- Information Security Handbook
- Darren Death
- 73字
- 2021-07-02 21:55:48
Training
In our modern era, human interaction is a key vector used to exploit an information system. Whether you are looking at attacks such as ransomware, or exploits against critical infrastructure, the easiest avenue into a system is by tricking the user to run a piece of software. The key way that we can make sure that our users are prepared for these attacks is by implementing an effective training and awareness program.
推薦閱讀
- Word 2000、Excel 2000、PowerPoint 2000上機指導與練習
- Python Artificial Intelligence Projects for Beginners
- Java實用組件集
- 來吧!帶你玩轉Excel VBA
- Cloud Analytics with Microsoft Azure
- 微型計算機控制技術
- 工業機器人工程應用虛擬仿真教程:MotoSim EG-VRC
- 21天學通ASP.NET
- PostgreSQL Administration Essentials
- 觸控顯示技術
- HTML5 Canvas Cookbook
- Web編程基礎
- Hands-On SAS for Data Analysis
- Cloudera Hadoop大數據平臺實戰指南
- 從實踐中學嵌入式Linux操作系統