(System security is the courseware of the teacher, although it is a little messy, but the tools inside are good, and the stubborn file deletion command that I often use is attached.
Information Security\Hash function and digital signature.ppt
Information Security\Chapter 1 Introduction.ppt
Information Security\Chapter 2 Information Security Technology (1).ppt
Information Security\Chapter 2 Information Security Technology (2).ppt
Information Security\Chapter 3 Information Authentication Technology (1).ppt
Information Security\Chapter 3 Information Authentication Technology (2).ppt
Information Security\Chapter 4 Key Management Technology.ppt
Information Security\Chapter 5 Access Control.ppt
Information Security\Chapter 7 Network Security Technology.ppt
Information Security\Chapter 8 Information Security Standards.ppt
Information Security\Lesson 7 Access Control Statistics Backup.ppt
Information Security\The Seventh Lecture Prevention and Attack.ppt
Information Security\Chapter IX Network Security Technology.ppt
Information Security\Chapter 5 Key Management Technology.ppt
Information Security\Chapter 8 System Security.ppt
Information Security\Chapter VI Access Control Technology.ppt
Information Security\Chapter 4 PKI and PMI Authentication Technology.ppt
.....)