BT种子基本信息
- 种子哈希:949036079e5b4d9c692483092db57e921c70f58e
- 文档大小:5.8 GB
- 文档个数:181个文档
- 下载次数:4039次
- 下载速度:极快
- 收录时间:2022-03-20
- 最近下载:2025-02-10
- DMCA/屏蔽:DMCA/屏蔽
文档列表
- 07 - Module 07 - Symmetric Cryptography and Hashing/003 Information Classification.mp4 165.4 MB
- 13 - Module 13 - Software Development Security/001 Information Classification.mp4 151.5 MB
- 06 - Module 06 - Operations Security/004 Methodology.mp4 148.5 MB
- 14 - Module 14 - Database Security and System Development/002 Artificial Intelligence.mp4 147.8 MB
- 19 - Module 19 – Physical/001 Information Classification.mp4 141.8 MB
- 05 - Module 05 - Security Models/002 What Does It Mean to Be in a Specific Ring.mp4 137.8 MB
- 15 - Module 15 - Malware and Software Attacks/001 Malware and Attacks.mp4 136.9 MB
- 18 - Module 18 - Incident Management, Law, and Ethics/001 Information Classification.mp4 135.7 MB
- 03 - Module 03 -Authentication/001 Authentication.mp4 134.8 MB
- 13 - Module 13 - Software Development Security/004 Linking Through COM.mp4 131.5 MB
- 07 - Module 07 - Symmetric Cryptography and Hashing/004 Symmetric Algorithms - DS.mp4 126.2 MB
- 18 - Module 18 - Incident Management, Law, and Ethics/003 Countries Working Together.mp4 125.5 MB
- 12 - Module 12 - Security Architecture/001 Information Classification.mp4 124.5 MB
- 04 - Module 04 - Access Control/001 Access Control.mp4 121.0 MB
- 11 - Module 11 - Telephony, VPNs and Wireless/005 WPA and WPA2 Mode Types.mp4 119.2 MB
- 16 - Module 16 - Business Continuity/001 Information Classification.mp4 103.5 MB
- 17 - Module 17 - Disaster Recovery/002 Recovery Plan.mp4 103.3 MB
- 10 - Module 10 - Network Protocols and Devices/002 Transport Layer.mp4 99.0 MB
- 08 - Module 08 - Asymmetric Cryptography and PKI/006 Types of Physical IDS.mp4 98.0 MB
- 11 - Module 11 - Telephony, VPNs and Wireless/004 Wireless Network Topologies.mp4 97.0 MB
- 06 - Module 06 - Operations Security/002 Product Implementation Concerns.mp4 93.0 MB
- 05 - Module 05 - Security Models/004 ITSEC - Good and Bad.mp4 90.6 MB
- 05 - Module 05 - Security Models/001 Security Models and Evaluation Criteria.mp4 89.7 MB
- 14 - Module 14 - Database Security and System Development/001 Information Classification.mp4 87.5 MB
- 09 - Module 09 - Network Connections/002 Summary of Topologies.mp4 83.3 MB
- 14 - Module 14 - Database Security and System Development/003 Virus.mp4 81.4 MB
- 08 - Module 08 - Asymmetric Cryptography and PKI/004 Link versus End-to-End Encryption.mp4 80.6 MB
- 04 - Module 04 - Access Control/004 Information Classification.mp4 78.3 MB
- 08 - Module 08 - Asymmetric Cryptography and PKI/002 Example of Hybrid Cryptography.mp4 78.2 MB
- 16 - Module 16 - Business Continuity/003 Facility Backups - Hot Site.mp4 73.5 MB
- 10 - Module 10 - Network Protocols and Devices/003 Repeater.mp4 72.4 MB
- 04 - Module 04 - Access Control/003 Threats to Access Control.mp4 68.3 MB
- 04 - Module 04 - Access Control/002 Access Control Characteristics.mp4 67.7 MB
- 12 - Module 12 - Security Architecture/002 Integrated Security is Designed Security.mp4 66.4 MB
- 04 - Module 04 - Access Control/005 Discretionary Access Control Model.mp4 64.0 MB
- 09 - Module 09 - Network Connections/001 Information Classification.mp4 63.9 MB
- 08 - Module 08 - Asymmetric Cryptography and PKI/001 Asymmetric Cryptography and PKI.mp4 63.8 MB
- 01 - Module 01 - Risk Management/002 Risk Management.mp4 63.8 MB
- 01 - Module 01 - Risk Management/003 Quantitative Analysis.mp4 63.7 MB
- 06 - Module 06 - Operations Security/001 Information Classification.mp4 63.1 MB
- 05 - Module 05 - Security Models/003 Non-Interference Model.mp4 62.9 MB
- 07 - Module 07 - Symmetric Cryptography and Hashing/001 Symmetric Cryptography and Hashing.mp4 62.7 MB
- 03 - Module 03 -Authentication/003 Memory Cards.mp4 61.4 MB
- 11 - Module 11 - Telephony, VPNs and Wireless/001 Information Classification.mp4 61.2 MB
- 09 - Module 09 - Network Connections/005 WAN Technologies - DSL.mp4 60.5 MB
- 09 - Module 09 - Network Connections/003 Transmission Types - Number of Recievers.mp4 60.0 MB
- 08 - Module 08 - Asymmetric Cryptography and PKI/003 CA and RA Roles.mp4 59.8 MB
- 04 - Module 04 - Access Control/006 Access Control Administration.mp4 59.6 MB
- 18 - Module 18 - Incident Management, Law, and Ethics/002 Intellectual Property Law.mp4 59.5 MB
- 02 - Module 02 - Security Management/001 Security Management.mp4 59.3 MB
- 14 - Module 14 - Database Security and System Development/004 DDoS.mp4 59.2 MB
- 10 - Module 10 - Network Protocols and Devices/001 Information Classification.mp4 58.3 MB
- 02 - Module 02 - Security Management/003 Roadmap to Maturity.mp4 58.1 MB
- 09 - Module 09 - Network Connections/004 Network Topologies.mp4 56.9 MB
- 10 - Module 10 - Network Protocols and Devices/004 Firewall Types - Circuit - Level Proxy Firewall.mp4 56.9 MB
- 07 - Module 07 - Symmetric Cryptography and Hashing/002 Historical Uses of Symmetric Cryptography Vernam Cipher.mp4 56.1 MB
- 18 - Module 18 - Incident Management, Law, and Ethics/004 Privacy of Sensitive Data.mp4 55.5 MB
- 10 - Module 10 - Network Protocols and Devices/005 TCPIP Suite.mp4 54.0 MB
- 06 - Module 06 - Operations Security/003 Redundant Array of Independent Disk (RAID).mp4 53.8 MB
- 08 - Module 08 - Asymmetric Cryptography and PKI/005 IPSec Handshaking Process.mp4 53.7 MB
- 02 - Module 02 - Security Management/004 Human Resources Issues.mp4 52.1 MB
- 17 - Module 17 - Disaster Recovery/001 Disaster Recovery.mp4 50.3 MB
- 17 - Module 17 - Disaster Recovery/003 Return to Normal Operations.mp4 50.1 MB
- 13 - Module 13 - Software Development Security/003 Security Issues.mp4 49.2 MB
- 13 - Module 13 - Software Development Security/002 Development Methodologies.mp4 47.0 MB
- 16 - Module 16 - Business Continuity/002 How to Identify the Most Critical Company Functions.mp4 45.7 MB
- 01 - Module 01 - Risk Management/001 Agenda.mp4 45.5 MB
- 12 - Module 12 - Security Architecture/004 Attacking Through Applications.mp4 44.6 MB
- 12 - Module 12 - Security Architecture/003 System Functionality.mp4 42.3 MB
- 11 - Module 11 - Telephony, VPNs and Wireless/002 PBX Vulnerabilities.mp4 41.0 MB
- 03 - Module 03 -Authentication/004 Issues Pertaining to Kerberos.mp4 40.8 MB
- 03 - Module 03 -Authentication/002 Biometrics Error Types.mp4 36.9 MB
- 11 - Module 11 - Telephony, VPNs and Wireless/003 SSLTLS.mp4 29.1 MB
- 02 - Module 02 - Security Management/002 Enterprise Security Program.mp4 25.4 MB
- 01 - Module 01 - Risk Management/12128224-CISSO-WB01.pdf 296.3 kB
- 09 - Module 09 - Network Connections/12128266-CISSO-WB09.pdf 291.7 kB
- 02 - Module 02 - Security Management/12128228-CISSO-WB02.pdf 290.9 kB
- 05 - Module 05 - Security Models/12128250-CISSO-WB05.pdf 290.2 kB
- 03 - Module 03 -Authentication/12128232-CISSO-WB03.pdf 290.0 kB
- 19 - Module 19 – Physical/12128322-CISSO-WB19.pdf 289.2 kB
- 06 - Module 06 - Operations Security/12128256-CISSO-WB06.pdf 289.0 kB
- 15 - Module 15 - Malware and Software Attacks/12128292-CISSO-WB15.pdf 288.7 kB
- 18 - Module 18 - Incident Management, Law, and Ethics/12128308-CISSO-WB18.pdf 287.6 kB
- 12 - Module 12 - Security Architecture/12128278-CISSO-WB12.pdf 287.2 kB
- 04 - Module 04 - Access Control/12128242-CISSO-WB04.pdf 287.1 kB
- 10 - Module 10 - Network Protocols and Devices/12128270-CISSO-WB10.pdf 284.6 kB
- 07 - Module 07 - Symmetric Cryptography and Hashing/12128258-CISSO-WB07.pdf 283.7 kB
- 13 - Module 13 - Software Development Security/19401620-CISSO-WB13.pdf 283.4 kB
- 11 - Module 11 - Telephony, VPNs and Wireless/12128274-CISSO-WB11.pdf 227.3 kB
- 08 - Module 08 - Asymmetric Cryptography and PKI/19401622-CISSO-WB08.pdf 227.0 kB
- 14 - Module 14 - Database Security and System Development/12128288-CISSO-WB14.pdf 226.6 kB
- 17 - Module 17 - Disaster Recovery/12128306-CISSO-WB17.pdf 226.3 kB
- 16 - Module 16 - Business Continuity/12128298-CISSO-WB16.pdf 226.1 kB
- 17 - Module 17 - Disaster Recovery/002 Recovery Plan_en.vtt 23.7 kB
- 10 - Module 10 - Network Protocols and Devices/003 Repeater_en.vtt 23.2 kB
- 07 - Module 07 - Symmetric Cryptography and Hashing/004 Symmetric Algorithms - DS_en.vtt 22.6 kB
- 09 - Module 09 - Network Connections/002 Summary of Topologies_en.vtt 22.0 kB
- 09 - Module 09 - Network Connections/001 Information Classification_en.vtt 21.0 kB
- 08 - Module 08 - Asymmetric Cryptography and PKI/006 Types of Physical IDS_en.vtt 21.0 kB
- 12 - Module 12 - Security Architecture/002 Integrated Security is Designed Security_en.vtt 20.9 kB
- 10 - Module 10 - Network Protocols and Devices/002 Transport Layer_en.vtt 20.8 kB
- 09 - Module 09 - Network Connections/003 Transmission Types - Number of Recievers_en.vtt 20.1 kB
- 14 - Module 14 - Database Security and System Development/002 Artificial Intelligence_en.vtt 20.0 kB
- 08 - Module 08 - Asymmetric Cryptography and PKI/004 Link versus End-to-End Encryption_en.vtt 19.9 kB
- 03 - Module 03 -Authentication/002 Biometrics Error Types_en.vtt 19.6 kB
- 19 - Module 19 – Physical/001 Information Classification_en.vtt 19.5 kB
- 04 - Module 04 - Access Control/002 Access Control Characteristics_en.vtt 19.5 kB
- 08 - Module 08 - Asymmetric Cryptography and PKI/003 CA and RA Roles_en.vtt 19.4 kB
- 07 - Module 07 - Symmetric Cryptography and Hashing/003 Information Classification_en.vtt 19.2 kB
- 08 - Module 08 - Asymmetric Cryptography and PKI/001 Asymmetric Cryptography and PKI_en.vtt 19.1 kB
- 16 - Module 16 - Business Continuity/001 Information Classification_en.vtt 19.1 kB
- 06 - Module 06 - Operations Security/004 Methodology_en.vtt 18.9 kB
- 09 - Module 09 - Network Connections/004 Network Topologies_en.vtt 18.9 kB
- 15 - Module 15 - Malware and Software Attacks/001 Malware and Attacks_en.vtt 18.8 kB
- 06 - Module 06 - Operations Security/001 Information Classification_en.vtt 18.8 kB
- 10 - Module 10 - Network Protocols and Devices/004 Firewall Types - Circuit - Level Proxy Firewall_en.vtt 18.8 kB
- 14 - Module 14 - Database Security and System Development/001 Information Classification_en.vtt 18.7 kB
- 18 - Module 18 - Incident Management, Law, and Ethics/001 Information Classification_en.vtt 18.7 kB
- 13 - Module 13 - Software Development Security/001 Information Classification_en.vtt 18.7 kB
- 11 - Module 11 - Telephony, VPNs and Wireless/001 Information Classification_en.vtt 18.5 kB
- 11 - Module 11 - Telephony, VPNs and Wireless/004 Wireless Network Topologies_en.vtt 18.5 kB
- 10 - Module 10 - Network Protocols and Devices/001 Information Classification_en.vtt 18.5 kB
- 01 - Module 01 - Risk Management/003 Quantitative Analysis_en.vtt 18.4 kB
- 18 - Module 18 - Incident Management, Law, and Ethics/002 Intellectual Property Law_en.vtt 18.4 kB
- 01 - Module 01 - Risk Management/001 Agenda_en.vtt 18.3 kB
- 05 - Module 05 - Security Models/001 Security Models and Evaluation Criteria_en.vtt 18.3 kB
- 18 - Module 18 - Incident Management, Law, and Ethics/003 Countries Working Together_en.vtt 18.3 kB
- 13 - Module 13 - Software Development Security/004 Linking Through COM_en.vtt 18.1 kB
- 06 - Module 06 - Operations Security/002 Product Implementation Concerns_en.vtt 18.1 kB
- 02 - Module 02 - Security Management/001 Security Management_en.vtt 18.0 kB
- 08 - Module 08 - Asymmetric Cryptography and PKI/005 IPSec Handshaking Process_en.vtt 17.9 kB
- 03 - Module 03 -Authentication/001 Authentication_en.vtt 17.7 kB
- 01 - Module 01 - Risk Management/002 Risk Management_en.vtt 17.5 kB
- 02 - Module 02 - Security Management/003 Roadmap to Maturity_en.vtt 17.3 kB
- 07 - Module 07 - Symmetric Cryptography and Hashing/001 Symmetric Cryptography and Hashing_en.vtt 17.2 kB
- 10 - Module 10 - Network Protocols and Devices/005 TCPIP Suite_en.vtt 17.2 kB
- 08 - Module 08 - Asymmetric Cryptography and PKI/002 Example of Hybrid Cryptography_en.vtt 17.2 kB
- 06 - Module 06 - Operations Security/003 Redundant Array of Independent Disk (RAID)_en.vtt 17.1 kB
- 11 - Module 11 - Telephony, VPNs and Wireless/005 WPA and WPA2 Mode Types_en.vtt 16.6 kB
- 09 - Module 09 - Network Connections/005 WAN Technologies - DSL_en.vtt 16.0 kB
- 12 - Module 12 - Security Architecture/001 Information Classification_en.vtt 16.0 kB
- 05 - Module 05 - Security Models/002 What Does It Mean to Be in a Specific Ring_en.vtt 16.0 kB
- 17 - Module 17 - Disaster Recovery/001 Disaster Recovery_en.vtt 15.5 kB
- 17 - Module 17 - Disaster Recovery/003 Return to Normal Operations_en.vtt 15.3 kB
- 07 - Module 07 - Symmetric Cryptography and Hashing/002 Historical Uses of Symmetric Cryptography Vernam Cipher_en.vtt 15.2 kB
- 13 - Module 13 - Software Development Security/003 Security Issues_en.vtt 15.1 kB
- 04 - Module 04 - Access Control/001 Access Control_en.vtt 14.8 kB
- 03 - Module 03 -Authentication/003 Memory Cards_en.vtt 13.9 kB
- 12 - Module 12 - Security Architecture/004 Attacking Through Applications_en.vtt 13.8 kB
- 13 - Module 13 - Software Development Security/002 Development Methodologies_en.vtt 13.6 kB
- 02 - Module 02 - Security Management/002 Enterprise Security Program_en.vtt 13.3 kB
- 18 - Module 18 - Incident Management, Law, and Ethics/004 Privacy of Sensitive Data_en.vtt 13.3 kB
- 05 - Module 05 - Security Models/003 Non-Interference Model_en.vtt 13.1 kB
- 04 - Module 04 - Access Control/005 Discretionary Access Control Model_en.vtt 13.1 kB
- 12 - Module 12 - Security Architecture/003 System Functionality_en.vtt 12.9 kB
- 04 - Module 04 - Access Control/006 Access Control Administration_en.vtt 12.9 kB
- 16 - Module 16 - Business Continuity/002 How to Identify the Most Critical Company Functions_en.vtt 12.7 kB
- 11 - Module 11 - Telephony, VPNs and Wireless/002 PBX Vulnerabilities_en.vtt 12.2 kB
- 03 - Module 03 -Authentication/004 Issues Pertaining to Kerberos_en.vtt 12.1 kB
- 05 - Module 05 - Security Models/004 ITSEC - Good and Bad_en.vtt 11.0 kB
- 14 - Module 14 - Database Security and System Development/004 DDoS_en.vtt 11.0 kB
- 16 - Module 16 - Business Continuity/003 Facility Backups - Hot Site_en.vtt 10.9 kB
- 02 - Module 02 - Security Management/004 Human Resources Issues_en.vtt 9.9 kB
- 04 - Module 04 - Access Control/004 Information Classification_en.vtt 9.9 kB
- 14 - Module 14 - Database Security and System Development/003 Virus_en.vtt 9.5 kB
- 11 - Module 11 - Telephony, VPNs and Wireless/003 SSLTLS_en.vtt 8.7 kB
- 04 - Module 04 - Access Control/003 Threats to Access Control_en.vtt 6.9 kB
- 0. Websites you may like/[CourseClub.Me].url 122 Bytes
- 02 - Module 02 - Security Management/[CourseClub.Me].url 122 Bytes
- 07 - Module 07 - Symmetric Cryptography and Hashing/[CourseClub.Me].url 122 Bytes
- 11 - Module 11 - Telephony, VPNs and Wireless/[CourseClub.Me].url 122 Bytes
- 15 - Module 15 - Malware and Software Attacks/[CourseClub.Me].url 122 Bytes
- 18 - Module 18 - Incident Management, Law, and Ethics/[CourseClub.Me].url 122 Bytes
- [CourseClub.Me].url 122 Bytes
- 0. Websites you may like/[GigaCourse.Com].url 49 Bytes
- 02 - Module 02 - Security Management/[GigaCourse.Com].url 49 Bytes
- 07 - Module 07 - Symmetric Cryptography and Hashing/[GigaCourse.Com].url 49 Bytes
- 11 - Module 11 - Telephony, VPNs and Wireless/[GigaCourse.Com].url 49 Bytes
- 15 - Module 15 - Malware and Software Attacks/[GigaCourse.Com].url 49 Bytes
- 18 - Module 18 - Incident Management, Law, and Ethics/[GigaCourse.Com].url 49 Bytes
- [GigaCourse.Com].url 49 Bytes
==查看完整文档列表==