您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Hacking Exposed Wireless

  2. Product Descr iption Secure Your Wireless Networks the Hacking Exposed Way Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless
  3. 所属分类:C#

    • 发布日期:2009-07-16
    • 文件大小:12582912
    • 提供者:szhourj
  1. Hacking Exposed Web 2.0

  2. Lock down next-generation Web services “This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats.” –Max Kelly, CISSP, CIPP,
  3. 所属分类:Web开发

    • 发布日期:2009-07-16
    • 文件大小:6291456
    • 提供者:szhourj
  1. Silce channel attack document

  2. Side-channel attacks are easy-to-implement whilst powerful attacks against cryptographic implementations, and their targets range from primitives, protocols, modules, and devices to even systems. These attacks pose a serious threat to the security o
  3. 所属分类:其它

    • 发布日期:2009-07-17
    • 文件大小:1048576
    • 提供者:tonywang1227
  1. Army of botnets

  2. The trend toward smaller botnets may be more dangerous than large botnets, in terms of large-scale attacks like distributed denials of service. We examine the possibility of “super-botnets,” networks of independent botnets that can be coordinated fo
  3. 所属分类:网络基础

    • 发布日期:2009-10-23
    • 文件大小:221184
    • 提供者:borelist
  1. BlackICE Intrusion Countermeasures防火墙

  2. BlackICE PC Protection 防火墙,用的可能不多,但是东西还是不错的
  3. 所属分类:其它

    • 发布日期:2009-11-18
    • 文件大小:6291456
    • 提供者:alexbell
  1. Ethical Hacking & Countermeasures

  2. Ethical Hacking & Countermeasures
  3. 所属分类:Veritas

    • 发布日期:2010-01-07
    • 文件大小:7340032
    • 提供者:aaf812000
  1. A Classification of SQL Injection Attacks and countermeasure

  2. Halfond, W., J. Viegas, et al. (2006). A classification of SQL-injection attacks and countermeasures. 对SQL注入攻击的不同手段、不同目的和防御方法进行了整理
  3. 所属分类:其它

    • 发布日期:2010-02-28
    • 文件大小:147456
    • 提供者:restartboy
  1. 椭圆曲线密码学引论

  2. Overview The book has a strong focus on efficient methods for finite field arithmetic(Chapter 2) and elliptic curve arithmetic (Chapter 3). Next, Chapter 4 surveys theknown attacks on the ECDLP, and describes the generation and validation of domainp
  3. 所属分类:C#

    • 发布日期:2008-01-08
    • 文件大小:4194304
    • 提供者:Hearson
  1. 电力系统电压质量(英文版)

  2. 关于电力系统质量的英文书籍,个人觉得不错就发了。 1.Introduction 2.Harmonics and interharmonics 3.Voltage fluctuations and flicker 4.Voltage unbalance 5.Measurement and assessment of system perturbations 6.Countermeasures 7.Notes on practical procedures 8.Appendix
  3. 所属分类:硬件开发

    • 发布日期:2010-05-19
    • 文件大小:3145728
    • 提供者:zkjend
  1. CISSP in 21 Days

  2. Day 1: This chapter covers various concepts related to security management practices, control environment, and asset classification and controls. Day 2: This chapter discusses important requirements of security awareness and training as well as risk
  3. 所属分类:Access

    • 发布日期:2011-02-24
    • 文件大小:6291456
    • 提供者:cpckp
  1. Improving Web Application Security: Threats and Countermeasures

  2. Improving Web Application Security: Threats and Countermeasures
  3. 所属分类:Web开发

    • 发布日期:2008-05-29
    • 文件大小:6291456
    • 提供者:jobsen123
  1. On Recognizing Virtual Honeypots and Countermeasures

  2. On Recognizing Virtual Honeypots and Countermeasures
  3. 所属分类:网络安全

    • 发布日期:2011-12-26
    • 文件大小:177152
    • 提供者:geis1987
  1. A Survey on Attacks and Countermeasures in MANETs

  2. MANET的知名攻击和防御措施综述,对于了解这个网络的各种攻击和防御体系有所帮助
  3. 所属分类:网络基础

    • 发布日期:2012-03-10
    • 文件大小:165888
    • 提供者:my_cosmos
  1. Windows Vista: Exploitation Countermeasures

  2. Windows Vista: Exploitation Countermeasures
  3. 所属分类:系统安全

    • 发布日期:2013-12-17
    • 文件大小:1048576
    • 提供者:flypuam
  1. Mcts Mcpd Microsoft Press Improving Web Application Security Threats And Countermeasures

  2. Mcts Mcpd Microsoft Press Improving Web Application Security Threats And Countermeasures.chm
  3. 所属分类:Web开发

    • 发布日期:2009-03-18
    • 文件大小:6291456
    • 提供者:mslsimon
  1. Practical Hacking - Techniques and Countermeasures - M.Spivey

  2. Practical Hacking - Techniques and Countermeasures - M.Spivey
  3. 所属分类:系统安全

    • 发布日期:2018-05-31
    • 文件大小:149946368
    • 提供者:darling757267
  1. Countermeasures for Automatic Speaker Verification Replay Spoofing Attack : On Data Augmentation, Feature Representatio

  2. Countermeasures for Automatic Speaker Verification Replay Spoofing Attack : On Data Augmentation, Feature Representation, Classification and Fusion
  3. 所属分类:其它

    • 发布日期:2021-02-22
    • 文件大小:2097152
    • 提供者:weixin_38637764
  1. The SYSU System for the Interspeech 2015 Automatic Speaker Verification Spoofing and Countermeasures Challenge

  2. The SYSU System for the Interspeech 2015 Automatic Speaker Verification Spoofing and Countermeasures Challenge
  3. 所属分类:其它

    • 发布日期:2021-02-22
    • 文件大小:319488
    • 提供者:weixin_38575456
  1. Security Countermeasures for Time Synchronization in IEEE802.15.4e-based Industrial IoT

  2. Security Countermeasures for Time Synchronization in IEEE802.15.4e-based Industrial IoT
  3. 所属分类:其它

    • 发布日期:2021-02-11
    • 文件大小:834560
    • 提供者:weixin_38744803
  1. An Overview of MobileDevices Security Issues and Countermeasures

  2. An Overview of MobileDevices Security Issues and Countermeasures
  3. 所属分类:其它

    • 发布日期:2021-02-10
    • 文件大小:186368
    • 提供者:weixin_38715879
« 12 3 »