臭了生气 发表于 2025-3-23 10:18:31
http://reply.papertrans.cn/48/4762/476102/476102_11.pngFACT 发表于 2025-3-23 17:55:43
Thomas LiedtkeSteinbach wurde. 2018. von der IAV GmbH Ingenieurgesellschaft Auto und Verkehr, Berlin, mit dem in der Branche renommierten .IAV Talent Award. in der Kategorie „Excellence“ ausgezeichnet..Der Autor: .Till Steinbach. i978-3-658-23500-0丧失 发表于 2025-3-23 18:16:39
http://reply.papertrans.cn/48/4762/476102/476102_13.pngnarcissism 发表于 2025-3-24 00:12:49
http://reply.papertrans.cn/48/4762/476102/476102_14.pngmodest 发表于 2025-3-24 03:30:08
http://image.papertrans.cn/i/image/476102.jpg稀释前 发表于 2025-3-24 06:55:58
Introduction,The introduction motivates the topic of information security and explains the terminology around the word “security”. The structure and chapter layout of the book are explained.Working-Memory 发表于 2025-3-24 13:27:58
Basics of Information Security,The chapter motivates the topic and introduces the terminology of information security. Concepts and foundations such as protection objectives, security, technical and organizational measures are introduced for the following chapters.爱管闲事 发表于 2025-3-24 16:41:48
Information/Cybersecurity Standards,This chapter provides an insight into standard lifecycle models that promote the development of integrity-oriented products (in terms of Security). An overview of existing norms and standards from various domains shows available specifications and proven state-of-the-art procedures such as Secrutyby-Design from different perspectives.广口瓶 发表于 2025-3-24 20:54:17
Hacking,This chapter discusses the mindset of hackers and attackers. Attackers can be divided into different groups in terms of their motivation and abilities. Examples of attacks are given, as well as procedures (such as the Cyber-Kill-Chain) that attackers use are explained.WATER 发表于 2025-3-25 02:20:44
http://reply.papertrans.cn/48/4762/476102/476102_20.png