摘要:
#Internet History, Technology, and Security From the birth of computer, to the development of network, to the introduction of network security ##Histo 阅读全文
摘要:
##Week9——Security: Web Security 1. Which of the following is false about the two keys used in public key encryption? If you have the public key it is 阅读全文
摘要:
##Week8:Security : Encrypting and Signing 1. Which of the following is true of security? Perfect security is achievable and requires a trade-off with 阅读全文