搜索:vulnerabilities

找到约 5 项符合「vulnerabilities」的查询结果

结果 5
https://www.eeworm.com/dl/534/391049.html 其他

Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a

Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the ...
下载 149
·
查看 1074
https://www.eeworm.com/dl/542/216216.html 其他书籍

Every day, patches are created to cover up security holes in software applications and operating sys

Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will ...
下载 104
·
查看 1118
https://www.eeworm.com/dl/519/452104.html 加密解密

An Introduction To Cryptography Chapter 1, “The Basics of Cryptography,” provides an overview of th

An Introduction To Cryptography Chapter 1, “The Basics of Cryptography,” provides an overview of the terminology and concepts you will encounter as you use PGP products. Chapter 2, “Phil Zimmermann on PGP,” written by PGP’s creator, contains discussions of security, privacy, ...
下载 79
·
查看 1134
https://www.eeworm.com/dl/569/40930.html 工控技术

工业系统安全问题和解决办法

Abstract: As industrial control systems (ICSs) have become increasingly connected and use more off-the-shelfcomponents, new vulnerabilities to cyber attacks have emerged. This tutorial looks at three types of ICSs:programmable logic controllers (PLCs), supervisory control and d ...
下载 36
·
查看 1112
https://www.eeworm.com/dl/620/152835.html Internet/网络编程

I. Introduction This code exploits a previously undisclosed vulnerability in the bit string deco

I. Introduction This code exploits a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in ...
下载 92
·
查看 1097