您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Wireless Internet Security: Architecture and Protocols

  2. In describing tools for internet security, this title focuses on understanding the system architecture of existing security and on developing architectural changes for new security services. Topics include security threats in wireless networks, secu
  3. 所属分类:Access

  1. Anomaly-based network intrusion detection

  2. The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. In this context, anomal
  3. 所属分类:Web开发

    • 发布日期:2009-06-14
    • 文件大小:366592
    • 提供者:chenim2008
  1. Network Security Tools

  2. 介绍许多网络安全(Network Security )方面的应用软件工具,及其具体使用方法。
  3. 所属分类:网络基础

    • 发布日期:2009-09-12
    • 文件大小:1048576
    • 提供者:liuyuzhiii
  1. apache security 安全

  2. Preface Audience Scope Contents of This Book Online Companion Conventions Used in This Book Using Code Examples We'd Like to Hear from You Safari Enabled Acknowledgments C hapter 1. Apache Security Principles Section 1.1. Security Definitions Sectio
  3. 所属分类:Web开发

    • 发布日期:2009-10-12
    • 文件大小:1048576
    • 提供者:wwfwolf
  1. Analysis of the Storm and Nugache Trojans--P2P is here

  2. Since the advent of distributed intruder tools in the late 1990s, defenders have striven to identify and take down as much of the attack network as possible, as fast as possible.This has never been an easy task, owing in large part to thewide distri
  3. 所属分类:C

    • 发布日期:2010-05-01
    • 文件大小:278528
    • 提供者:borelist
  1. Addison+Wesley+Exploiting+Software+How+To+Break+Code

  2. How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers.
  3. 所属分类:其它

    • 发布日期:2010-07-23
    • 文件大小:4194304
    • 提供者:shmp2005
  1. Building Open Source Network Security Tools - Components and Techniques

  2. Building Open Source Network Security Tools - Components and Techniques
  3. 所属分类:C#

    • 发布日期:2008-02-27
    • 文件大小:3145728
    • 提供者:kittyjie
  1. Red Hat Linux Security And Optimization 2002

  2. Product Descr iption Red Hat Linux Security and Optimization is a reference for power-users and administrators covering all security issues, including Filesystems Security, Securing root accounts and Firewalls. Other Security books talk about how to
  3. 所属分类:Linux

    • 发布日期:2010-09-09
    • 文件大小:5242880
    • 提供者:shaoguangleo
  1. Linux Power Tools 2003

  2. Table of Contents Linux Power Tools Introduction Part I - Hardware Tools Chapter 1 - Optimizing System Architecture Usage Chapter 2 - Improving Disk Performance Chapter 3 - Using External Peripherals Part II - User Tools Chapter 4 - Mastering Shells
  3. 所属分类:Linux

    • 发布日期:2010-11-01
    • 文件大小:12582912
    • 提供者:shaoguangleo
  1. Designing a Wireless network

  2. Designing a Wireless networkForeword xxvFrom Past to Present 1Introduction 2Exploring Past Discoveries That Led to Wireless 4Discovering Electromagnetism 4Exploring Conduction 6Inventing the Radio 6Mounting Radio-Telephones in Cars 8Inventing Comput
  3. 所属分类:Access

    • 发布日期:2008-03-27
    • 文件大小:4194304
    • 提供者:osoon
  1. LINUX Network Administrator Guide-Linux 网络管理员指导教程

  2. Available via WWW ............................................................................................................. 14 Documentation Available Commercially..................................................................................
  3. 所属分类:Linux

    • 发布日期:2011-02-22
    • 文件大小:8388608
    • 提供者:shaoguangleo
  1. The .NET Developer

  2. The .NET Developer's Guide to Windows Security is required reading for .NET programmers who want to develop secure Windows applications. Readers gain a deep understanding of Windows security and the know-how to program secure systems that run on Win
  3. 所属分类:其它

    • 发布日期:2011-08-25
    • 文件大小:3145728
    • 提供者:jianghems
  1. Building Open Source+Network Security Tools-

  2. Building Open Source+Network Security Tools- Components and Techniques (Wiley2002.10)
  3. 所属分类:网络监控

    • 发布日期:2011-10-25
    • 文件大小:3145728
    • 提供者:praying
  1. Microsoft.Azure.Security.Infrastructure

  2. Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, sec
  3. 所属分类:网络安全

    • 发布日期:2017-01-12
    • 文件大小:9437184
    • 提供者:ramissue
  1. Network Security Tools By Justin Clarke, Nitesh Dhanjani

  2. This concise, high-end guide shows experienced administrators how to customize and extend popular open source security tools such as Nikto, Ettercap, and Nessus. It also addresses port scanners, packet injectors, network sniffers, and web assessment
  3. 所属分类:Web开发

    • 发布日期:2009-03-10
    • 文件大小:1048576
    • 提供者:cywang_net
  1. Network security with OpenSSL

  2. OpenSSL is a popular and effective open source version of SSL/TLS, the most widely used protocol for secure network communications. The only guide available on the subject, Network Security with OpenSSLdetails the challenges in securing network comm
  3. 所属分类:其它

    • 发布日期:2009-04-19
    • 文件大小:1048576
    • 提供者:feyyee
  1. THE PRACTICE OF NETWORK SECURITY MONITORING

  2. The goal of this book is to help you start detecting and responding to digital intrusions using networkcentric operations, tools, and techniques.
  3. 所属分类:网络安全

    • 发布日期:2018-09-03
    • 文件大小:18874368
    • 提供者:yangkehai1234
  1. Network Scanning Cookbook

  2. Network scanning is a discipline of network security that identifies active hosts on networks and determining whether there are any vulnerabilities that could be exploited. Nessus and Nmap are among the top tools that enable you to scan your network
  3. 所属分类:网络攻防

    • 发布日期:2018-10-19
    • 文件大小:28311552
    • 提供者:tlforest
  1. Network Security Through Data Analysis

  2. Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network t
  3. 所属分类:网络安全

    • 发布日期:2018-10-25
    • 文件大小:14680064
    • 提供者:sliencer
  1. 3dsmax security tools.zip

  2. 3dsmax 查毒杀毒工具。一键安装,查杀多种最新病毒。 Users affected by ALC and CRP experience broken undo functionality, deletion of lights, cameras and materials, which leads to instability and data loss. The origin of these scr ipts is unknown. For more information, pleas
  3. 所属分类:其它

    • 发布日期:2020-07-02
    • 文件大小:366592
    • 提供者:vegelate
« 12 3 4 5 6 7 8 9 10 »