您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Measurements and Mitigation of Peer-to-Peer-based Botnets - A Case Study on Storm Worm

  2. Botnets, i.e., networks of compromised machines under a common control infrastructure, are commonly controlled by an attacker with the help of a central server: all compromised machines connect to the central server and wait for commands. However, t
  3. 所属分类:网络基础

    • 发布日期:2010-05-01
    • 文件大小:1043456
    • 提供者:borelist
  1. Hack the Stack Using Snort and Ethereal to Master the 8 Layers of an Insecure Netork

  2. Product Descr iption This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnera
  3. 所属分类:微软认证

    • 发布日期:2010-10-03
    • 文件大小:12582912
    • 提供者:sunxianbin
  1. IXIA Security_Presentation

  2. Security Solution – Key Highlights 6000+ unique attacks with first release Million of attack permutations with protocol fuzzing Bi-weekly attack updates Ability to mutate and fuzz exploitsand attacks to avoid detection –IP fragmentation, TCP segment
  3. 所属分类:其它

    • 发布日期:2010-11-17
    • 文件大小:1048576
    • 提供者:ddding_bj
  1. Writing Secure Code

  2. During February and March of 2002, all normal feature work on Microsoft Windows stopped. Throughout this period, the entire development team turned its attention to improving the security of the next version of the product, Windows .NET Server 2003.
  3. 所属分类:其它

    • 发布日期:2011-06-23
    • 文件大小:2097152
    • 提供者:birdshome
  1. Hacker Web Exploitation Uncovered

  2. Book Descr iption: A descr iption and analysis of the vulnerabilities caused by programming errors in Web applications, this book is written from both from the attacker's and security specialist's perspective. Covered is detecting, investigating, ex
  3. 所属分类:Web开发

    • 发布日期:2008-05-12
    • 文件大小:563200
    • 提供者:nouoo
  1. pyloris-3.2-win32

  2. Using HTTPLoris is simple. In its most basic form, HTTPLoris merely needs a copy of Python 2.6. On a Linux machine, one must simply invoke the scr ipt in a terminal, stating a site to test: motoma@rocksalt:/home/motoma$ python pyloris-3.0.py motomas
  3. 所属分类:网络安全

    • 发布日期:2012-03-17
    • 文件大小:6291456
    • 提供者:yatere
  1. ms05039.rar

  2. MS05-039 Scan v1.0,这是一款基于Windows 下快速检测和分析的安全扫描工具,可以正确识别那些容易遭受MS05-039 安全公告下溢出的Microsoft 操作系统。相关漏洞链接:http://www.microsoft.com/china/technet/security/bulletin/MS05-039.mspx------------------------------------------------------------------------------M
  3. 所属分类:Web开发

    • 发布日期:2008-06-18
    • 文件大小:71680
    • 提供者:xubiniq
  1. VANET连通性可扩展性研究

  2. 本文献讨论了三种在车辆自组织网络中的可能遇到的挑战,第一种挑战是抵御入侵。由于在车辆自组织网络中缺少一个协作单元,车辆之间应该互相协作,相互监测,从而提升所在网络的运行安全。第二个挑战就是可伸缩性对网络设计者而言是一个很大的问题。一种解决办法是将网络分成簇,而且成簇对于大规模车辆自组织网络资源利用效率和负载平衡也是至关重要的。另一方面,由于拓扑结构和车辆密度变化很快,车辆发送和接收消息的传播范围是一个很重要的问题
  3. 所属分类:其它

    • 发布日期:2012-05-23
    • 文件大小:75776
    • 提供者:antimazi
  1. NC原版与VC60版本

  2. 软件介绍: 工具名:Netcat 作者:Hobbit && Chris Wysopal 类别:开放源码 平台:Linux/BSD/Unix/Windows WINDOWS下版本号:[v1.10 NT] 参数介绍: *nc.exe -h*即可看到各参数的使用方法。 基本格式:nc [-options] hostname port[s] [ports] … nc -l -p port [options] [hostname] [port] -d 后台模式 -e prog 程序重定向,一旦连接,就执
  3. 所属分类:C

    • 发布日期:2012-07-18
    • 文件大小:123904
    • 提供者:xinyueliu
  1. A Novel RFID Authentication Protocol with Ownership Transfer.doc

  2. A Novel RFID Authentication Protocol with Ownership Transfer Han Jia1, Jun Wen2 School of Computer Science and Technology, University of Electronic Science and Technology of China,Chengdu, China 1depart@126.com, 2wenjun@uestc.edu.cn Abstract. RFID t
  3. 所属分类:网络安全

    • 发布日期:2012-11-19
    • 文件大小:158720
    • 提供者:zqt520
  1. Rootkits: Subverting the Windows Kernel

  2. The term rootkit has been around for more than 10 years. A rootkit is a "kit" consisting of small and useful programs that allow an attacker to maintain access to "root," the most powerful user on a computer. In other words, a rootkit is a set of pr
  3. 所属分类:Access

    • 发布日期:2008-10-26
    • 文件大小:2097152
    • 提供者:lhongbei
  1. Web Craker

  2. Welcome to Webcracker! This software will allow you to test your restricted-access website to make sure that only authorized users are able to get in. Webcracker is a security tool that allows you to attempt to "crack" id and password combinations o
  3. 所属分类:Web开发

    • 发布日期:2008-11-06
    • 文件大小:760832
    • 提供者:zxoicq530
  1. 计算机网络第六版答案

  2. Computer Networking: A Top-Down Approach, 6th Edition Solutions to Review Questions and Problems Version Date: May 2012 This document contains the solutions to review questions and problems for the 5th edition of Computer Networking: A Top-Down Appr
  3. 所属分类:讲义

    • 发布日期:2015-06-14
    • 文件大小:2097152
    • 提供者:u014715363
  1. Enterprise Cybersecurity(Apress,2015)

  2. Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing al
  3. 所属分类:网络安全

    • 发布日期:2015-06-28
    • 文件大小:22020096
    • 提供者:vanridin
  1. Hadoop.Security.Protecting.Your.Big.Data.Platform.1491900989

  2. As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to prote
  3. 所属分类:互联网

    • 发布日期:2015-07-14
    • 文件大小:3145728
    • 提供者:ramissue
  1. SecureCodingGuide

  2. Secure coding is the practice of writing programs that are resistant to attack by malicious or mischievous people or programs. Secure coding helps protect a user’s data from theft or corruption. In addition, an insecure program can provide access fo
  3. 所属分类:其它

    • 发布日期:2016-03-25
    • 文件大小:1048576
    • 提供者:molingduzun123
  1. Understanding Network Hacks(Springer,2015)

  2. This book explains how to see one’s own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing,
  3. 所属分类:Python

    • 发布日期:2016-05-10
    • 文件大小:10485760
    • 提供者:vanridin
  1. Basic.Security.Testing.with.Kali.Linux.2.153050656

  2. Basic Security Testing with Kali Linux 2 Kali Linux 2 (2016) is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use, so they can find security issues before the bad guys do. In Basic Securit
  3. 所属分类:系统安全

    • 发布日期:2016-07-25
    • 文件大小:15728640
    • 提供者:ramissue
  1. NTP Security(Apress,2016)

  2. Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks while deploying and managing the protocol. You will be able to reduce the disruption of communication between servers on the network and the risk th
  3. 所属分类:其它

    • 发布日期:2017-02-14
    • 文件大小:1048576
    • 提供者:vanridin
  1. WinArpAttacker

  2. winarpattakcer 需要先安装winpcap,本文件自带 本软件仅供研究学习使用,不可用来做坏事啦~
  3. 所属分类:网络监控

    • 发布日期:2017-03-10
    • 文件大小:790528
    • 提供者:waterdemo22
« 1 23 4 »