tackle 发表于 2025-4-1 02:56:35

http://reply.papertrans.cn/27/2632/263147/263147_61.png

变化无常 发表于 2025-4-1 08:05:08

Dangerous Software,ention of a program developer. The chapter shows that the hazard potential of programs can have different reasons. The program may pose an intentional or unintentional threat. However, as will be explained further, a hazard can also result from a use of programs for a purpose other than that for whi

粗野 发表于 2025-4-1 11:12:38

http://reply.papertrans.cn/27/2632/263147/263147_63.png

Ancillary 发表于 2025-4-1 17:27:31

Telephone Systems,he use of so-called Internet telephony also entails massive risks. For this reason, VoIP telephone systems are often operated without adequate protection. This chapter explains, using concrete examples, what the dangers of using VoIP telephone systems can look like and how one should protect oneself

insomnia 发表于 2025-4-1 18:40:00

The Greatest Danger in a Digitalized World,e inclined to handle data and systems carelessly. The chapter explains that data security is not exclusively a question of the technology used, but also requires responsible action on the part of employees.

consolidate 发表于 2025-4-2 01:18:00

Data Destruction, that many systems over the past decades have been designed and programmed to store data. For a long time, it was considered a mark of quality for archival systems that they were incapable of deleting or modifying data once it had been stored. However, today’s legislation, at least in the European U

arboretum 发表于 2025-4-2 06:49:00

Data Backup and Restore,s not necessary to use a data backup in a company for years. This can also lead to carelessness in the use of data backups. However, if a disaster occurs, a well thought-out and conscientiously executed data backup can, under certain circumstances, ensure the continued existence of a company. The ch
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Data Security; Technical and Organi Thomas H. Lenhard Book 20221st edition Springer Fachmedien Wiesbaden GmbH, part of Springer Nature 2022