Documente Academic
Documente Profesional
Documente Cultură
) Threat Agents Malware (the differences ,etc.) Trojan Virus Worms Attacks (different types of attack, etc.) DOS, DDOS,...,etc. Ethics, law, different types of laws, etc. Policy Technology Firewall IDPS Encryption CA Hashing CP BIA IRP DRP BCP VPN, RADIUS, TACACT, Kerberos, IPSec Footprinting, Fingerprinting Honeypot, Honeynet, padded-cell Sniffer Biometrics Symmetric, Asymmetric, PKI, Steganography