書名: Information Security Handbook作者名: Darren Death本章字?jǐn)?shù): 26字更新時間: 2021-07-02 21:55:51
Methods used by the attacker
Here, we will explore the methods used by an attacker to exploit and gain access or control of enterprise information systems.
推薦閱讀
- 大數(shù)據(jù)技術(shù)與應(yīng)用基礎(chǔ)
- LabVIEW虛擬儀器從入門到測控應(yīng)用130例
- 21小時學(xué)通AutoCAD
- Practical Data Wrangling
- 計算機應(yīng)用復(fù)習(xí)與練習(xí)
- Java開發(fā)技術(shù)全程指南
- OpenStack Cloud Computing Cookbook
- Machine Learning with the Elastic Stack
- 單片機C語言應(yīng)用100例
- 空間機器人智能感知技術(shù)
- Win 7二十一
- 智能小車機器人制作大全(第2版)
- 電機與電力拖動
- Mastering Microsoft Dynamics 365 Customer Engagement
- 軟件需求最佳實踐