您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Security Warrior

  2. What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how you
  3. 所属分类:其它

    • 发布日期:2008-12-03
    • 文件大小:4194304
    • 提供者:denkin
  1. Ws-attackerpart1

  2. wsattacker网站 安全 检测
  3. 所属分类:网络攻防

    • 发布日期:2017-08-28
    • 文件大小:52428800
    • 提供者:cexo19842004
  1. Basic Security Testing with Kali Linux 2

  2. Basic Security Testing with Kali Linux 2 Kali Linux 2 (2016) is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use, so they can find security issues before the bad guys do. In Basic Securit
  3. 所属分类:网络攻防

    • 发布日期:2017-10-23
    • 文件大小:15728640
    • 提供者:jingmliu
  1. Attacking Network Protocols

  2. Attacking Network Protocols is a deep dive into network protocol security from James ­Forshaw, one of the world’s leading bug ­hunters. This comprehensive guide looks at networking from an attacker’s perspective to help you discover, exploit, and ul
  3. 所属分类:网络攻防

    • 发布日期:2018-01-12
    • 文件大小:29360128
    • 提供者:a56562626206
  1. Intrusion Detection: Network Security beyond the Firewall

  2. Introduction Preface Acknowledgments PART 1—Before Intrusion Detection: Traditional Computer Security Chapter 1—Intrusion Detection and the Classic Security Model Back to Basics: The Classic Security Model Goals of Computer Security Learn to Ask Tou
  3. 所属分类:Access

  1. Active Man in the Middle Atacks

  2. With an Active MitM attack targeting Web Applications, an attacker can steal users' private data for any site he chooses if his victim uses a public network to read the latest news headlines or weather report on an 'uninteresting' site. In addition,
  3. 所属分类:Web开发

    • 发布日期:2009-03-04
    • 文件大小:300032
    • 提供者:beiune
  1. Hacker Web Exploitation Uncovered

  2. Written from both from the attacker's and security specialist's perspective, this thorough guide uncovers how attackers can benefit from the hosted target and why an apparently normal-working application might be vulnerable.
  3. 所属分类:Web开发

    • 发布日期:2009-03-10
    • 文件大小:568320
    • 提供者:frustreated2
  1. 很不错的基于WLAN安全方面的资料

  2. Wireless communications are becoming ubiquitous in homes, offices, and enterprises with the popular IEEE 802.11 wireless LAN technology and the up-andcoming IEEE 802.16 wireless MAN technology. The wireless nature of communications defined in these
  3. 所属分类:Access

    • 发布日期:2009-03-13
    • 文件大小:2097152
    • 提供者:whaichong
  1. Attacking Network Protocols

  2. Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft's top bug hunter. This comprehensive guide looks at networking from an attacker's perspective to help you find, exploit, and ultimately pro
  3. 所属分类:网络安全

    • 发布日期:2018-04-03
    • 文件大小:12582912
    • 提供者:idter
  1. Syngress - Violent Python

  2. "Violent Python" shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Pytho
  3. 所属分类:专业指导

    • 发布日期:2018-04-28
    • 文件大小:1048576
    • 提供者:weixin_42075047
  1. arp模拟发包工具

  2. arp攻击工具,可以模拟arp请求发包,连续发包。是常用的网络调试工具。也可以用来做arp攻击的压力测试
  3. 所属分类:硬件开发

    • 发布日期:2018-06-06
    • 文件大小:826368
    • 提供者:github_39002886
  1. Understanding Network Hacks - Attack and Defense with Python (2015)

  2. This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing,
  3. 所属分类:网络攻防

    • 发布日期:2018-08-10
    • 文件大小:5242880
    • 提供者:qq_20553017
  1. Apple Secure Coding Guide 2012

  2. Secure coding is the practice of writing programs that are resistant to attack by malicious or mischievous people or programs. Secure coding helps protect a user’s data from theft or corruption. In addition, an insecure program can provide access fo
  3. 所属分类:C

    • 发布日期:2018-08-18
    • 文件大小:1048576
    • 提供者:albertsouthwell
  1. 思科IPS产品线安装部署指南V3

  2. IPS 4200 典型功能如下: 1、IPS sensor自身的drop packet能力, 当一个signature检测到攻击,在in-line的时候Action中可设置以下三种操作,对包进行丢弃: • Deny Attacker Inline • Deny Connection Inline • Deny Packet Inline 2、IDS与其他设备联动阻断攻击 ,即blocking 功能。 sensor上有一个network access controller,控制相关联动设备的bl
  3. 所属分类:网络设备

    • 发布日期:2018-08-29
    • 文件大小:5242880
    • 提供者:qq_43090288
  1. Efficient Defenses Against Adversarial Attacks

  2. Deep learning has proven its prowess across a wide range of computer vision applications, from visual recognition to image generation [17]. Their rapid deployment in critical systems, like medical imaging, surveillance systems or security-sensitive
  3. 所属分类:网络攻防

    • 发布日期:2018-10-04
    • 文件大小:897024
    • 提供者:weixin_43200792
  1. Kali_Linux_Web_Penetration_Testing_Cookbook

  2. Key Features, Familiarize yourself with the most common web vulnerabilities a web application faces, and understand how attackers take advantage of themSet up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run e
  3. 所属分类:网络安全

    • 发布日期:2018-11-28
    • 文件大小:22020096
    • 提供者:u010296996
  1. FPGA-Based Secret Key Distillation Engine Quantum Key Distribution Systems

  2. An FPGA-Based 4 Mbps Secret Key Distillation Engine for Quantum Key Distribution Systems.pdf IDQ QKD 论文,可以参考。J Sign Process Syst(2017)86: 1-15 they contain on average less than one photon. The receiver of leaked information and the information leake
  3. 所属分类:网络安全

    • 发布日期:2019-07-16
    • 文件大小:2097152
    • 提供者:ahnushe
  1. Android代码-PassCard

  2. PassCard Android Password Card Generator Application You can take your password card in any place you go. Application dont need extra permissions or internet access. And it runs locally. The idea is simple: generate a password card that has your pa
  3. 所属分类:其它

    • 发布日期:2019-08-06
    • 文件大小:729088
    • 提供者:weixin_39840924
  1. Android代码-JCProfiler

  2. JCProfiler Performance profiler for JavaCard code The performance profiling of JavaCard applet code is a notoriously difficult task. As the card environment is build to protect the stored and processed secrets against an attacker with direct physica
  3. 所属分类:其它

    • 发布日期:2019-08-06
    • 文件大小:101376
    • 提供者:weixin_39840387
  1. Android代码-QR Scanner

  2. Privacy Friendly QR Scanner The Privacy Friendly QR Scanner belongs to the group of Privacy Friendly Apps. The app supports its users in detecting malicious links: QR Codes provide new possibilities for an attacker, as QR Codes can contain malicious
  3. 所属分类:其它

    • 发布日期:2019-08-07
    • 文件大小:542720
    • 提供者:weixin_39841848
« 1 2 34 »