搜索结果
找到约 13 项符合
Attacks 的查询结果
按分类筛选
软件设计/软件工程 A very good document about TCPIP protocol Possible Attacks.Very helpful for people write network app
A very good document about TCPIP protocol Possible Attacks.Very helpful for people write network applications
电源技术 智能电网安全性
Abstract: The rapid build out of today's smart grid raises a number of security questions. In this article,we review two recent well-documented security breaches and a report of a security gap. These situationsinclude a 2009 smart-meter hack in Puerto Rico; a 2012 password discovery in grid di ...
工控技术 工业系统安全问题和解决办法
Abstract: As industrial control systems (ICSs) have become increasingly connected and use more off-the-shelfcomponents, new vulnerabilities to cyber attacks have emerged. This tutorial looks at three types of ICSs:programmable logic controllers (PLCs), supervisory control and data acquisition (SCA ...
网络 The Network Security Response Framework (NSRF) allows for testing different computer security respon
The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses.
其他书籍 This text introduces the spirit and theory of hacking as well as the science behind it all it also p
This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks.
译作:《黑客入侵的艺术》,也是从朋友的宝箱中搜来的,以前层大 ...
其他 This code was used to produce simulation results described in: Using Directional Antennas to Pre
This code was used to produce simulation results described in:
Using Directional Antennas to Prevent Wormhole Attacks
Lingxuan Hu and David Evans. Network and Distributed System Security
Symposium, San Diego, 5-6 February 2004.
其他 This text introduces the spirit and theory of hacking as well as the science behind it all it also p
This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks.
我记得好像的关于缓冲区溢出的
文章/文档 Watermarking schemes evaluation Abstract鈥擠igital watermarking has been presented as a solution to c
Watermarking schemes evaluation
Abstract鈥擠igital watermarking has been presented as a solution to copy protection of multimedia objects and dozens of schemes and algorithms have been proposed. Two main problems seriously darken the future of this technology though.
Firstly, the large number of at ...
其他 Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough dat
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to ...
认证考试资料 What you always wanted to know about networking but were afraid to ask! * How networks and the In
What you always wanted to know about networking but were afraid to ask!
* How networks and the Internet work
* How to build coherent, cost-effective network infrastructures
* How to design networks for maximum reliability and availability
* What you need to know about data center and application ne ...