您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. A Buffer Overflow Study Attacks and Defenses

  2. Introduction On november 2, 1988 a new form of threat appeared with the Morris Worm, also known as the Internet Worm. This famous event caused heavy damages on the internet, by using two common unix programs, sendmail and fingerd. This was possible
  3. 所属分类:Oracle

    • 发布日期:2009-10-13
    • 文件大小:496640
    • 提供者:zhoujq
  1. Army of botnets

  2. The trend toward smaller botnets may be more dangerous than large botnets, in terms of large-scale attacks like distributed denials of service. We examine the possibility of “super-botnets,” networks of independent botnets that can be coordinated fo
  3. 所属分类:网络基础

    • 发布日期:2009-10-23
    • 文件大小:221184
    • 提供者:borelist
  1. An Advanced Hybrid Peer-to-Peer Botnet

  2. A “botnet” consists of a network of compromised computers controlled by an attacker (“botmaster”). Recently botnets have become the root cause of many Internet attacks. To be well prepared for future attacks, it is not enough to study how to detect
  3. 所属分类:网络基础

    • 发布日期:2009-10-23
    • 文件大小:162816
    • 提供者:borelist
  1. AW Crimeware Understanding New Attacks and Defenses (2008)

  2. AW Crimeware Understanding New Attacks and Defenses (2008) .chm"
  3. 所属分类:专业指导

    • 发布日期:2010-05-09
    • 文件大小:10485760
    • 提供者:hcl925
  1. A Survey of Botnet Technology and Defenses

  2. A paper writed by Michael Bailey,Evan Cook,Farnam Jahanian,Yunjing Xu University of Michigan
  3. 所属分类:网络基础

    • 发布日期:2010-10-17
    • 文件大小:109568
    • 提供者:melo_1_5
  1. Pro PHP Security

  2. Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses, Second Edition
  3. 所属分类:PHP

    • 发布日期:2011-05-19
    • 文件大小:4194304
    • 提供者:airflying
  1. A Buffer Overflow Study - Attacks and Defenses (2002).pdf

  2. A Buffer Overflow Study - Attacks and Defenses (2002).pdf
  3. 所属分类:系统安全

    • 发布日期:2011-05-20
    • 文件大小:481280
    • 提供者:jacky44
  1. php security

  2. Pro PHP Security From Application Security Principles to the Implementation of XSS Defenses
  3. 所属分类:系统安全

    • 发布日期:2011-07-09
    • 文件大小:5242880
    • 提供者:enjoyxp
  1. Oracle黑客手册

  2. Oracle数据库的黑客讲解。While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creating defenses
  3. 所属分类:Oracle

    • 发布日期:2012-03-25
    • 文件大小:495616
    • 提供者:devs_302
  1. Practical Malware Analysis

  2. Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring. For those who want to stay ahead of the latest m
  3. 所属分类:系统安全

    • 发布日期:2012-09-26
    • 文件大小:9437184
    • 提供者:yorath
  1. Modern Operating System

  2. MODERN OPERATING SYSTEMS THIRD EDITION The third edition of this book differs from the second edition in numerous ways. To start with, the chapters have been reordered to place the central material at the beginning. There is also now more of a focus
  3. 所属分类:其它

    • 发布日期:2012-10-01
    • 文件大小:7340032
    • 提供者:babycat82721
  1. 缓冲区溢出的功与防(英文原版)

  2. 缓冲区溢出的功与防 <>
  3. 所属分类:专业指导

    • 发布日期:2008-07-31
    • 文件大小:496640
    • 提供者:helinpil
  1. Buffer Overflow Attacks and Defenses

  2. Buffer Overflow Attacks and Defenses
  3. 所属分类:专业指导

    • 发布日期:2008-08-02
    • 文件大小:350208
    • 提供者:helinpil
  1. A Framework to Gauge Cyber Defenses

  2. A Framework to Gauge Cyber Defenses, white paper, 2014
  3. 所属分类:网络攻防

    • 发布日期:2014-06-10
    • 文件大小:553984
    • 提供者:qq_15182549
  1. Android Security Attacks and Defenses

  2. Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming,
  3. 所属分类:Android

    • 发布日期:2014-11-13
    • 文件大小:13631488
    • 提供者:cserhz
  1. Android Security_Attacks and Defenses-Auerbach Publications(2013).pdf

  2. Android Security_Attacks and Defenses-Auerbach Publications(2013).pdf
  3. 所属分类:Android

    • 发布日期:2015-07-12
    • 文件大小:8388608
    • 提供者:baidu_29756015
  1. Android Security- Attacks and Defenses

  2. Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming,
  3. 所属分类:Android

    • 发布日期:2016-08-16
    • 文件大小:7340032
    • 提供者:jsntghf
  1. Android Security Attacks and Defenses

  2. Android Security Attacks and Defenses
  3. 所属分类:互联网

    • 发布日期:2019-01-16
    • 文件大小:13631488
    • 提供者:qq_22098033
  1. Adversarial Examples: Attacks and Defenses for Deep Learning

  2. 2019 review and taxonomy on adversarial examples and defenses
  3. 所属分类:其它

    • 发布日期:2019-02-20
    • 文件大小:5242880
    • 提供者:lynn901213
  1. 2019+Recent Attacks and Defenses on FPGA-based Systems.pdf

  2. 2019+Recent Attacks and Defenses on FPGA-based Systems.pdf
  3. 所属分类:其它

    • 发布日期:2020-06-04
    • 文件大小:1048576
    • 提供者:qq_35301188
« 12 3 »