Products
Mind Mapping Software
Outlining Software
甘特图软件
Uses
Mind Maps for Education
企业思维导图
用于个人发展的思维导图
思维导图的好处
資源
特点
教育
个人和工作
台式电脑
Video Tutorials
Watch tips and tricks about using Mindomo.
Help Center
Detailed help guide on configuring and using Mindomo.
文章
甚麼是思維導圖?
How to Mind Map?
How to Take Notes with Mind Maps?
How to Prioritize Tasks with Mind Maps?
What is a Concept Map?
Top 29 Mind Map Examples
定价
登入
注册
Products
Mind Mapping Software
Outlining Software
甘特图软件
Uses
Mind Maps for Education
企业思维导图
用于个人发展的思维导图
思维导图的好处
文章
甚麼是思維導圖?
How to Mind Map?
How to Take Notes with Mind Maps?
How to Prioritize Tasks with Mind Maps?
What is a Concept Map?
Top 29 Mind Map Examples
特点
教育
个人和工作
台式电脑
說明
Video Tutorials
Help Center
定价
注册
登入
类别
全部
-
security
-
integrity
-
encryption
-
network
作者:
Robert Mccausland
17 年以前
2556
Cryptography
The text delves into various aspects of cryptography and its applications in securing information. It covers key management practices, including the creation, distribution, storage, and destruction of cryptographic keys.
開啟
更多类似内容
Leaders Eat Last - Simon Sinek
由Rui Monteiro
Grievance Procedure
由Martha Smith
MS302-303 Section 1: Planning Network Infrastructure
由James Herbert
My knowledges & skills
由Weiyan Lin
Cryptography
Network Security
IPSEC
VPN
SSL
Alternatives
Watermarking
Steganography
PKI
Certificate Authority
e--mail security
S/MIME
PGP
Non Repudiation
Crypto Attack
Implementation Attacks
Chosen Cipher text
Frequency analysis
Known plaintext
Cipher-text only
Brute force
Social engineering for key discovery
Chosen plain text
Signatures
Digests/Hashing
HMAC
SHA
MD5
Key management
Key escrow
Recovery
Storage/destruction
Creation/distribution
Crypto systems
Hashing
Message digest
Hybrid
Asymmetric
Symmetric
Initialisation Vector
Encryption
Block
Stream
Methods
Substitution
One-time pads
Uses
In Transit
At Rest
Availability
Integrity
Confidentiality