您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. The Craft of System Security

  2. The Craft of System Security by Sean Smith; John Marchesini List of Figures 1.1 An access control matrix 7 1.2 Security and state spaces 10 2.1 Example clearance order 26 2.2 Example categories order 27 2.3 Example MLS lattice 28 2.4 The *-Property
  3. 所属分类:Javascript

    • 发布日期:2009-05-22
    • 文件大小:5mb
    • 提供者:awubc2008
  1. ModSecurity Reference Manual

  2. Table of Contents Introduction .............................................................................................................................8 HTTP Traffic Logging ......................................................................
  3. 所属分类:Web开发

    • 发布日期:2009-09-04
    • 文件大小:512kb
    • 提供者:xti9er
  1. 王晓云教授的md5-attack的论文

  2. 这个是王晓云教授的关于破解md5的论文,对于密码学有兴趣的朋友,可以看一下。这个是英文的
  3. 所属分类:专业指导

    • 发布日期:2010-03-24
    • 文件大小:155kb
    • 提供者:yzgh10
  1. rsa加密攻击源程序

  2. rsa加密攻击源程序 C语言 This tool is supposed to help crackers who are cracking targets protected by RSA and who aren't attackable by the classic method of factoring i.e who'se modulus is > 400 bits. .How to use *********** It's very easy to use it once y
  3. 所属分类:互联网

    • 发布日期:2011-08-14
    • 文件大小:37kb
    • 提供者:piecewave
  1. 密码学算法协议c实现.pdf

  2. 加密散列函数 (消息摘要算法,MD算法)      加密散列函数   消息认证码   Keyed-hash message authentication code   EMAC (NESSIE selection MAC)   HMAC (NESSIE selection MAC; ISO/IEC 9797-1,FIPS and IETF RFC)   TTMAC 也称 Two-Track-MAC (NESSIE selection MAC; K.U.Leuven (Belgium) & de
  3. 所属分类:其它

  1. 白帽子讲web安全

  2. 第一篇 世界观安全 第 1 章 我的安全世界观 ................................................................................................ 2 1.1 Web 安全简史 ............................................................................................. 2 1.1.1 中国黑客简史 ....
  3. 所属分类:网络安全

    • 发布日期:2014-01-16
    • 文件大小:3mb
    • 提供者:heaven_zhu_1
  1. 王小云md5-attack.pdf

  2. Abstract. MD5 is one of the most widely used cryptographic hash func- tions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then by several authors. The best known result so far was a semi free-s
  3. 所属分类:其它

    • 发布日期:2008-10-31
    • 文件大小:184kb
    • 提供者:qqwuming
  1. Bulletproof SSL and TLS,PDF , Ivan Ristic

  2. Bulletproof SSL and TLS by Ivan Ristić Table of Contents Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
  3. 所属分类:网络基础

    • 发布日期:2017-09-27
    • 文件大小:7mb
    • 提供者:hintcnuie
  1. WAF规则编写指南

  2. 较为详细的介绍了使用modsecurity rule language编写Rule。WAF Rule Writing Guide em Table of contents 1 Introduction 1. 1 Document Purpose 1.2 Intended Audience 5 2 ModSecurity Rule Writing 2.1 Variables 2.2 Operator 2.3 Transformation Functions 7 2.4 Actions 2.5 Ru
  3. 所属分类:网络攻防

    • 发布日期:2019-03-01
    • 文件大小:1mb
    • 提供者:avatar_2009
  1. A Theoretic Reasoning on Finding Weak Input Differences for MD5: Part 1 Three Types of Differences and Their Properties.

  2. This series of papers make a theoretic reasoning on finding weak input differences for MD5 algorithm. Part 1 establishes a theory of signed difference for the differential collision attack on MDx and SHAx algorithms. Three types of differences includ
  3. 所属分类:其它

    • 发布日期:2021-02-11
    • 文件大小:338kb
    • 提供者:weixin_38576811