• Theme 18. Antivirus protection programs……………………………………….. Theme 19. Trojan and network virus protection………………………………...
  • Theme 22. Information security programs (part 2)……………………………... Theme 23. Information security programs (part 3)……………………………...
  • Theme 24. Software protection of USB devices.…………………………….…… Theme 25.Information security in the network ..…….…………………………..
  • Theme 27. Network programs in information security…………………………. Theme 28. Auxiliary network programs (utilities) for information protection...
  • TEST QUESTIONS ……………………………………….………………………. LITERATURES ……………………………………..…………………………….
  • Theme 11. Mobile Application Ecosystem: Risks, Factors and Responsibilities




    Download 5,25 Mb.
    Pdf ko'rish
    bet7/87
    Sana29.11.2023
    Hajmi5,25 Mb.
    #107440
    1   2   3   4   5   6   7   8   9   10   ...   87
    Bog'liq
    Raqamli qurilmalarda axborotning dasturiy himoyalari qo\'llanma
    Yo\'nalishlar, nutq, yangi-o-zbekistonda-uchinchi-renessans-ilm-fan-taraqqiyotida-bugungi-yoshlar, Farhod tarix битирув иши, 2ccdd3d8-f115-4dae-801c-c4acfb0eae14, 3-maktab ssss, 6-SINF TARIX
    Theme 11. Mobile Application Ecosystem: Risks, Factors and Responsibilities. 
    Theme 12. DLP System (Data Leak Prevention)…………………….…………... 
    Theme 13. Risk assessment methods and software products…………………… 
    Theme 14. Technologies and products of Microsoft in ensuring information 
    security……………………………………………………………………………… 
    Theme 15. Security subsystems in MS Windows………………………………… 
    Theme 16. Information security methods in open source operating systems …. 
    Theme 17. Classification of software security tools……………………………… 
    Theme 18. Antivirus protection programs……………………………………….. 
    Theme 19. Trojan and network virus protection………………………………... 
    Theme 20. Means to ensure the integrity of information………………………... 
    Theme 21. Information security programs (part 1)……………………………... 
    Theme 22. Information security programs (part 2)……………………………... 
    Theme 23. Information security programs (part 3)……………………………... 



    Theme 24. Software protection of USB devices.…………………………….…… 
    Theme 25.Information security in the network ..…….………………………….. 
    Theme 26. Protection of information in information systems and computer 
    networks……………………………………………………………………………. 
    Theme 27. Network programs in information security…………………………. 
    Theme 28. Auxiliary network programs (utilities) for information protection... 
    Theme 29. Active network equipment and information security.………………. 
    Theme 30. Information protection in automated systems.………………..…….. 
    TEST QUESTIONS ……………………………………….………………………. 
    LITERATURES ……………………………………..……………………………. 
     
     
     


    10 

    Download 5,25 Mb.
    1   2   3   4   5   6   7   8   9   10   ...   87




    Download 5,25 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Theme 11. Mobile Application Ecosystem: Risks, Factors and Responsibilities

    Download 5,25 Mb.
    Pdf ko'rish