- Information Security Handbook
- Darren Death
- 73字
- 2021-07-02 21:55:48
Training
In our modern era, human interaction is a key vector used to exploit an information system. Whether you are looking at attacks such as ransomware, or exploits against critical infrastructure, the easiest avenue into a system is by tricking the user to run a piece of software. The key way that we can make sure that our users are prepared for these attacks is by implementing an effective training and awareness program.
推薦閱讀
- 火格局的時空變異及其在電網防火中的應用
- LabVIEW虛擬儀器從入門到測控應用130例
- 高性能混合信號ARM:ADuC7xxx原理與應用開發
- 腦動力:C語言函數速查效率手冊
- 走入IBM小型機世界
- Learning Apache Spark 2
- 網絡組建與互聯
- 運動控制器與交流伺服系統的調試和應用
- Practical Big Data Analytics
- Excel 2007常見技法與行業應用實例精講
- 人工智能技術入門
- Learn QGIS
- Mastering Predictive Analytics with scikit:learn and TensorFlow
- Python文本分析
- 深度學習500問:AI工程師面試寶典