SosaYi9

SosaYi9

    From the perspective of application scope,
    0:49
    5) Software tools
    0:49
    3) Software architecture
    0:49
    1) Software engineering knowledge
    0:49
    G2E (government to employee)
    0:49
    Customer Relationship Management (CRM)
    0:49
    A method proposed by IBM
    0:49
    1. Methods of risk identification: inquiry method
    0:50
    And the sum of relevant posts, personnel
    0:50
    ⊙ PKI / CA certification is required
    0:50
    (PKI / CA is not used) 2. S-mis
    0:50
    8) Layer 8: authorization and audit Security 9)
    0:50
    4) Layer 4: communication security 5)
    0:50
    This space has five elements: authentication
    0:45
    Reading notes Chapter 1 basic knowledge
    0:49