您好,欢迎光临本网站![请登录][注册会员]  

网络技术下载,网络基础下载列表 第8160页

« 1 2 ... .55 .56 .57 .58 .59 8160.61 .62 .63 .64 .65 ... 10316 »

[网络基础] As the Net Churns: Fast-Flux Botnet Observations

说明: While botnets themselves provide a rich platform for financial gain for the botnet master, the use of the infected hosts as webservers can provide an additional botnet use. Botnet herders often use fast-flux DNS techniques to host unwanted or illega
<borelist> 上传 | 大小:131kb

[网络基础] Measurements and Mitigation of Peer-to-Peer-based Botnets - A Case Study on Storm Worm

说明: Botnets, i.e., networks of compromised machines under a common control infrastructure, are commonly controlled by an attacker with the help of a central server: all compromised machines connect to the central server and wait for commands. However, t
<borelist> 上传 | 大小:1019kb

[网络基础] 加州圣巴巴拉大学(UCSB)的计算机病毒科学家们对僵尸网络torpig

说明: Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security threats on the Internet. A particularly sophisticated and insidious type of bot is Torpig, a malware program that is
<borelist> 上传 | 大小:784kb

[网络基础] Modeling Peer-to-Peer Botnets

说明: Peer-to-peer botnets are a relatively new yet rapidly growing Internet threat. In the year since its introduction in January 2007, the Storm Worm peer-to-peer botnet has become the largest botnet on the Internet. Unlike previous botnets operating ov
<borelist> 上传 | 大小:925kb

[网络基础] 09年计算机网络统考操作系统试题.doc

说明: 09年计算机统考操作系统试题是网络教育统考的必备资料
<programgp> 上传 | 大小:26kb

[网络基础] A Taxonomy of Botnet Structures

说明: We propose a taxonomy of botnet structures, based on their utility to the botmaster. We propose key metrics to measure their utility for various activities (e.g., spam, ddos). Using these performance metrics, we consider the ability of different res
<borelist> 上传 | 大小:280kb

[网络基础] A study of peer-to-peer botnets 国外的一片硕士论文

说明: Botnets pose a great threat to all resources connected to the Internet. Systems not properly secured may potentially become part of a botnet army, while all systems are potential targets of a botnet attack. Two important facets in mitigating the thr
<borelist> 上传 | 大小:899kb

[网络基础] 2009年9月全国计算机等级考试三级笔试试卷网络技术试题

说明: 2009年9月全国计算机等级考试三级笔试试卷网络技术试题 无答案
<wd1300> 上传 | 大小:299kb

[网络基础] 网络名人“久久”的网赚价绍

说明: 久久互联网被动财富学介绍互联网赚钱的内幕
<togu27929982> 上传 | 大小:725kb

[网络基础] 神经网络算法教程(天下第一)

说明: 神经网络算法教程。我可是花了很久把它弄成pdf的。这个很赞,很赞很赞。
<aadddss> 上传 | 大小:13mb

[网络基础] 电脑故障维修大全关于硬件软件各方面问题

说明: 关于电脑硬件各方面的问题都有。 常见系统故障 电脑小技巧 启动故障 死机故障 BLOS应用 DOS系统 98故障 Windows2000 Linux故障 XP故障 winnt系统 unix系统 NOVELL系统 病毒*加解密 打印机故障 扫描仪故障 电源故障 光驱刻录故障 局域网故障 内存故障 软驱故障 鼠标键盘故障 声卡故障 基础知识 网卡故障 网络设备故障 无盘网络 显示故障 显示器故障 硬盘故障 主板故障 CPU故障 网络连接故障 数据恢复技术 维修精华 30秒清除垃圾
<zeng57359931> 上传 | 大小:5mb

[网络基础] 网络流量统计,统计本机IP

说明: 监控本地网络,捕获一段时间内以本机为源或目的地址的IP数据包,统计IP数据包的信息,列出本机到相同目的地址或同一源地址到本机且数据包协议类型相同的数据包的数量。
<jiangcx099> 上传 | 大小:2mb
« 1 2 ... .55 .56 .57 .58 .59 8160.61 .62 .63 .64 .65 ... 10316 »