首页
学习
活动
专区
工具
TVP
发布

debugeeker的专栏

专栏作者
185
文章
129308
阅读量
31
订阅数
CISSP考试指南笔记:8.3 软件开发模型
The Waterfall methodology uses a linear-sequential life-cycle approach,Each phase must be completed in its entirety before the next phase can begin. At the end of each phase, a review takes place to make sure the project is on the correct path and should continue.
血狼debugeeker
2021-09-10
3080
CISSP考试指南笔记:8.2 软件开发生命周期
There have been several software development life cycle (SDLC) models developed over the years, the crux of each model deals with the following phases:
血狼debugeeker
2021-09-10
3130
CISSP考试指南笔记:7.6 预防和检测
The steps of this generalized process are described here:
血狼debugeeker
2021-03-23
4400
CISSP考试指南笔记:5.4 集成身份即服务
Identity as a Service (IDaaS) is a type of Software as a Service (SaaS) offering that is normally configured to provide SSO, federated IdM, and password management services.
血狼debugeeker
2021-03-02
2670
CISSP考试指南笔记:4.13 远程连接
A modem (modulator-demodulator) is a device that modulates an outgoing digital signal into an analog signal that will be carried over an analog carrier, and demodulates the incoming analog signal into digital signals that can be processed by a computer.
血狼debugeeker
2021-02-04
1900
CISSP考试指南笔记:4.8 网络组件
A repeater provides the simplest type of connectivity because it only repeats electrical signals between cable segments, which enables it to extend a network. Repeaters work at the physical layer and are add-on devices for extending a network connection over a greater distance.
血狼debugeeker
2021-02-02
3290
CISSP考试指南笔记:4.1 网络体系结构原理
A network architecture is just a model of a network. Like any model, it is not 100 percent representative of reality and uses abstractions to simplify some details so that we can focus on the others. By ignoring the little stuff (for now), we make it easi
血狼debugeeker
2021-02-02
3580
CISSP考试指南笔记:3.6 系统评估方法
An assurance evaluation examines the security-relevant parts of a system, meaning the TCB, access control mechanisms, reference monitor, kernel, and protection mechanisms. The relationship and interaction between these components are also evaluated in order to determine the level of protection required and provided by the system.
血狼debugeeker
2020-12-29
4680
WAF专题1--WAF功能
WAF全称叫Web Application Firewall,和传统防火墙的区别是,它是工作在应用层的防火墙,主要对web请求/响应进行防护。那么WAF有什么功能呢?
血狼debugeeker
2019-06-14
1.8K0
没有更多了
社区活动
腾讯技术创作狂欢月
“码”上创作 21 天,分 10000 元奖品池!
Python精品学习库
代码在线跑,知识轻松学
博客搬家 | 分享价值百万资源包
自行/邀约他人一键搬运博客,速成社区影响力并领取好礼
技术创作特训营·精选知识专栏
往期视频·千货材料·成员作品 最新动态
领券
问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档