{"aaData":[[1,"Access control attacks and countermeasures<\/a>","0"],[2,"Kerberos<\/a>","0"],[3,"Account, log and journal monitoring","0"],[4,"Application system controls","0"],[5,"Access control techniques<\/a>","0"],[6,"Risk management<\/a>","0"],[7,"Risk mitigation<\/a>","0"],[8,"Access control objectives","0"],[9,"Non-repudiation<\/a>","0"],[10,"IPSec<\/a>","0"],[11,"TCP\/IP model and layers<\/a>","0"],[12,"E-mail security<\/a>","0"],[13,"Telecommunication infrastructures","0"],[14,"Encryption and decryption","0"],[15,"Networks and telecommunications management","0"],[16,"System development life cycle<\/a>","0"],[17,"Database management systems<\/a>","0"],[18,"Public key infrastructure (PKI)<\/a>","0"],[19,"Public key infrastructure (PKI)<\/a>","0"],[20,"Software prototyping and CASE tools","0"],[21,"System and application testing<\/a>","0"],[22,"Message digests and hash functions<\/a>","0"],[23,"Alternate sites<\/a>","0"],[24,"Business Continuity Planning (BCP)","0"],[25,"BCP\/DRP Events","0"],[26,"Risk assessment<\/a>","0"],[27,"BCP\/DRP controls","0"],[28,"Legal liability<\/a>","0"],[29,"Crit\u00c3\u0192\u00c2\u00a8res communs","0"]],"sEcho":"","iTotalRecords":29,"iTotalDisplayRecords":29}