您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Buffer Overflow Attacks - Detect Exploit Prevent.rar

  2. Buffer Overflow Attacks - Detect Exploit Prevent.rar
  3. 所属分类:网络安全

    • 发布日期:2007-11-06
    • 文件大小:2097152
    • 提供者:wanfustudio
  1. SQL Injection Attacks and Defense.pdf

  2. SQL Injection Attacks and Defense.pdf
  3. 所属分类:其它

    • 发布日期:2009-12-05
    • 文件大小:6291456
    • 提供者:abcd1234123
  1. Buffer Overflow Attacks

  2. Buffer Overflow Attacks James C. Foster Vitaly Osipov Nish Bhalla Niels Heinen
  3. 所属分类:C

    • 发布日期:2009-12-22
    • 文件大小:5242880
    • 提供者:aaf812000
  1. Buffer Overflow Attacks Detect, Exploit, Prevent(syngress安全图书)

  2. The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous w
  3. 所属分类:其它

    • 发布日期:2010-02-14
    • 文件大小:5242880
    • 提供者:sunxianbin
  1. Geographic Profiling of Terrorist Attacks

  2. Through the use of a computerized geographic profiling system and two case studies, this chapter examines the applicability of geographic profiling in the context of terrorist attacks. The findings of this examination are somewhat mixed with a final
  3. 所属分类:专业指导

    • 发布日期:2010-02-24
    • 文件大小:359424
    • 提供者:wsdsgfuqiang
  1. Buffer Overflow Attacks

  2. Buffer Overflow Attacks
  3. 所属分类:电子政务

    • 发布日期:2010-04-18
    • 文件大小:5242880
    • 提供者:hunnu
  1. SQL Injection Attacks and Defense

  2. English, PDF, SQL Injection Attacks and Defense
  3. 所属分类:其它

    • 发布日期:2010-06-03
    • 文件大小:3145728
    • 提供者:pinkmomo027
  1. Cube Attacks on Tweakable Black Box Polynomials

  2. Almost any cryptographic scheme can be described by tweakable polynomials over GF(2), which contain both secret variables (e.g., key bits) and public variables (e.g., plaintext bits or IV bits). The cryptanalyst is allowed to tweak the polynomials b
  3. 所属分类:其它

    • 发布日期:2010-12-23
    • 文件大小:252928
    • 提供者:shuaimengxia
  1. SQL注入(SQL Injection Attacks and Defense)

  2. SQL Injection Attacks and Defense pdf; Chapter 1 What Is SQL Injection Chapter 2 Testing for SQL Injection Chapter 3 Reviewing Code for SQL Injection Chapter 4 Exploiting SQL Injection ....
  3. 所属分类:Java

    • 发布日期:2011-04-14
    • 文件大小:6291456
    • 提供者:oddstar78
  1. Attacks on WebView in the Android System

  2. Attacks on WebView in the Android System
  3. 所属分类:Android

    • 发布日期:2012-08-18
    • 文件大小:1048576
    • 提供者:irobert0126
  1. Buffer Overflow Attacks and Defenses

  2. Buffer Overflow Attacks and Defenses
  3. 所属分类:专业指导

    • 发布日期:2008-08-02
    • 文件大小:350208
    • 提供者:helinpil
  1. 802.11 Attacks

  2. 802.11 Attacks
  3. 所属分类:网络基础

  1. Malicious Attacks, Threats, and Vulnerabilities

  2. Malicious Attacks, Threats, and Vulnerabilities
  3. 所属分类:网络监控

    • 发布日期:2014-04-13
    • 文件大小:578560
    • 提供者:u014694607
  1. Android Security Attacks and Defenses

  2. Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming,
  3. 所属分类:Android

    • 发布日期:2014-11-13
    • 文件大小:13631488
    • 提供者:cserhz
  1. Time synchronization attacks in sensor networks

  2. Time synchronization attacks in sensor networks 无线网络中的时间同步攻击
  3. 所属分类:网络基础

    • 发布日期:2014-12-13
    • 文件大小:351232
    • 提供者:a392370988
  1. Optical Fault Induction Attacks

  2. 关于Side Channel Attacks 的书
  3. 所属分类:专业指导

    • 发布日期:2008-10-28
    • 文件大小:516096
    • 提供者:tian_tqz
  1. DDoS Attacks Evolution Detection Prevention Reaction and Tolerance 无水印pdf 0分

  2. DDoS Attacks Evolution Detection Prevention Reaction and Tolerance 英文无水印pdf pdf使用FoxitReader和PDF-XChangeViewer测试可以打开
  3. 所属分类:专业指导

    • 发布日期:2016-12-13
    • 文件大小:9437184
    • 提供者:u011433684
  1. Chained Exploits Advanced Hacking Attacks from Start to Finish 无水印原版pdf

  2. Chained Exploits Advanced Hacking Attacks from Start to Finish 英文无水印原版pdf pdf所有页面使用FoxitReader、PDF-XChangeViewer、SumatraPDF和Firefox测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 查看此书详细信息请在美国亚马逊官网搜索此书
  3. 所属分类:其它

    • 发布日期:2017-12-16
    • 文件大小:11534336
    • 提供者:u011433684
  1. Buffer Overflow Attacks - Detect Exploit Prevent

  2. Buffer Overflow Attacks - Detect Exploit Prevent 英文版本
  3. 所属分类:Java

    • 发布日期:2009-03-11
    • 文件大小:5242880
    • 提供者:rainballdh
  1. Client-Side Attacks and Defense 无水印原版pdf

  2. Client-Side Attacks and Defense 英文无水印原版pdf pdf所有页面使用FoxitReader、PDF-XChangeViewer、SumatraPDF和Firefox测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 查看此书详细信息请在美国亚马逊官网搜索此书
  3. 所属分类:其它

    • 发布日期:2018-05-03
    • 文件大小:13631488
    • 提供者:u011433684
« 12 3 4 5 6 7 8 9 10 ... 27 »