Learn Data Security
Study Data Security using smart web & mobile flashcards created by top students, teachers, and professors. Prep for a quiz or learn for fun!
Brainscape Certified flashcards
(0)
Decks
Flashcards
Learners
User Generated flashcards
(30)
Decks
Flashcards
Learners
-
A Level CIE CS 9618 Paper 3
A Level CIE CS 9618 Paper 3
By: mars manawadu
U13 data representation, U14 communication and network tech, U15 Hardware and Virtual Machines ...6Decks192Flashcards25Learners -
RICS APC Oct 2023
RICS APC Oct 2023
By: Al Adams
L3 Valuation, L3 Inspections, L3 Loan Security ...20Decks465Flashcards10Learners -
COMPUTING
COMPUTING
By: TRAN HUY THAI NYJC 2023/2024
Network Security, Networking - General, OOP ...17Decks152Flashcards1Learner -
RICS APC - GD
RICS APC - GD
By: Greg Donald
Case Study, CPD, Ethics, rules of conduct & professionalism ...20Decks2,219Flashcards5Learners -
MISYS
MISYS
By: Tipayyy Perlaaa
Lesson 14: Ethics, Privacy and Security, HMIS, DICT ACT 2015 ...13Decks357Flashcards5Learners -
Spring
Spring
By: Gianmarco Barca
Spring Framework, Spring Boot, Spring Web ...12Decks203Flashcards8Learners -
4. Semester
4. Semester
By: Carsten Thomassen
Leadership and service management, IT & security, Data science ...5Decks136Flashcards11Learners -
epam&
epam&
By: Unknown Unknown
network & protocols, http_lesson, networking-commands ...18Decks575Flashcards1Learner -
IB compsci chapter 3
IB compsci chapter 3
By: Ella Hong
Network types, hardware, architecture, protocols and standards, VPN ...6Decks131Flashcards1Learner -
Microservices
Microservices
By: João Pedro
Cap 1, Application Architecture Patterns, Decomposite patterns ...15Decks333Flashcards25Learners -
Ultimate Computing
Ultimate Computing
By: Nizar Tourabi
2.1.1 Abstraction, 2.1.2 Thinking Ahead, 2.1.3 Thinking Procedurally ...25Decks569Flashcards4Learners -
Google Certification
Google Certification
By: Dusty Fraser
Databases, Data Warehouse, Google Cloud Services ...17Decks265Flashcards4Learners -
AS Computer Science
AS Computer Science
By: Ayah Hamed
Hardware and communication, Operating systems, Economic, Moral, Legal, Ethical and Cultural issues ...11Decks131Flashcards1Learner -
Programming
Programming
By: Benjamin Stirrup
Take control of Linux, Transfer data throught the network, React ...9Decks550Flashcards9Learners -
Copied RCDD
Copied RCDD
By: Moutasim Mousaad
Ch. 7 * (Telecommunications Spaces), Ch. 1 * (Principles of Transmission), Ch. 2 (Electromagnetic Compatibility) ...24Decks857Flashcards23Learners -
CIPP/US 2.5.1
CIPP/US 2.5.1
By: Kathleen Kramer
Basic Terms/Privacy Overview, Structure and Enforcement of US Law, Info Management in US ...14Decks341Flashcards5Learners -
AS Level Computer Science
AS Level Computer Science
By: Alisa Kruger
Chapter 1 Information representation, Chapter 2 Communication and Internet Technologies, Chapter 3 Hardware ...15Decks343Flashcards15Learners -
Cloud Practioner
Cloud Practioner
By: Ser Jaime
Cloud Computing, Deployment Models, Global Infrastructure ...33Decks580Flashcards5Learners -
ITN 260
ITN 260
By: Joe Schmoe
Chapter 1 - introduction To Security, Chapter 15 - Risk Mitigation, Chapter 8 - Wireless Network Security ...15Decks567Flashcards5Learners -
Computer Science
Computer Science
By: Tom Gaming
Hardware, Utility Software, Networks And Security ...5Decks76Flashcards1Learner -
A-Level Computer Science
A-Level Computer Science
By: Ralph Hargreaves
Theory Of Computation, Regex Symbols, Fs Of Data Structures ...17Decks327Flashcards3Learners -
Computing
Computing
By: Alex Allen
1.1 embedded systems, 1.2 primary and secondary data, 1.2 - binary calculations ...14Decks291Flashcards1Learner -
BTEC ICT Unit 2 LO5-LO6 Content
BTEC ICT Unit 2 LO5-LO6 Content
By: Angelo mazrekaj
5.1 Data Types & Sources, 5.2 Data Flow Diagrams, 6.1 Security Principles ...8Decks68Flashcards7Learners -
SC900
SC900
By: keegz Whodis?
MS SC 900 Assessment, ITExams, WhizLabs ...27Decks628Flashcards23Learners -
AWS Solutions Architect Associate
AWS Solutions Architect Associate
By: Leo Crosa
IAM + EC2, Storage, Load Balancing ...23Decks1,260Flashcards2Learners -
Computer Science
Computer Science
By: Shirou Aizen
Hardware #1, Logical operations #2, Communication #3 ...14Decks353Flashcards3Learners -
AWS SysOps Questions
AWS SysOps Questions
By: Mohamed Tleis
Monitoring and Reporting, High Availability, Deployment & Provisioning ...5Decks135Flashcards1Learner -
AWS Associate Certificate
AWS Associate Certificate
By: Amar Singhal
EC2, RDS, Migration and Transfer ...17Decks501Flashcards4Learners -
Security
Security
By: elvis sanchez
1.1 Compare and contrast different types of social engineering techniques., 1.2 Given a scenario, analyze potential indicators to determine the type of attack., 1.3 Given a scenario, analyze potential indicators associated with application attacks. ...40Decks663Flashcards1Learner -
GCSE Computer science
GCSE Computer science
By: Noah Williams
3.1: binary, 3.2: data representation, 3.3: data storage and compressions ...14Decks365Flashcards3Learners