×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [communication linedisabling]
Protection & Security Introduction to Operating Systems: Module 16
227 views
1 Security Chapter 10. 2 Security Requirements Confidentiality –information only accessible for reading by authorized parties Integrity –Computer assets
217 views
1 Security Chapter 16. 2 Bad Things Intrusion (e.g. Trojan Horse Program) – Breaking into the computer and gaining access to its programs and data. Hardware
214 views
1 Security and Protection Chapter 9 Advanced Operating System
234 views
Security
22 views
Security
34 views
Security
17 views