您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Hacking Exposed Web 2.0

  2. Lock down next-generation Web services “This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats.” –Max Kelly, CISSP, CIPP,
  3. 所属分类:Web开发

    • 发布日期:2009-07-16
    • 文件大小:6291456
    • 提供者:szhourj
  1. Buffer Overflow Attacks Detect, Exploit, Prevent(syngress安全图书)

  2. The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous w
  3. 所属分类:其它

    • 发布日期:2010-02-14
    • 文件大小:5242880
    • 提供者:sunxianbin
  1. 缓冲区溢出攻击教程(buffer overflow attack)

  2. 缓冲区溢出攻击教程(buffer overflow attack) Buffer+Overflow+Attacks+-+Detect+Exploit+Prevent.pdf
  3. 所属分类:网络攻防

    • 发布日期:2010-05-12
    • 文件大小:5242880
    • 提供者:heavendating
  1. 信息对抗技术-溢出攻击.

  2. information attack-defence buffer overflow
  3. 所属分类:网络攻防

    • 发布日期:2011-06-12
    • 文件大小:732160
    • 提供者:gjhzmy2
  1. buffer-overflow-attack

  2. buffer-overflow-attack.pdf buffer-overflow-attack.pdf
  3. 所属分类:网络安全

    • 发布日期:2011-08-09
    • 文件大小:704512
    • 提供者:zzz_781111
  1. 计算机网络第六版答案

  2. Computer Networking: A Top-Down Approach, 6th Edition Solutions to Review Questions and Problems Version Date: May 2012 This document contains the solutions to review questions and problems for the 5th edition of Computer Networking: A Top-Down Appr
  3. 所属分类:讲义

    • 发布日期:2015-06-14
    • 文件大小:2097152
    • 提供者:u014715363
  1. FPGA-Based Secret Key Distillation Engine Quantum Key Distribution Systems

  2. An FPGA-Based 4 Mbps Secret Key Distillation Engine for Quantum Key Distribution Systems.pdf IDQ QKD 论文,可以参考。J Sign Process Syst(2017)86: 1-15 they contain on average less than one photon. The receiver of leaked information and the information leake
  3. 所属分类:网络安全

    • 发布日期:2019-07-16
    • 文件大小:2097152
    • 提供者:ahnushe
  1. ctf入门手册.pdf

  2. CTF(Capture The Flag)中文一般译作夺旗赛,在网络安全领域中指的是网络安全技术人员之间进行技术竞技的一种比赛形式。CTF起源于1996年DEFCON全球黑客大会,以代替之前黑客们通过互相发起真实攻击进行技术比拼的方式。发展至今,已经成为全球范围网络安全圈流行的竞赛形式,2013年全球举办了超过五十场国际性CTF赛事。而DEFCON作为CTF赛制的发源地,DEFCON CTF也成为了目前全球最高技术水平和影响力的CTF竞赛,类似于CTF赛场中的“世界杯” 。2.4.7 Cucko
  3. 所属分类:网络攻防

    • 发布日期:2019-07-02
    • 文件大小:12582912
    • 提供者:weixin_43412967