资源列表

« 1 2 ... .81 .82 .83 .84 .85 8386.87 .88 .89 .90 .91 ... 8590 »

[软件工程矿井自动化

说明:煤矿行业的必须的。这个是煤矿自动化的方案。
<bailiang@kailuan.com.cn> 在 2019-07-04 上传 | 大小:3.47mb | 下载:0

[软件工程有限元方法及其应用李开泰

说明:文档主要是对有限元方法的理论讲解,作者为李开泰(The document is mainly about the theoretical explanation of finite element method. The author is Kaitai Li.)
<夕阳下的刀客> 在 2025-04-06 上传 | 大小:6.1mb | 下载:0

[软件工程Cybersecurity Strategy Implementation2

说明:The Intrusion Kill Chain fr a mework is based on Lockheed Martin's paper Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains
<iwc2007008> 在 2022-02-27 上传 | 大小:162.84kb | 下载:0

[软件工程Cybersecurity Strategy Implementation3

说明:An Intrusion Kill Chain is the stages or phases that can be used in attacks by attackers.
<iwc2007008> 在 2022-02-27 上传 | 大小:143.67kb | 下载:0

[软件工程Cybersecurity Strategy Implementation4

说明:Once attackers have selected their target and have some understanding of where they are on the internet and the technologies they use, then they figure out how they are going to attack the victim. This phase is called
<iwc2007008> 在 2022-02-27 上传 | 大小:143.59kb | 下载:0

[软件工程Cybersecurity Strategy Implementation5

说明:Once the attackers have successfully installed their tools on the victim's system, they can send commands to their tools or to the system itself.
<iwc2007008> 在 2022-02-27 上传 | 大小:144.23kb | 下载:0

[软件工程Cybersecurity Strategy Implementation6

说明:Knowing what the attacker's Intrusion Kill Chain looks like can help defenders make it much harder for attackers to be successful.
<iwc2007008> 在 2022-02-27 上传 | 大小:146.32kb | 下载:0

[软件工程Cybersecurity Strategy Implementation7

说明:One consideration before implementing this fr a mework is whether defenders should use the original Intrusion Kill Chain fr a mework or update it. There are several ways this fr a mework can be modernized. I'll give y
<iwc2007008> 在 2022-02-27 上传 | 大小:149.29kb | 下载:0

[软件工程Cybersecurity Strategy Implementation8

说明:Another modification to this approach worth considering is whether to update the phases and the actions in the Courses of Action Matrix. For example, the Reconnaissance phase of the Intrusion Kill Chain can be split i
<iwc2007008> 在 2022-02-27 上传 | 大小:143.93kb | 下载:0

[软件工程Cybersecurity Strategy Implementation9

说明:The Weaponization phase is too opaque for most organizations to realistically influence. Put another way, CISOs typically do not have very effective controls for protection and detection prior to the Delivery phase; p
<iwc2007008> 在 2022-02-27 上传 | 大小:148.96kb | 下载:0

[软件工程Cybersecurity Strategy Implementation10

说明:This mapping exercise can help expose optimistic assumptions about organizations' security capabilities. Some security professionals call this type of exercise cartography.
<iwc2007008> 在 2022-02-27 上传 | 大小:143.37kb | 下载:0

[软件工程2019_Eng

说明:Engineering Company Profile
<ranasajjad207> 在 2023-02-27 上传 | 大小:1.18mb | 下载:0
« 1 2 ... .81 .82 .83 .84 .85 8386.87 .88 .89 .90 .91 ... 8590 »

源码中国 www.ymcn.org