- Advanced Infrastructure Penetration Testing
- Chiheb Chebbi
- 66字
- 2021-06-24 19:12:44
Availability
Availability seeks to ensure that the information is available by authorized users when it is needed. Denial of Service (DoS) is an example of an availability attack. High-availability clusters and backup copies are some of the mitigation systems used against availability attacks.
There are many information security definitions currently available. The previous definition is based on the ISO/IEC 27001 information security management standard.
推薦閱讀
- Linux運維之道(第3版)
- Citrix XenApp Performance Essentials
- 嵌入式Linux驅動程序和系統開發實例精講
- SharePoint 2013 應用開發實戰
- Learning Bootstrap
- Linux內核觀測技術BPF
- OpenStack系統架構設計實戰
- Fedora 12 Linux應用基礎
- 分布式高可用架構之道
- Linux軟件管理平臺設計與實現
- iOS 10 開發指南
- Linux內核分析及應用
- OpenStack Essentials(Second Edition)
- 程序員必讀經典(算法基礎+計算機系統)
- Getting Started with Citrix XenApp 6.5