[{"title":"(68个子文件115.99MB)唐俊飞唐老师CISSP2018最新全套培训讲义","children":[{"title":"CISSP2018最新全套培训讲义(完整版)","children":[{"title":"Day050-评估与测试报告和管理.pdf <span style='color:#111;'>1.81MB</span>","children":null,"spread":false},{"title":"Day008-业务连续性计划概述.pdf <span style='color:#111;'>564.51KB</span>","children":null,"spread":false},{"title":"Day023-密码学定义与概念.pdf <span style='color:#111;'>3.47MB</span>","children":null,"spread":false},{"title":"Day001-安全基本概念(2).pdf <span style='color:#111;'>2.16MB</span>","children":null,"spread":false},{"title":"Day042-身份管理和相关技术.pdf <span style='color:#111;'>3.67MB</span>","children":null,"spread":false},{"title":"Day036-远程连接.pdf <span style='color:#111;'>2.62MB</span>","children":null,"spread":false},{"title":"Day002-安全治理、安全计划和框架.pdf <span style='color:#111;'>612.38KB</span>","children":null,"spread":false},{"title":"Day028-密钥管理和针对密码学的攻击.pdf <span style='color:#111;'>1.80MB</span>","children":null,"spread":false},{"title":"Day059-灾难恢复计划测试和其他.pdf <span style='color:#111;'>1.99MB</span>","children":null,"spread":false},{"title":"Day037-网络层攻击.pdf <span style='color:#111;'>3.94MB</span>","children":null,"spread":false},{"title":"Day026-散列算法.pdf <span style='color:#111;'>2.65MB</span>","children":null,"spread":false},{"title":"Day027-密码学应用.pdf <span style='color:#111;'>4.42MB</span>","children":null,"spread":false},{"title":"Day034-网络互联基础和设备.pdf <span style='color:#111;'>2.67MB</span>","children":null,"spread":false},{"title":"Day058-灾难恢复计划.pdf <span style='color:#111;'>3.96MB</span>","children":null,"spread":false},{"title":"Day065-针对应用程序的相关攻击.pdf <span style='color:#111;'>2.29MB</span>","children":null,"spread":false},{"title":"Day047-安全评估与测试概述.pdf <span style='color:#111;'>2.16MB</span>","children":null,"spread":false},{"title":"Day022-一些对安全模型和架构的威胁.pdf <span style='color:#111;'>2.10MB</span>","children":null,"spread":false},{"title":"Day055-预防措施.pdf <span style='color:#111;'>2.72MB</span>","children":null,"spread":false},{"title":"Day013-信息相关的角色和责任.pdf <span style='color:#111;'>463.37KB</span>","children":null,"spread":false},{"title":"Day030-实施物理安全.pdf <span style='color:#111;'>1.98MB</span>","children":null,"spread":false},{"title":"Day007-法律法规、采购中的风险和安全教育.pdf <span style='color:#111;'>514.11KB</span>","children":null,"spread":false},{"title":"Day017-数据泄露.pdf <span style='color:#111;'>2.58MB</span>","children":null,"spread":false},{"title":"Day038-网络与协议安全机制.pdf <span style='color:#111;'>4.26MB</span>","children":null,"spread":false},{"title":"Day020-全模型和实例.pdf <span style='color:#111;'>3.06MB</span>","children":null,"spread":false},{"title":"Day018-使用安全设计原则实施和管理工程过程.pdf <span style='color:#111;'>3.11MB</span>","children":null,"spread":false},{"title":"Day033-网络组件安全.pdf <span style='color:#111;'>3.12MB</span>","children":null,"spread":false},{"title":"Day054-配置项管理.pdf <span style='color:#111;'>2.52MB</span>","children":null,"spread":false},{"title":"Day049-管理控制措施的评估与测试.pdf <span style='color:#111;'>2.65MB</span>","children":null,"spread":false},{"title":"Day057-系统的恢复和容错能力.pdf <span style='color:#111;'>2.00MB</span>","children":null,"spread":false},{"title":"Day005-风险评估和处置.pdf <span style='color:#111;'>957.78KB</span>","children":null,"spread":false},{"title":"day015-保护隐私.pdf <span style='color:#111;'>2.48MB</span>","children":null,"spread":false},{"title":"Day048-技术控制措施的评估与测试.pdf <span style='color:#111;'>3.93MB</span>","children":null,"spread":false},{"title":"Day004-安全风险管理概述.pdf <span style='color:#111;'>743.50KB</span>","children":null,"spread":false},{"title":"Day006-威胁建模和风险管理框架.pdf <span style='color:#111;'>823.56KB</span>","children":null,"spread":false},{"title":"Day044-访问控制模型.pdf <span style='color:#111;'>2.59MB</span>","children":null,"spread":false},{"title":"Day061-软件开发生命周期、模型和安全.pdf <span style='color:#111;'>3.03MB</span>","children":null,"spread":false},{"title":"day014-适当的数据保留.pdf <span style='color:#111;'>582.65KB</span>","children":null,"spread":false},{"title":"Day052-行政管理和责任.pdf <span style='color:#111;'>2.50MB</span>","children":null,"spread":false},{"title":"Day056-事件响应和安全监测.pdf <span style='color:#111;'>2.90MB</span>","children":null,"spread":false},{"title":"Day032-TCPIP模型和协议.pdf <span style='color:#111;'>3.18MB</span>","children":null,"spread":false},{"title":"Day019-系统架构和可信计算基.pdf <span style='color:#111;'>3.40MB</span>","children":null,"spread":false},{"title":"Day009-业务连续性计划项目.pdf <span style='color:#111;'>648.42KB</span>","children":null,"spread":false},{"title":"Day063-数据库管理.pdf <span style='color:#111;'>3.28MB</span>","children":null,"spread":false},{"title":"Day060-软件中的安全需求.pdf <span style='color:#111;'>2.73MB</span>","children":null,"spread":false},{"title":"Day064-Web应用安全.pdf <span style='color:#111;'>1.77MB</span>","children":null,"spread":false},{"title":"00-CISSP最新版讲义目录.pdf <span style='color:#111;'>121.31KB</span>","children":null,"spread":false},{"title":"Day043-联合身份管理和其它相关技术.pdf <span style='color:#111;'>2.99MB</span>","children":null,"spread":false},{"title":"Day039-访问控制概述.pdf <span style='color:#111;'>2.34MB</span>","children":null,"spread":false},{"title":"Day062-编程语言和环境.pdf <span style='color:#111;'>2.19MB</span>","children":null,"spread":false},{"title":"Day046-对访问控制的几种威胁和监控.pdf <span style='color:#111;'>3.26MB</span>","children":null,"spread":false},{"title":"Day010-业务影响评估.pdf <span style='color:#111;'>631.80KB</span>","children":null,"spread":false},{"title":"Day029-站点规划和设计.pdf <span style='color:#111;'>2.25MB</span>","children":null,"spread":false},{"title":"Day001-安全基本概念(1).pdf <span style='color:#111;'>661.00KB</span>","children":null,"spread":false},{"title":"Day035-无线网络.pdf <span style='color:#111;'>2.63MB</span>","children":null,"spread":false},{"title":"Day031-OSI参考模型与多层协议概述.pdf <span style='color:#111;'>4.71MB</span>","children":null,"spread":false},{"title":"Day025-非对称密码学.pdf <span style='color:#111;'>2.99MB</span>","children":null,"spread":false},{"title":"Day011-信息生命周期.pdf <span style='color:#111;'>558.34KB</span>","children":null,"spread":false},{"title":"Day024-对称密码学.pdf <span style='color:#111;'>4.04MB</span>","children":null,"spread":false},{"title":"Day040-身份标识与身份认证技术.pdf <span style='color:#111;'>2.88MB</span>","children":null,"spread":false},{"title":"Day041-身份授权和可问责性技术.pdf <span style='color:#111;'>3.53MB</span>","children":null,"spread":false},{"title":"Day045-访问控制方法、技术和管理.pdf <span style='color:#111;'>2.20MB</span>","children":null,"spread":false},{"title":"Day053-安全资源配置.pdf <span style='color:#111;'>2.38MB</span>","children":null,"spread":false},{"title":"Day051-安全事件调查和取证.pdf <span style='color:#111;'>3.01MB</span>","children":null,"spread":false},{"title":"Day021-系统安全评估模型.pdf <span style='color:#111;'>3.09MB</span>","children":null,"spread":false},{"title":"Day012-信息分类.pdf <span style='color:#111;'>479.18KB</span>","children":null,"spread":false},{"title":"day016-保护资产.pdf <span style='color:#111;'>2.72MB</span>","children":null,"spread":false},{"title":"Day066-恶意代码.pdf <span style='color:#111;'>1.91MB</span>","children":null,"spread":false},{"title":"Day003-安全策略体系和安全人员管理.pdf <span style='color:#111;'>827.29KB</span>","children":null,"spread":false}],"spread":false}],"spread":true}]