[{"title":"( 68 个子文件 115.99MB ) 唐俊飞唐老师CISSP2018最新全套培训讲义","children":[{"title":"CISSP 2018最新全套培训讲义(完整版)","children":[{"title":"Day050-评估与测试报告和管理.pdf <span style='color:#111;'> 1.81MB </span>","children":null,"spread":false},{"title":"Day008-业务连续性计划概述.pdf <span style='color:#111;'> 564.51KB </span>","children":null,"spread":false},{"title":"Day023-密码学定义与概念.pdf <span style='color:#111;'> 3.47MB </span>","children":null,"spread":false},{"title":"Day001-安全基本概念(2).pdf <span style='color:#111;'> 2.16MB </span>","children":null,"spread":false},{"title":"Day042-身份管理和相关技术 .pdf <span style='color:#111;'> 3.67MB </span>","children":null,"spread":false},{"title":"Day036-远程连接.pdf <span style='color:#111;'> 2.62MB </span>","children":null,"spread":false},{"title":"Day002-安全治理、安全计划和框架.pdf <span style='color:#111;'> 612.38KB </span>","children":null,"spread":false},{"title":"Day028-密钥管理和针对密码学的攻击.pdf <span style='color:#111;'> 1.80MB </span>","children":null,"spread":false},{"title":"Day059-灾难恢复计划测试和其他.pdf <span style='color:#111;'> 1.99MB </span>","children":null,"spread":false},{"title":"Day037-网络层攻击.pdf <span style='color:#111;'> 3.94MB </span>","children":null,"spread":false},{"title":"Day026-散列算法.pdf <span style='color:#111;'> 2.65MB </span>","children":null,"spread":false},{"title":"Day027-密码学应用.pdf <span style='color:#111;'> 4.42MB </span>","children":null,"spread":false},{"title":"Day034-网络互联基础和设备.pdf <span style='color:#111;'> 2.67MB </span>","children":null,"spread":false},{"title":"Day058-灾难恢复计划.pdf <span style='color:#111;'> 3.96MB </span>","children":null,"spread":false},{"title":"Day065-针对应用程序的相关攻击.pdf <span style='color:#111;'> 2.29MB </span>","children":null,"spread":false},{"title":"Day047-安全评估与测试概述.pdf <span style='color:#111;'> 2.16MB </span>","children":null,"spread":false},{"title":"Day022-一些对安全模型和架构的威胁.pdf <span style='color:#111;'> 2.10MB </span>","children":null,"spread":false},{"title":"Day055-预防措施.pdf <span style='color:#111;'> 2.72MB </span>","children":null,"spread":false},{"title":"Day013-信息相关的角色和责任.pdf <span style='color:#111;'> 463.37KB </span>","children":null,"spread":false},{"title":"Day030-实施物理安全.pdf <span style='color:#111;'> 1.98MB </span>","children":null,"spread":false},{"title":"Day007-法律法规、采购中的风险和安全教育.pdf <span style='color:#111;'> 514.11KB </span>","children":null,"spread":false},{"title":"Day017-数据泄露.pdf <span style='color:#111;'> 2.58MB </span>","children":null,"spread":false},{"title":"Day038-网络与协议安全机制.pdf <span style='color:#111;'> 4.26MB </span>","children":null,"spread":false},{"title":"Day020-全模型和实例.pdf <span style='color:#111;'> 3.06MB </span>","children":null,"spread":false},{"title":"Day018-使用安全设计原则实施和管理工程过程 .pdf <span style='color:#111;'> 3.11MB </span>","children":null,"spread":false},{"title":"Day033-网络组件安全.pdf <span style='color:#111;'> 3.12MB </span>","children":null,"spread":false},{"title":"Day054-配置项管理.pdf <span style='color:#111;'> 2.52MB </span>","children":null,"spread":false},{"title":"Day049-管理控制措施的评估与测试.pdf <span style='color:#111;'> 2.65MB </span>","children":null,"spread":false},{"title":"Day057-系统的恢复和容错能力.pdf <span style='color:#111;'> 2.00MB </span>","children":null,"spread":false},{"title":"Day005-风险评估和处置.pdf <span style='color:#111;'> 957.78KB </span>","children":null,"spread":false},{"title":"day015-保护隐私.pdf <span style='color:#111;'> 2.48MB </span>","children":null,"spread":false},{"title":"Day048-技术控制措施的评估与测试.pdf <span style='color:#111;'> 3.93MB </span>","children":null,"spread":false},{"title":"Day004-安全风险管理概述.pdf <span style='color:#111;'> 743.50KB </span>","children":null,"spread":false},{"title":"Day006-威胁建模和风险管理框架.pdf <span style='color:#111;'> 823.56KB </span>","children":null,"spread":false},{"title":"Day044-访问控制模型.pdf <span style='color:#111;'> 2.59MB </span>","children":null,"spread":false},{"title":"Day061-软件开发生命周期、模型和安全.pdf <span style='color:#111;'> 3.03MB </span>","children":null,"spread":false},{"title":"day014-适当的数据保留.pdf <span style='color:#111;'> 582.65KB </span>","children":null,"spread":false},{"title":"Day052-行政管理和责任.pdf <span style='color:#111;'> 2.50MB </span>","children":null,"spread":false},{"title":"Day056 -事件响应和安全监测.pdf <span style='color:#111;'> 2.90MB </span>","children":null,"spread":false},{"title":"Day032-TCP IP模型和协议.pdf <span style='color:#111;'> 3.18MB </span>","children":null,"spread":false},{"title":"Day019-系统架构和可信计算基.pdf <span style='color:#111;'> 3.40MB </span>","children":null,"spread":false},{"title":"Day009-业务连续性计划项目.pdf <span style='color:#111;'> 648.42KB </span>","children":null,"spread":false},{"title":"Day063-数据库管理.pdf <span style='color:#111;'> 3.28MB </span>","children":null,"spread":false},{"title":"Day060-软件中的安全需求.pdf <span style='color:#111;'> 2.73MB </span>","children":null,"spread":false},{"title":"Day064-Web应用安全.pdf <span style='color:#111;'> 1.77MB </span>","children":null,"spread":false},{"title":"00-CISSP最新版讲义目录.pdf <span style='color:#111;'> 121.31KB </span>","children":null,"spread":false},{"title":"Day043-联合身份管理和其它相关技术.pdf <span style='color:#111;'> 2.99MB </span>","children":null,"spread":false},{"title":"Day039-访问控制概述.pdf <span style='color:#111;'> 2.34MB </span>","children":null,"spread":false},{"title":"Day062-编程语言和环境.pdf <span style='color:#111;'> 2.19MB </span>","children":null,"spread":false},{"title":"Day046-对访问控制的几种威胁和监控.pdf <span style='color:#111;'> 3.26MB </span>","children":null,"spread":false},{"title":"Day010-业务影响评估.pdf <span style='color:#111;'> 631.80KB </span>","children":null,"spread":false},{"title":"Day029-站点规划和设计 .pdf <span style='color:#111;'> 2.25MB </span>","children":null,"spread":false},{"title":"Day001-安全基本概念(1).pdf <span style='color:#111;'> 661.00KB </span>","children":null,"spread":false},{"title":"Day035-无线网络.pdf <span style='color:#111;'> 2.63MB </span>","children":null,"spread":false},{"title":"Day031-OSI参考模型与多层协议概述.pdf <span style='color:#111;'> 4.71MB </span>","children":null,"spread":false},{"title":"Day025-非对称密码学.pdf <span style='color:#111;'> 2.99MB </span>","children":null,"spread":false},{"title":"Day011-信息生命周期.pdf <span style='color:#111;'> 558.34KB </span>","children":null,"spread":false},{"title":"Day024-对称密码学.pdf <span style='color:#111;'> 4.04MB </span>","children":null,"spread":false},{"title":"Day040-身份标识与身份认证技术.pdf <span style='color:#111;'> 2.88MB </span>","children":null,"spread":false},{"title":"Day041-身份授权和可问责性技术.pdf <span style='color:#111;'> 3.53MB </span>","children":null,"spread":false},{"title":"Day045-访问控制方法、技术和管理.pdf <span style='color:#111;'> 2.20MB </span>","children":null,"spread":false},{"title":"Day053-安全资源配置.pdf <span style='color:#111;'> 2.38MB </span>","children":null,"spread":false},{"title":"Day051-安全事件调查和取证.pdf <span style='color:#111;'> 3.01MB </span>","children":null,"spread":false},{"title":"Day021-系统安全评估模型.pdf <span style='color:#111;'> 3.09MB </span>","children":null,"spread":false},{"title":"Day012-信息分类.pdf <span style='color:#111;'> 479.18KB </span>","children":null,"spread":false},{"title":"day016-保护资产.pdf <span style='color:#111;'> 2.72MB </span>","children":null,"spread":false},{"title":"Day066-恶意代码.pdf <span style='color:#111;'> 1.91MB </span>","children":null,"spread":false},{"title":"Day003-安全策略体系和安全人员管理.pdf <span style='color:#111;'> 827.29KB </span>","children":null,"spread":false}],"spread":false}],"spread":true}]