您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Web 2.0 Security - Defending Ajax, RIA, and SOA.pdf

  2. 一本关于Web2.0安全的好书,非常难得的pdf版本,作者是ajax安全的资深专家
  3. 所属分类:Web开发

    • 发布日期:2009-05-17
    • 文件大小:5242880
    • 提供者:mesphotos
  1. Self-Defending Networks: The Next Generation of Network Security

  2. Self-Defending Networks: The Next Generation of Network Security Duane De Capite Pages: 250
  3. 所属分类:其它

    • 发布日期:2009-12-27
    • 文件大小:4194304
    • 提供者:aaf812000
  1. wiley.the database hacker

  2. wiley.the database hacker's handbook defending database servers.chm
  3. 所属分类:其它

    • 发布日期:2010-01-04
    • 文件大小:1048576
    • 提供者:anole1203
  1. Wi-Foo By Andrew A. Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky

  2. Wi-Foo By Andrew A. Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky (The definitive guide to penetrating and defending wireless networks) Pages : 592
  3. 所属分类:其它

    • 发布日期:2010-01-17
    • 文件大小:6291456
    • 提供者:aaf812000
  1. The Database Hacker

  2. The Database Hacker's Handbook: Defending Database Servers 500 pages 有问题,我的QQ:571669275 Table of Contents The Database Hacker's Handbook — Defending Database Servers Preface Introduction Part I - Introduction Chapter 1 - Why Care About Database Secu
  3. 所属分类:其它

    • 发布日期:2010-01-22
    • 文件大小:1048576
    • 提供者:aaf812000
  1. Buffer Overflow Attacks Detect, Exploit, Prevent(syngress安全图书)

  2. The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous w
  3. 所属分类:其它

    • 发布日期:2010-02-14
    • 文件大小:5242880
    • 提供者:sunxianbin
  1. Combating Spyware in the Enterprise(syngress安全图书)

  2. Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware. Combating Spyware in the Enterprise begins by examining the various types of insidious spyware an
  3. 所属分类:Web开发

    • 发布日期:2010-03-01
    • 文件大小:7340032
    • 提供者:sunxianbin
  1. The database hacker

  2. The database hacker's handbook:Defending Database Servers
  3. 所属分类:其它

    • 发布日期:2010-03-25
    • 文件大小:1048576
    • 提供者:zhangzhang_1
  1. The Oracle Hacker

  2. The Oracle Hacker's Handbook: Hacking and Defending Oracle The Oracle Hacker's Handbook: Hacking and Defending Oracle The Oracle Hacker's Handbook: Hacking and Defending Oracle
  3. 所属分类:Oracle

    • 发布日期:2010-04-11
    • 文件大小:495616
    • 提供者:software8420
  1. The Database Hacker

  2. The Database Hacker's Handbook Defending Database Servers
  3. 所属分类:其它

    • 发布日期:2010-06-29
    • 文件大小:1048576
    • 提供者:max18
  1. Practical UNIX & Internet Security

  2. Practical UNIX & Internet Security英文版 chm 号称1004页一本老书,但是unix的基本原理,与网络安全的基本原理还是值得学习的Table of ContentsPrefacePart I: Computer Security BasicsChapter 1: IntroductionChapter 2: Policies and GuidelinesPart II: User ResponsibilitiesChapter 3: Users and Pa
  3. 所属分类:网络基础

    • 发布日期:2008-02-27
    • 文件大小:2097152
    • 提供者:Stewart
  1. SybilGuard defending against sybil attacks via social networks

  2. Using social networks to counter sybil attack, published in IEEE TRANSACTIONS
  3. 所属分类:其它

    • 发布日期:2011-01-22
    • 文件大小:372736
    • 提供者:my_cosmos
  1. Wiley.The Database Hacker Handbook-Defending Database Servers

  2. Wiley.The Database Hacker Handbook-Defending Database Servers
  3. 所属分类:网络安全

    • 发布日期:2011-04-05
    • 文件大小:1048576
    • 提供者:pwolf520
  1. IDA Pro反汇编学习资料

  2. The theater of the information security professional has changed drastically in recent years. We are no longer tasked with defending critical organizational assets from the unwelcome inquiry of curious youth; we, as a community, are now faced with f
  3. 所属分类:网络攻防

    • 发布日期:2011-06-10
    • 文件大小:3145728
    • 提供者:dqsh06
  1. Guidelines for the management of IT evidence

  2. IT证据管理的指导准则 HB 171—2003 Preface This handbook has been prepared by Committee IT/012, Information Systems, Security and Identification Technology. It is intended for use as a reference document by a variety of audiences, including— a) executives and
  3. 所属分类:其它

    • 发布日期:2012-01-25
    • 文件大小:492544
    • 提供者:johnny_jiang
  1. Web Application Defender

  2. 最畅销的书 保护您的Web应用程序免受黑客和攻击者 Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Applic
  3. 所属分类:网络管理

    • 发布日期:2013-06-05
    • 文件大小:14680064
    • 提供者:ascdfz
  1. Theoretical and Experimental Methods for Defending Against DDoS Attacks 无水印pdf

  2. Theoretical and Experimental Methods for Defending Against DDoS Attacks 英文无水印pdf pdf所有页面使用FoxitReader和PDF-XChangeViewer测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 本资源转载自网络,如有侵权,请联系上传者或csdn删除
  3. 所属分类:其它

    • 发布日期:2017-10-11
    • 文件大小:8388608
    • 提供者:u011433684
  1. Defending Against Distance Cheating in Link-Weighted Application-Layer Multicast

  2. Defending Against Distance Cheating in Link-Weighted Application-Layer Multicast
  3. 所属分类:其它

    • 发布日期:2021-02-21
    • 文件大小:903168
    • 提供者:weixin_38686041
  1. Defending Against SYN Flood Attack under Asymmetric Routing Environment

  2. Defending Against SYN Flood Attack under Asymmetric Routing Environment
  3. 所属分类:其它

    • 发布日期:2021-02-11
    • 文件大小:820224
    • 提供者:weixin_38626075
  1. Defending Against Man-In-The-Middle Attack in Repeated Games

  2. Defending Against Man-In-The-Middle Attack in Repeated Games
  3. 所属分类:其它

    • 发布日期:2021-02-07
    • 文件大小:262144
    • 提供者:weixin_38600696
« 12 »