悟空视频

    在线播放云盘网盘BT下载影视图书

    Adversarial AI Attacks, Mitigations, and Defense Strategies - 图书

    2024计算机·理论知识
    导演:John Sotiropoulos
    “The book not only explains how adversarial attacks work but also shows you how to build your own test environment and run attacks to see how they can corrupt ML models. It's a comprehensive guide that walks you through the technical details and then flips to show you how to defend against these very same attacks.” – Elaine Doyle, VP and Cybersecurity Architect, Salesforce Key Features Understand the unique security challenges presented by predictive and generative A
    Adversarial AI Attacks, Mitigations, and Defense Strategies
    图书

    SQL Injection Attacks and Defense - 图书

    2009
    导演:Justin Clarke
    SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known information about these attacks and s...(展开全部)
    SQL Injection Attacks and Defense
    搜索《SQL Injection Attacks and Defense》
    图书

    SQL Injection Attacks and Defense - 图书

    2009
    导演:Justin Clarke
    SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known information about these attacks and s...(展开全部)
    SQL Injection Attacks and Defense
    搜索《SQL Injection Attacks and Defense》
    图书

    Cybersecurity:Attack and Defense Strategies - 图书

    2018计算机·计算机综合
    导演:Yuri Diogenes Erdal Ozkaya
    This book aims at IT professional who want to venture the IT security domain. IT pentester, Security consultants, and ethical hackers will also find this course useful. Prior knowledge of penetration testing would be beneficial.
    Cybersecurity:Attack and Defense Strategies
    搜索《Cybersecurity:Attack and Defense Strategies》
    图书

    Cross Site Scripting Attacks: Xss Exploits and Defense - 图书

    2007
    导演:Seth Fogie
    Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS i...(展开全部)
    Cross Site Scripting Attacks: Xss Exploits and Defense
    搜索《Cross Site Scripting Attacks: Xss Exploits and Defense》
    图书

    Cybersecurity Attacks:Red Team Strategies - 图书

    2020计算机·编程设计
    导演:Johann Rehberger
    It's now more important than ever for organizations to be ready to detect and respond to security events and breaches. Preventive measures alone are not enough for dealing with adversaries. A well-rounded prevention, detection, and response program is required. This book will guide you through the stages of building a red team program, including strategies and homefield advantage opportunities to boost security.The book starts by guiding you through establishing, managing, and measuring a red team program, including effective ways for sharing results and findings to raise awareness. Gradually, you'll learn about progressive operations such as cryptocurrency mining, focused privacy testing, targeting telemetry, and even blue team tooling. Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. Finally, you'll get to grips with protecting assets using decoys, auditing, and alerting with examples for major operating systems.By the end of this book, you'll have learned how to build, manage, and measure a red team program effectively and be well-versed with the fundamental operational techniques required to enhance your existing skills.
    Cybersecurity Attacks:Red Team Strategies
    搜索《Cybersecurity Attacks:Red Team Strategies》
    图书

    SQL Injection Attacks and Defense: 2nd Edition - 图书

    导演:Justin Clarke
    "SQL Injection Attacks and Defense, First Edition": Winner of the Best Book Bejtlich Read Award. "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage". (Richard Bejtlich, Tao Security blog). SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the I...(展开全部)
    SQL Injection Attacks and Defense: 2nd Edition
    搜索《SQL Injection Attacks and Defense: 2nd Edition》
    图书

    SQL Injection Attacks and Defense: 2nd Edition - 图书

    导演:Justin Clarke
    "SQL Injection Attacks and Defense, First Edition": Winner of the Best Book Bejtlich Read Award. "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage". (Richard Bejtlich, Tao Security blog). SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the I...(展开全部)
    SQL Injection Attacks and Defense: 2nd Edition
    搜索《SQL Injection Attacks and Defense: 2nd Edition》
    图书

    魔女Adversarial - 小说

    玄幻
    导演:林罡泞
    高中边缘人柠宁不知道为何连续做了一个月的噩梦 无一例外,梦都是那一个场景,黑白交加,杂乱无章,到了现实,她再次被引导到那个世界…
    魔女Adversarial
    搜索《魔女Adversarial》
    图书

    魔女Adversarial - 小说

    玄幻
    导演:林罡泞
    高中边缘人柠宁不知道为何连续做了一个月的噩梦 无一例外,梦都是那一个场景,黑白交加,杂乱无章,到了现实,她再次被引导到那个世界…
    魔女Adversarial
    搜索《魔女Adversarial》
    图书
    加载中...