您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. The Oracle Hacker

  2. 涉及oracle安全方面的知识。 Exploring every technique and tool used by black hat hackers to invade and compromise Oracle, this in-depth guide shows you how to find the weak spots in your databases so you can better defend them.
  3. 所属分类:Oracle

    • 发布日期:2009-06-01
    • 文件大小:495616
    • 提供者:waterlili
  1. Hacking Exposed Wireless

  2. Product Descr iption Secure Your Wireless Networks the Hacking Exposed Way Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless
  3. 所属分类:C#

    • 发布日期:2009-07-16
    • 文件大小:12582912
    • 提供者:szhourj
  1. Oracle Hacker

  2. Exploring every technique and tool used by black hat hackers to invade and compromise Oracle, this in-depth guide shows you how to find the weak spots in your databases so you can better defend them.
  3. 所属分类:Oracle

    • 发布日期:2009-07-26
    • 文件大小:495616
    • 提供者:xman_78tom
  1. Virus Writing Guide 1.0 for Win32.7z

  2. The autor of this document isn't responsible of any kind of damage that co- uld be made with the bad use of this information. The objective of this tu- torial is to teach people how to create, and defend againist the attack of a lame YAM virus :) Th
  3. 所属分类:其它

    • 发布日期:2009-09-05
    • 文件大小:78848
    • 提供者:lordhack
  1. An Advanced Hybrid Peer-to-Peer Botnet

  2. A “botnet” consists of a network of compromised computers controlled by an attacker (“botmaster”). Recently botnets have become the root cause of many Internet attacks. To be well prepared for future attacks, it is not enough to study how to detect
  3. 所属分类:网络基础

    • 发布日期:2009-10-23
    • 文件大小:162816
    • 提供者:borelist
  1. struts1.3.9.zip

  2. struts1.3.9 Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution a
  3. 所属分类:Java

    • 发布日期:2009-11-14
    • 文件大小:15728640
    • 提供者:xuqi2850661
  1. Flex 3 in Action

  2. This chapter makes the case why Flex is a great addition to your personal skill set or your organization. With buzzwords flying all over, a nonstop stream of websites with missing vowels in their names, and the Web 2.0 space on fire, a hodgepodge of
  3. 所属分类:Web开发

    • 发布日期:2010-01-23
    • 文件大小:8388608
    • 提供者:csye_cn
  1. Hacking Exposed Cisco Networks

  2. Defend against the sneakiest attacks by looking at your Cisco network through the eyes of the intruder. With the help of this step-by-step guide, you’ll prevent catastrophes by learning how new flaws in Cisco-centered networks are discovered and abu
  3. 所属分类:iOS

    • 发布日期:2010-02-01
    • 文件大小:9437184
    • 提供者:sorrymama
  1. Developer’s Guide to Web Application Security(syngress安全图书)

  2. Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vu
  3. 所属分类:Web开发

    • 发布日期:2010-04-05
    • 文件大小:10485760
    • 提供者:sunxianbin
  1. Modeling Peer-to-Peer Botnets

  2. Peer-to-peer botnets are a relatively new yet rapidly growing Internet threat. In the year since its introduction in January 2007, the Storm Worm peer-to-peer botnet has become the largest botnet on the Internet. Unlike previous botnets operating ov
  3. 所属分类:网络基础

    • 发布日期:2010-05-01
    • 文件大小:947200
    • 提供者:borelist
  1. f5 BIGIP V9 Full Proxy定义_WhatdoesFullProxyMean

  2. f5 配置 We’ve gone out with our full proxy messaging for v9 and NS has responded by claiming that they are a full proxy too. Currently, our FSEs are not equipped to defend our position and point out the differences of what we provide. We way we’re mor
  3. 所属分类:Proxy

    • 发布日期:2010-08-21
    • 文件大小:26624
    • 提供者:coolicetea
  1. JSON2.JS JSON.JS JSON_PARSE.JS

  2. json2.js: This file creates a JSON property in the global object, if there isn't already one, setting its value to an object containing a stringify method and a parse method. The parse method uses the eval method to do the parsing, guarding it with
  3. 所属分类:Javascript

    • 发布日期:2010-11-19
    • 文件大小:21504
    • 提供者:JHHJA
  1. Expert SQL Sever 2008 Encryption

  2. Every day organizations large and small fall victim to attacks on their data. Encryption provides a shield to help defend against intruders. Because of increasing pressure from government regulators, consumers, and the business community at large, t
  3. 所属分类:其它

    • 发布日期:2011-02-13
    • 文件大小:7340032
    • 提供者:bingcaihuang
  1. Mac Hackers Handbook

  2. Is this perception of security justifi ed, or has Mac OS X simply benefi ted from its low profi le up to this point? This book offers you a chance to answer this question for yourself. It provides the tools and techniques necessary to analyze thorou
  3. 所属分类:系统安全

    • 发布日期:2011-03-25
    • 文件大小:7340032
    • 提供者:dynasty_tang
  1. Struts2上传所需jar包

  2. Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by
  3. 所属分类:SUN

    • 发布日期:2011-09-01
    • 文件大小:3145728
    • 提供者:CarmemLove
  1. WarDriving Drive, Detect, Defend - A Guide to Wireless Security

  2. WarDriving: Drive, Detect, Defend: A Guide to Wireless Security by Chris Hurley, Michael Puchol, Russ Rogers and Frank Thornton Syngress Publishing © 2004 (524 pages
  3. 所属分类:网络安全

    • 发布日期:2011-09-09
    • 文件大小:38797312
    • 提供者:aaf812000
  1. CEH(道德黑客认证)学习指南

  2. Prepare for the new version of CEH certification with this advanced guide Once you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That's the philosophy behind ethical
  3. 所属分类:其它

    • 发布日期:2011-12-07
    • 文件大小:9437184
    • 提供者:dhyao11
  1. ActiveX METEOR Arcade Game. Defend the Earth from falling Me

  2. ActiveX METEOR Arcade Game. Defend the Earth from falling Meteors. Fast transparent sprite animation and fast collision detection using the (COLLIDE.BAS) collision detection module/engine.
  3. 所属分类:其它

    • 发布日期:2006-02-23
    • 文件大小:46080
    • 提供者:chenxh
  1. Linux Server Security: Hack and Defend

  2. Linux Server Security: Hack and Defend: Learn how to attack and defend the world’s most popular web server platform
  3. 所属分类:网络攻防

    • 发布日期:2018-01-11
    • 文件大小:2097152
    • 提供者:shuaigeng
  1. Defend-The-Pyramids-源码

  2. 捍卫金字塔
  3. 所属分类:其它

    • 发布日期:2021-03-17
    • 文件大小:34603008
    • 提供者:weixin_42165018
« 12 3 4 »