tanszek:oktatas:computer_system_security
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| tanszek:oktatas:computer_system_security [2024/02/27 06:54] – [Handouts] superuser | tanszek:oktatas:computer_system_security [2025/03/19 13:51] (current) – [Handouts] ohornyak | ||
|---|---|---|---|
| Line 4: | Line 4: | ||
| * Data loss and corruption | * Data loss and corruption | ||
| * User authentication methods, Passwords, encryption. | * User authentication methods, Passwords, encryption. | ||
| - | * Protection of privacy, destruction of data | + | * Protection of privacy |
| * Network security knowledge: protocols, devices, network attacks | * Network security knowledge: protocols, devices, network attacks | ||
| - | | + | * Ethical hacking |
| - | | + | |
| * Design and implement secure applications | * Design and implement secure applications | ||
| Line 125: | Line 124: | ||
| ===== Handouts ===== | ===== Handouts ===== | ||
| - | - {{tanszek: | + | |
| - | - {{tanszek: | + | |
| - | - [[https:// | + | - {{tanszek: |
| - | - [[https:// | + | - {{ : |
| - | - {{tanszek: | + | - [[https:// |
| - | - {{tanszek: | + | - [[https:// |
| - | - {{tanszek: | + | - {{tanszek: |
| + | - {{tanszek: | ||
| + | - {{tanszek: | ||
| ===== Test Questions ===== | ===== Test Questions ===== | ||
tanszek/oktatas/computer_system_security.1709016875.txt.gz · Last modified: 2024/02/27 06:54 by superuser
