搜索结果

找到约 5 项符合 vulnerabilities 的查询结果

其他 Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a

Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. ...
https://www.eeworm.com/dl/534/391049.html
下载: 149
查看: 1044

工控技术 工业系统安全问题和解决办法

Abstract: As industrial control systems (ICSs) have become increasingly connected and use more off-the-shelfcomponents, new vulnerabilities to cyber attacks have emerged. This tutorial looks at three types of ICSs:programmable logic controllers (PLCs), supervisory control and data acquisition (SCA ...
https://www.eeworm.com/dl/569/40930.html
下载: 36
查看: 1058

Internet/网络编程 I. Introduction This code exploits a previously undisclosed vulnerability in the bit string deco

I. Introduction This code exploits a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04-007 patch. ...
https://www.eeworm.com/dl/620/152835.html
下载: 92
查看: 1056

其他书籍 Every day, patches are created to cover up security holes in software applications and operating sys

Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one st ...
https://www.eeworm.com/dl/542/216216.html
下载: 104
查看: 1093

加密解密 An Introduction To Cryptography Chapter 1, “The Basics of Cryptography,” provides an overview of th

An Introduction To Cryptography Chapter 1, “The Basics of Cryptography,” provides an overview of the terminology and concepts you will encounter as you use PGP products. Chapter 2, “Phil Zimmermann on PGP,” written by PGP’s creator, contains discussions of security, privacy, and the vulnerabili ...
https://www.eeworm.com/dl/519/452104.html
下载: 79
查看: 1077