Links
2 TERM
1 LESSON: Data protection measures
2 LESSON: Data protection measures Part 2
3 LESSON: Data protection measures Part 3, TwosComplement
4 LESSON: Methods of information systems protection
5 LESSON: Methods of information systems protection Part 2
6 LESSON: Malware
7 LESSON: SQL / Logic laws
8 LESSON:
9 LESSON:
10 LESSON: Information security
11 LESSON: Intellectual property
12 LESSON: Methods of intellectual property protection
13 LESSON: Making a text document
14 LESSON:
15 LESSON:
16 LESSON:
17 LESSON: Methods of system implementation
18 LESSON: New system implementation