Wi-Foo By Andrew A. Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky (The definitive guide to penetrating and defending wireless networks) Pages : 592
The Database Hacker's Handbook: Defending Database Servers 500 pages 有问题,我的QQ:571669275 Table of Contents The Database Hacker's Handbook — Defending Database Servers Preface Introduction Part I - Introduction Chapter 1 - Why Care About Database Secu
The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous w
Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware. Combating Spyware in the Enterprise begins by examining the various types of insidious spyware an
The Oracle Hacker's Handbook: Hacking and Defending Oracle The Oracle Hacker's Handbook: Hacking and Defending Oracle The Oracle Hacker's Handbook: Hacking and Defending Oracle
Practical UNIX & Internet Security英文版 chm 号称1004页一本老书,但是unix的基本原理,与网络安全的基本原理还是值得学习的Table of ContentsPrefacePart I: Computer Security BasicsChapter 1: IntroductionChapter 2: Policies and GuidelinesPart II: User ResponsibilitiesChapter 3: Users and Pa
The theater of the information security professional has changed drastically in recent years. We are no longer tasked with defending critical organizational assets from the unwelcome inquiry of curious youth; we, as a community, are now faced with f
IT证据管理的指导准则 HB 171—2003 Preface This handbook has been prepared by Committee IT/012, Information Systems, Security and Identification Technology. It is intended for use as a reference document by a variety of audiences, including— a) executives and
最畅销的书 保护您的Web应用程序免受黑客和攻击者 Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Applic
Theoretical and Experimental Methods for Defending Against DDoS Attacks 英文无水印pdf pdf所有页面使用FoxitReader和PDF-XChangeViewer测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 本资源转载自网络,如有侵权,请联系上传者或csdn删除