Lecture Information systems security - Chapter 5 (part 2): Public key infrastructure
Số trang: 81
Loại file: pptx
Dung lượng: 1.95 MB
Lượt xem: 18
Lượt tải: 0
Xem trước 9 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
The content chapter 5 (part 1) include: Preparing for cryptographic attacks, cryptography standards and protocols, key management and key life cycle, introduction of PKI, trust models, PKI management.
Nội dung trích xuất từ tài liệu:
Lecture Information systems security - Chapter 5 (part 2): Public key infrastructure
Nội dung trích xuất từ tài liệu:
Lecture Information systems security - Chapter 5 (part 2): Public key infrastructure
Tìm kiếm theo từ khóa liên quan:
Information systems security Lecture Information systems security Information security Public key infrastructure Cryptographic attacks Public domain cryptographyGợi ý tài liệu liên quan:
-
Ebook Managing risk and information security: Protect to enable - Part 2
102 trang 265 0 0 -
Lecture On safety and security of information systems: Introduction to information systems security
59 trang 51 0 0 -
Lecture Business driven information systems (4/e): Chapter 4 - Paige Baltzan
46 trang 44 0 0 -
Speeding up data processing on firewall using FPGA
10 trang 33 0 0 -
Ebook The InfoSec handbook: An introduction to Information security - Part 2
193 trang 31 0 0 -
Ebook The InfoSec handbook: An introduction to Information security - Part 1
183 trang 30 0 0 -
Ebook PGP & GPG email for the practical paranoid
216 trang 28 0 0 -
Lecture Professional Practices in IT: Lecture 29
12 trang 28 0 0 -
Seminars in IT for Businesses - Lecture 25: Ethic & information security issues (Part 2)
44 trang 27 0 0 -
Ebook Principles of information security (Fifth Edition): Part 1
326 trang 26 0 0