Illustrated tutorial on computer security

Pay with:
i agree with "Terms for Customers"
Sold: 3
Refunds: 0

Uploaded: 12.04.2005
Content: protection_to_information.rar (488,99 kB)


Chapter 1. Threats to computer security
Chapter 2. Spyware
Chapter 3. Password protection of operating systems
Chapter 4. Security computer network
Chapter 5. Basics of cryptography
Chapter 6. Cryptographic Keys
Chapter 7. Cryptographic protocols
Chapter 8. Reliability cryptosystems
Appendix. English-Russian dictionary with interpretations cryptological

Additional information

Format: html
Archive Size: 488.98Kb


No feedback yet.
1 month 3 months 12 months
0 0 0
0 0 0
In order to counter copyright infringement and property rights, we ask you to immediately inform us at the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)