拟蜜网的网络攻防实验 6.5 工控入侵检测实验
文件格式: PPTX大小: 4.32MB页数: 80
©2025 mall.hezhiquan.com 和泉文库
帮助反馈侵权