您好,欢迎光临本网站![请登录][注册会员]  

安全技术下载,系统安全下载列表 第325页

« 1 2 ... .20 .21 .22 .23 .24 325.26 .27 .28 .29 .30 ... 2409 »

[系统安全] 漫谈兼容内核.7z

说明: 谈兼容内核之一:ReactOS怎样实现系统调用.pdf 漫谈兼容内核之二:关于kernel -win32的对象管理.pdf 漫谈兼容内核之三:关于kernel-win32的文件操作.pdf 漫谈兼容内核之四:Kernel-win32的进程管理.pdf 漫谈兼容内核之五:Kernel-win32的系统调用机制.pdf 漫谈兼容内核之六:二进制映像的类型识别.pdf 漫谈兼容内核之七:Wine的二进制映像装入和启动.pdf 漫谈兼容内核之八:ELF映像的装入_一_.pdf 漫谈兼容内核之九:ELF
<drjiachen> 上传 | 大小:3mb

[系统安全] 安全焦点文档精华.7z

说明: -------------------------------------------------------------------------------- 安全焦点简介 一、这个鬼地方 1、定位 全方位、非商业而且有自己独特风格的黑客及安全站点。 2、目的 a、整理和发掘网络安全、黑客方面技术文献及工具、代码。 b、发布我们——包括任何一个对安全有想法的朋友——的想法和发现,为大家提供发布文章及安全、黑客相关工具的园地。 c、结识更多有共同志向的朋友,共同研究、讨论网络安全的方方面面。
<drjiachen> 上传 | 大小:25mb

[系统安全] The art of exploitation.7z

说明: Preface This book explains the details of various hacking techniques, many of which get very technical. While the fundamental programming concepts that these hacking techniques build from are introduced in the book, general programming knowledge wil
<drjiachen> 上传 | 大小:1mb

[系统安全] [翻译]SQL注射技术总结文档.7z

说明: ====||目录||===== -------------------- 1、简介 2、漏洞测试 3、收集信息 4、数据类型 5、抓取密码 6、创建数据库帐号 7、MYSQL利用 8、服务名和配置 9、在注册表中找VNC密码 10、刺穿IDS认证 11、在MYSQL中使用char()欺骗 12、用注释躲避IDS认证 13、构造无引号的字符串
<drjiachen> 上传 | 大小:8kb

[系统安全] The Design and Implementation of the FreeBSD Operating System.7z

说明: Preface This book follows the earlier authoritative and full-length descr iptions of the design and implementation of the 4.3BSD and 4.4BSD versions of the UNIX system developed at the University of California at Berkeley. Since the final Berkeley r
<drjiachen> 上传 | 大小:6mb

[系统安全] FreeBSD开发手册.7z

说明: 欢迎您阅读《FreeBSD开发手册》。 这本手册还在不断由许多人继续书写。 许多章节还是空白,有的章节亟待更新。如果您对这个项目感兴趣并愿意有所贡献,请发信给 FreeBSD 文档计划邮件列表。    本文档的最新英文原始版本可从 FreeBSD Web 站点 获得, 由 FreeBSD 中文计划 维护的最新译本可以在 FreeBSD 中文计划 快照 Web 站点 和 FreeBSD 中文计划 文档快照 处获得, 这一译本会不断向主站同步。 此外,您也可以从 FreeBSD FTP 服务器 或
<drjiachen> 上传 | 大小:168kb

[系统安全] freebsdprotmode底层文档.7z

说明: A guide to how the FreeBSD kernel manages the IA32 processors in Protected Mode (c) 2004, Arne Vidstrom, http://vidstrom.net Version 1.0 : 2004-06-17 Table of contents 1. P REREQUISITE KNOWLEDGE ......................................................
<drjiachen> 上传 | 大小:91kb

[系统安全] BSD4.4设计手册.7z

说明: The Design and Implementation of the 4.4BSD Operating System Marshall Kirk McKusick Keith Bostic Michael J. Karels John S. Quarterman Copyright © 1996 Addison-Wesley Longman, Inc The second chapter of the book, The Design and Implementation of the 4
<drjiachen> 上传 | 大小:37kb

[系统安全] Wireless Crime and Forensic Investigation.7z

说明: Who Should Read This Book For those of you who have read my first book, Investigator’s Guide to Steganography , you will notice a similar style and organization in this book. I did my best to make this book readable for anyone, but it is, of course,
<drjiachen> 上传 | 大小:5mb

[系统安全] Internet Forensics .7z

说明: Because its so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually its your credit card number theyre after, and they wont stop there. Not just mere annoyances, these scams are real crimes
<drjiachen> 上传 | 大小:840kb

[系统安全] CRC Press - Investigating Computer-Related Crime.7z

说明: Preface The introduction of the IBM Personal Computer in 1982 fostered a technology revolution that has changed the way the world does business. Prior to that historic milestone, several personal computers existed, e.g., Apple, TRS 80, but they were
<drjiachen> 上传 | 大小:1mb

[系统安全] CRC Press - Cyber Forensics.7z

说明: Introduction As an auditor as well as researcher and author, I realize and value the importance of timely, well−focused, accurate information. It is with this philosophy in mind that the development of this project was undertaken. To the reader, a n
<drjiachen> 上传 | 大小:3mb
« 1 2 ... .20 .21 .22 .23 .24 325.26 .27 .28 .29 .30 ... 2409 »