搜索:Attacks

找到约 15 项符合「Attacks」的查询结果

结果 15
https://www.eeworm.com/dl/684/413019.html 软件设计/软件工程

A very good document about TCPIP protocol Possible Attacks.Very helpful for people write network app

A very good document about TCPIP protocol Possible Attacks.Very helpful for people write network applications
下载 116
·
查看 1090
https://www.eeworm.com/dl/918609.html 技术资料

IPv6隧道代理机制中的DDoS攻击安全性分析Security analyzing DDoS Attacks on IPv6 Network

DDoS 攻击是当今IPv4 网络上最严重的威胁之一,IPv6 网络在安全性方面的设计十分优越,但由IPv4 过渡到IPv6 网络还需要一些转换机制,本文对转换机制中存在的安全问题进行了
下载 2
·
查看 8139
https://www.eeworm.com/dl/635/177367.html 网络

The Network Security Response Framework (NSRF) allows for testing different computer security respon

The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses.
下载 198
·
查看 1064
https://www.eeworm.com/dl/534/235440.html 其他

This code was used to produce simulation results described in: Using Directional Antennas to Pre

This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego, 5-6 February 2004.
下载 75
·
查看 1090
https://www.eeworm.com/dl/534/403180.html 其他

This text introduces the spirit and theory of hacking as well as the science behind it all it also p

This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. 我记得好像的关于缓冲区溢出的 ...
下载 121
·
查看 1072
https://www.eeworm.com/dl/542/192507.html 其他书籍

This text introduces the spirit and theory of hacking as well as the science behind it all it also p

This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. 译作:《黑客入侵的艺术》,也是从朋友的宝 ...
下载 115
·
查看 1124
https://www.eeworm.com/dl/534/466392.html 其他

Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough dat

Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much ...
下载 82
·
查看 1133
https://www.eeworm.com/dl/698/493647.html 认证考试资料

What you always wanted to know about networking but were afraid to ask! * How networks and the In

What you always wanted to know about networking but were afraid to ask! * How networks and the Internet work * How to build coherent, cost-effective network infrastructures * How to design networks for maximum reliability and availability * What you need to know about data cente ...
下载 161
·
查看 1136
https://www.eeworm.com/dl/518420.html 源码

The Universal Radio Hacker (URH)

The Universal Radio Hacker (URH) is a software for investigating unknown wireless protocols. Features include * __hardware interfaces__ for common Software Defined Radios * __easy demodulation__ of signals * __assigning participants__ to keep overview of your data * __customizab ...
下载 2
·
查看 192
https://www.eeworm.com/dl/569/40930.html 工控技术

工业系统安全问题和解决办法

Abstract: As industrial control systems (ICSs) have become increasingly connected and use more off-the-shelfcomponents, new vulnerabilities to cyber attacks have emerged. This tutorial looks at three types of ICSs:programmable logic controllers (PLCs), supervisory control and d ...
下载 36
·
查看 1112