Principle of Adequate Data Protection

Loading...
From the course by University of Colorado System
Design and Analyze Secure Networked Systems
26 оценки
University of Colorado System
26 оценки
Course 1 of 4 in the Specialization Fundamentals of Computer Network Security
From the lesson
Protect Data Access and Verify Source of Trust

Meet the Instructors

  • Edward Chow
    Edward Chow
    Professor
    Computer Science

Ознакомьтесь с нашим каталогом

Присоединяйтесь бесплатно и получайте персонализированные рекомендации, обновления и предложения.