Producer and Consumer Code
Message Passing
Synchronization With Messages
Buffering Model
Multiprocessor Techniques
First Job
Decipher
Security Infrastructure
Goals: Confidentiality
Goals: Integrity
Goals: Availability
Policies
Mechanisms
Enforcement Media
Threat and Attack
Information Security
Threat Perception and Cost of Security
Cryptography: кρυπτο γραφη(hidden writing)
Cryptography |