Methods of protection of information in telecommunication networks

Affiliates: 0,03 $ — how to earn
Pay with:
i agree with "Terms for Customers"
Sold: 1
Refunds: 0

Uploaded: 27.11.2009
Content: 91127160757703.zip (423,52 kB)

Description

Course work: "Methods of protection of information in telecommunication networks"
Contents:
Introduction
1. The main provisions of the theory of information security
1.1. The essence of the problem and the problem of protection of information in information and telecommunication networks
1.2. Threats to information. Methods for their impact on the protection of information objects
2. Methods and means of information protection
2.1. Traditional measures and methods of information protection
2.2. Cryptographic methods and means of protection of information,
2.3. Non-traditional methods of information protection
3. Information Security Company
3.1. The concept of information security
3.2. Methods of protection of information in telecommunication networks of the enterprise Conclusion

Feedback

0
No feedback yet.
Period
1 month 3 months 12 months
0 0 0
0 0 0
In order to counter copyright infringement and property rights, we ask you to immediately inform us at support@plati.market the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)