搜索:Attacks
找到约 15 项符合「Attacks」的查询结果
结果 15
按分类筛选
https://www.eeworm.com/dl/684/413019.html
软件设计/软件工程
A very good document about TCPIP protocol Possible Attacks.Very helpful for people write network app
A very good document about TCPIP protocol Possible Attacks.Very helpful for people write network applications
https://www.eeworm.com/dl/918609.html
技术资料
IPv6隧道代理机制中的DDoS攻击安全性分析Security analyzing DDoS Attacks on IPv6 Network
DDoS 攻击是当今IPv4 网络上最严重的威胁之一,IPv6 网络在安全性方面的设计十分优越,但由IPv4 过渡到IPv6 网络还需要一些转换机制,本文对转换机制中存在的安全问题进行了
https://www.eeworm.com/dl/635/177367.html
网络
The Network Security Response Framework (NSRF) allows for testing different computer security respon
The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses.
https://www.eeworm.com/dl/534/235440.html
其他
This code was used to produce simulation results described in: Using Directional Antennas to Pre
This code was used to produce simulation results described in:
Using Directional Antennas to Prevent Wormhole Attacks
Lingxuan Hu and David Evans. Network and Distributed System Security
Symposium, San Diego, 5-6 February 2004.
https://www.eeworm.com/dl/534/403180.html
其他
This text introduces the spirit and theory of hacking as well as the science behind it all it also p
This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks.
我记得好像的关于缓冲区溢出的 ...
https://www.eeworm.com/dl/542/192507.html
其他书籍
This text introduces the spirit and theory of hacking as well as the science behind it all it also p
This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks.
译作:《黑客入侵的艺术》,也是从朋友的宝 ...
https://www.eeworm.com/dl/534/466392.html
其他
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough dat
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much ...
https://www.eeworm.com/dl/698/493647.html
认证考试资料
What you always wanted to know about networking but were afraid to ask! * How networks and the In
What you always wanted to know about networking but were afraid to ask!
* How networks and the Internet work
* How to build coherent, cost-effective network infrastructures
* How to design networks for maximum reliability and availability
* What you need to know about data cente ...
https://www.eeworm.com/dl/518420.html
源码
The Universal Radio Hacker (URH)
The Universal Radio Hacker (URH) is a software for investigating unknown wireless protocols. Features include
* __hardware interfaces__ for common Software Defined Radios
* __easy demodulation__ of signals
* __assigning participants__ to keep overview of your data
* __customizab ...
https://www.eeworm.com/dl/569/40930.html
工控技术
工业系统安全问题和解决办法
Abstract: As industrial control systems (ICSs) have become increasingly connected and use more off-the-shelfcomponents, new vulnerabilities to cyber attacks have emerged. This tutorial looks at three types of ICSs:programmable logic controllers (PLCs), supervisory control and d ...