×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [networks passive attackslearn]
1 Security Chapter 10. 2 Security Requirements Confidentiality –information only accessible for reading by authorized parties Integrity –Computer assets
213 views
1 Security Chapter 16. 2 Bad Things Intrusion (e.g. Trojan Horse Program) – Breaking into the computer and gaining access to its programs and data. Hardware
213 views
Security
21 views
Security
33 views
Security
16 views