信息安全工程师考试资料.zip

上传者: jksy_a | 上传时间: 2021-08-27 08:54:50 | 文件大小: 56.2MB | 文件类型: ZIP
与软考信息安全工程师相关的一些资料,包括信息安全工程师教程、信息安全工程师考试大纲和复习中总结的脑图。

文件下载

资源详情

[{"title":"( 44 个子文件 56.2MB ) 信息安全工程师考试资料.zip","children":[{"title":"信息安全工程师考试资料","children":[{"title":"第四章","children":[{"title":"操作系统安全机制.png <span style='color:#111;'> 152.26KB </span>","children":null,"spread":false},{"title":"计算机取证.png <span style='color:#111;'> 49.80KB </span>","children":null,"spread":false},{"title":"数据库系统安全.png <span style='color:#111;'> 158.46KB </span>","children":null,"spread":false},{"title":"嵌入式系统安全.png <span style='color:#111;'> 142.48KB </span>","children":null,"spread":false},{"title":"计算机设备安全.png <span style='color:#111;'> 263.97KB </span>","children":null,"spread":false},{"title":"恶意代码.png <span style='color:#111;'> 244.86KB </span>","children":null,"spread":false}],"spread":true},{"title":"第三章","children":[{"title":"网络安全威胁.png <span style='color:#111;'> 532.97KB </span>","children":null,"spread":false},{"title":"网络安全的基本概念.png <span style='color:#111;'> 57.15KB </span>","children":null,"spread":false},{"title":"计算机网络基本知识.png <span style='color:#111;'> 419.67KB </span>","children":null,"spread":false},{"title":"网络安全防御.png <span style='color:#111;'> 848.49KB </span>","children":null,"spread":false},{"title":"网络蜜罐技术.png <span style='color:#111;'> 76.23KB </span>","children":null,"spread":false},{"title":"网络备份.png <span style='color:#111;'> 36.65KB </span>","children":null,"spread":false},{"title":"匿名网络Tor.png <span style='color:#111;'> 23.85KB </span>","children":null,"spread":false},{"title":"网络安全防范意识与策略.png <span style='color:#111;'> 48.99KB </span>","children":null,"spread":false},{"title":"无线网络安全.png <span style='color:#111;'> 187.41KB </span>","children":null,"spread":false}],"spread":true},{"title":"《信息安全工程师考试大纲》.pdf <span style='color:#111;'> 387.08KB </span>","children":null,"spread":false},{"title":"第五章","children":[{"title":"信息隐藏.png <span style='color:#111;'> 125.02KB </span>","children":null,"spread":false},{"title":"WEB安全.png <span style='color:#111;'> 53.10KB </span>","children":null,"spread":false},{"title":"电子商务安全.png <span style='color:#111;'> 316.54KB </span>","children":null,"spread":false},{"title":"隐私保护.png <span style='color:#111;'> 75.28KB </span>","children":null,"spread":false},{"title":"网络舆情.png <span style='color:#111;'> 33.48KB </span>","children":null,"spread":false}],"spread":true},{"title":"1 信息安全工程师教程(订1册).pdf <span style='color:#111;'> 55.67MB </span>","children":null,"spread":false},{"title":"第二章","children":[{"title":"分组密码.png <span style='color:#111;'> 342.31KB </span>","children":null,"spread":false},{"title":"序列密码.png <span style='color:#111;'> 109.95KB </span>","children":null,"spread":false},{"title":"密码学的基本概念.png <span style='color:#111;'> 194.02KB </span>","children":null,"spread":false},{"title":"Hash函数.png <span style='color:#111;'> 91.29KB </span>","children":null,"spread":false}],"spread":true},{"title":"第一章","children":[{"title":"信息安全发展阶段.png <span style='color:#111;'> 135.44KB </span>","children":null,"spread":false},{"title":"信息安全标准与法规.png <span style='color:#111;'> 87.40KB </span>","children":null,"spread":false},{"title":"信息安全标准化知识.png <span style='color:#111;'> 177.79KB </span>","children":null,"spread":false},{"title":"信息安全法律法规.png <span style='color:#111;'> 86.36KB </span>","children":null,"spread":false},{"title":"信息安全管理基础.png <span style='color:#111;'> 381.72KB </span>","children":null,"spread":false}],"spread":true},{"title":"第七章","children":[{"title":"访问控制.png <span style='color:#111;'> 65.99KB </span>","children":null,"spread":false},{"title":"信息系统安全产品的配置和使用.png <span style='color:#111;'> 51.51KB </span>","children":null,"spread":false},{"title":"信息安全系统的需求分析和设计准则.png <span style='color:#111;'> 214.08KB </span>","children":null,"spread":false},{"title":"信息系统安全评测.png <span style='color:#111;'> 94.75KB </span>","children":null,"spread":false}],"spread":true},{"title":"第六章","children":[{"title":"网络安全风险评估实施.png <span style='color:#111;'> 277.08KB </span>","children":null,"spread":false},{"title":"网络安全需求分析与基本设计.png <span style='color:#111;'> 92.99KB </span>","children":null,"spread":false},{"title":"网络安全产品的配置和使用.png <span style='color:#111;'> 166.18KB </span>","children":null,"spread":false},{"title":"网络安全防护技术的应用.png <span style='color:#111;'> 583.13KB </span>","children":null,"spread":false}],"spread":true},{"title":"第八章","children":[{"title":"电子商务安全的需求分析与基本设计.png <span style='color:#111;'> 94.33KB </span>","children":null,"spread":false},{"title":"WEB安全的需求分析与基本设计.png <span style='color:#111;'> 49.54KB </span>","children":null,"spread":false},{"title":"数字水印在版权保护中应用.png <span style='color:#111;'> 44.28KB </span>","children":null,"spread":false},{"title":"位置隐私保护技术的应用.png <span style='color:#111;'> 55.22KB </span>","children":null,"spread":false},{"title":"嵌入式系统的安全应用.png <span style='color:#111;'> 44.38KB </span>","children":null,"spread":false}],"spread":true}],"spread":true}],"spread":true}]

评论信息

免责申明

【只为小站】的资源来自网友分享,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,【只为小站】 无法对用户传输的作品、信息、内容的权属或合法性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论 【只为小站】 经营者是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。
本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二条之规定,若资源存在侵权或相关问题请联系本站客服人员,zhiweidada#qq.com,请把#换成@,本站将给予最大的支持与配合,做到及时反馈和处理。关于更多版权及免责申明参见 版权及免责申明