zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
CISSP
magnet:?xt=urn:btih:515513B6CE551727B84090C178C0ECE6E1AE55DA&dn=CISSP
磁力链接详情
文件列表详情
515513B6CE551727B84090C178C0ECE6E1AE55DA
infohash:
84
文件数量
646.68 MB
文件大小
2010-3-27 05:17
创建日期
2024-11-22 23:37
最后访问
相关分词
CISSP
14 - Telecommunications & Network Security - Network Security Devices.wmv 14.54 MB
11 - Telecommunications & Network Security - Secure Topology.wmv 11.95 MB
44 - Cryptography - Cryptography Algorithms.wmv 11.58 MB
29 - Security Management Practices - Wireless Security.wmv 11.19 MB
09 - Access Control Systems & Methodology - Penetration Testing.wmv 10.85 MB
10 - Telecommunications & Network Security - OSI Model.wmv 10.8 MB
67 - Operations Security - Intrusion Detection.wmv 10.6 MB
39 - Applications & Systems Development Security - Malicious Code Basics.wmv 10.47 MB
12 - Telecommunications & Network Security - IP Security.wmv 10.38 MB
23 - Security Management Practices - Security Management Concepts.wmv 10.01 MB
16 - Telecommunications & Network Security - WAN Technologies.wmv 10 MB
40 - Applications & Systems Development Security - Malicious Code Advanced.wmv 9.87 MB
17 - Telecommunications & Network Security - Security Techniques.wmv 9.82 MB
13 - Telecommunications & Network Security - Remote Access.wmv 9.74 MB
07 - Access Control Systems & Methodology - Access Control Methods.wmv 9.67 MB
08 - Access Control Systems & Methodology - Access Attacks.wmv 9.43 MB
41 - Applications & Systems Development Security - Web Enhancements.wmv 8.95 MB
28 - Security Management Practices - Risk Management.wmv 8.91 MB
50 - Cryptography - PKI.wmv 8.71 MB
21 - Telecommunications & Network Security - Web Vulnerabilities.wmv 8.67 MB
02 - Access Control Systems & Methodology - Access Control Basics.wmv 8.46 MB
70 - Business Continuity Planning - Information System Backups.wmv 8.28 MB
51 - Cryptography - Cryptography Attacks.wmv 8.27 MB
06 - Access Control Systems & Methodology - Authentication.wmv 8.19 MB
82 - Physical Security - Facility Requirements.wmv 8.12 MB
31 - Security Management Practices - Security Awareness Management.wmv 8.06 MB
43 - Cryptography - Cryptography Basics.wmv 8.02 MB
15 - Telecommunications & Network Security - Network Security Protocols.wmv 8.01 MB
48 - Cryptography - Secret Key.wmv 7.99 MB
53 - Security Architecture & Models - Security Architecture Concepts.wmv 7.85 MB
55 - Security Architecture & Models - Security Model Principles.wmv 7.85 MB
58 - Operations Security - Administrative Management.wmv 7.79 MB
25 - Security Management Practices - Protection Mechanisms.wmv 7.74 MB
47 - Cryptography - Message Authentication.wmv 7.73 MB
46 - Cryptography - Key Management.wmv 7.68 MB
36 - Applications & Systems Development Security - System Development Lifecycle.wmv 7.65 MB
66 - Operations Security - Monitoring.wmv 7.56 MB
81 - Laws, Investigations & Ethics - Ethics.wmv 7.55 MB
59 - Operations Security - Anti-Virus Management.wmv 7.54 MB
27 - Security Management Practices - Data Classification.wmv 7.51 MB
77 - Laws, Investigations & Ethics - Investigations.wmv 7.46 MB
84 - Physical Security - Physical Threats.wmv 7.4 MB
35 - Applications & Systems Development Security - Artificial Intelligence.wmv 7.39 MB
34 - Applications & Systems Development Security - Data Storage.wmv 7.37 MB
68 - Operations Security - Negative Actions.wmv 7.29 MB
83 - Physical Security - Environmental Safety.wmv 7.25 MB
45 - Cryptography - Cryptography Strength.wmv 7.24 MB
54 - Security Architecture & Models - Evaluation Criteria.wmv 7.21 MB
69 - Business Continuity Planning - Business Continuity.wmv 7.17 MB
75 - Laws, Investigations & Ethics - Types of Laws.wmv 7.16 MB
03 - Access Control Systems & Methodology - Advanced Access Control.wmv 7.16 MB
24 - Security Management Practices - Security Policy.wmv 7.14 MB
04 - Access Control Systems & Methodology - Access Control Administration.wmv 7.09 MB
78 - Laws, Investigations & Ethics - Evidence.wmv 7.09 MB
64 - Operations Security - Auditing.wmv 6.98 MB
30 - Security Management Practices - Roles and Responsibilities.wmv 6.97 MB
60 - Operations Security - Sensitive Information Handling.wmv 6.97 MB
20 - Telecommunications & Network Security - Security Controls.wmv 6.92 MB
18 - Telecommunications & Network Security - Email Security.wmv 6.91 MB
57 - Security Architecture & Models - Security Model Threats.wmv 6.9 MB
19 - Telecommunications & Network Security - Phone Security.wmv 6.77 MB
73 - Business Continuity Planning - RAID.wmv 6.76 MB
56 - Security Architecture & Models - Trusted Computing Base.wmv 6.64 MB
42 - Applications & Systems Development Security - Application & System Attacks.wmv 6.39 MB
71 - Business Continuity Planning - Availability.wmv 6.38 MB
22 - Telecommunications & Network Security - Physical Media.wmv 6.29 MB
72 - Business Continuity Planning - Recovery Techniques.wmv 6.26 MB
32 - Applications & Systems Development Security - Database Basics.wmv 6.18 MB
52 - Security Architecture & Models - Computer Processing.wmv 6.17 MB
79 - Laws, Investigations & Ethics - Computer Crime.wmv 6.15 MB
26 - Security Management Practices - Change Control.wmv 6.08 MB
05 - Access Control Systems & Methodology - Security Models.wmv 6.04 MB
74 - Business Continuity Planning - Emergency Response.wmv 5.98 MB
80 - Laws, Investigations & Ethics - Incident Handling.wmv 5.97 MB
65 - Operations Security - Audit Trails.wmv 5.95 MB
76 - Laws, Investigations & Ethics - Information Security Laws.wmv 5.9 MB
61 - Operations Security - Control Types.wmv 5.9 MB
62 - Operations Security - Machine Types.wmv 5.87 MB
49 - Cryptography - Public Key.wmv 5.62 MB
33 - Applications & Systems Development Security - Database Concepts.wmv 5.62 MB
37 - Applications & Systems Development Security - Security Control Architecture.wmv 5.34 MB
63 - Operations Security - Resource Protection.wmv 4.99 MB
38 - Applications & Systems Development Security - Computer Design.wmv 4.93 MB
01 - CISSP Series Intro.wmv 1.43 MB
其他位置