悟空视频

    在线播放云盘网盘BT下载影视图书

    Hacking Exposed Malware Rootkits - 图书

    导演:Sean Bodmer
    "A harrowing guide to where the bad guys hide, and how you can find them." --Dan Kaminsky, Director of Penetration Testing, IOActive "An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Project Don't let another machine be...(展开全部)
    Hacking Exposed Malware Rootkits
    图书

    Hacking Exposed Wireless - 图书

    导演:Vincent Liu
    Secure Your Wireless Networks the Hacking Exposed Way Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes...(展开全部)
    Hacking Exposed Wireless
    搜索《Hacking Exposed Wireless》
    图书

    Designing BSD Rootkits: An Introduction to Kernel Hacking - 图书

    2007
    导演:Joseph Kong
    Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process. Organized as a tutorial, Designing BSD Rootkits will teach you the fundamentals of programming and ...(展开全部)
    Designing BSD Rootkits: An Introduction to Kernel Hacking
    搜索《Designing BSD Rootkits: An Introduction to Kernel Hacking》
    图书

    ROOTKITS - 图书

    导演:霍格兰德
    《ROOTKITS-Windows内核的安全防护》是目前第一本关于rootkit的详尽指南,包括rootkit的概念、它们是怎样工作的、如何构建和检测它们。世界顶级软件安全专家、rootkit.com创始人Greg Hoglund和James Butler向大家详细介绍攻击者是如何进入系统并长期驻留而不会被检测到的,以及黑客是如何摧毁Windows XP和Windows 2000内核系统的,其概念可以应用于现代任何主流操作系统。通过《ROOTKITS-Windows内核的安全防护》,读者可以全面掌握rootkit,提升自己的计算机安全防范能力。
    ROOTKITS
    搜索《ROOTKITS》
    图书

    Hacking Android - 图书

    2016计算机·编程设计
    导演:Srinivasa Rao Kotipalli Mohammed A. Imran
    This book is for anyone who wants to learn about Android security. Software developers, QA professionals, and beginner- to intermediate-level security professionals will find this book helpful. Basic knowledge of Android programming would be a plus.
    Hacking Android
    搜索《Hacking Android》
    图书

    Mastering Malware Analysis - 图书

    2019计算机·理论知识
    导演:Alexey Kleymenov Amr Thabet
    Next, you will get to grips with obfuscation and anti-disassembly, anti-debugging, as well as anti-virtual machine techniques. This book will help you deal with modern cross-platform malware. Throughout the course of this book, you will explore real-world examples of static and dynamic malware analysis, unpacking and decrypting, and rootkit detection. Finally, this book will help you strengthen your defenses and prevent malware breaches for IoT devices and mobile platforms. By the end of this book, you will have learned to effectively analyze, investigate, and build innovative solutions to handle any malware incidents.
    Mastering Malware Analysis
    搜索《Mastering Malware Analysis》
    图书

    Windows Malware Analysis Essentials - 图书

    2015计算机·编程设计
    导演:Victor Marak
    This book is best for someone who has prior experience with reverse engineering Windows executables and wants to specialize in malware analysis. The book presents the malware analysis thought process using a show-and-tell approach, and the examples included will give any analyst confidence in how to approach this task on their own the next time around.
    Windows Malware Analysis Essentials
    搜索《Windows Malware Analysis Essentials》
    图书

    Rootkits: Subverting the Windows Kernel - 图书

    导演:Greg Hoglund
    "It's imperative that everybody working in the field of cyber-security read this book to understand the growing threat of rootkits." --Mark Russinovich, editor, Windows IT Pro / Windows & .NET Magazine "This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows securi...(展开全部)
    Rootkits: Subverting the Windows Kernel
    搜索《Rootkits: Subverting the Windows Kernel》
    图书

    Hacking: The Next Generation - 图书

    2009
    导演:Nitesh Dhanjani
    With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerg...(展开全部)
    Hacking: The Next Generation
    搜索《Hacking: The Next Generation》
    图书

    Cybersecurity Threats,Malware Trends,and Strategies - 图书

    2020计算机·理论知识
    导演:Tim Rains
    Cybersecurity Threats, Malware Trends, and Strategies shares numerous insights about the threats that both public and private sector organizations face and the cybersecurity strategies that can mitigate them.The book provides an unprecedented long-term view of the global threat landscape by examining the twenty-year trend in vulnerability disclosures and exploitation, nearly a decade of regional differences in malware infections, the socio-economic factors that underpin them, and how global malware has evolved. This will give you further perspectives into malware protection for your organization. It also examines internet-based threats that CISOs should be aware of.The book will provide you with an evaluation of the various cybersecurity strategies that have ultimately failed over the past twenty years, along with one or two that have actually worked. It will help executives and security and compliance professionals understand how cloud computing is a game changer for them.By the end of this book, you will know how to measure the effectiveness of your organization’s cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself.
    Cybersecurity Threats,Malware Trends,and Strategies
    搜索《Cybersecurity Threats,Malware Trends,and Strategies》
    图书
    加载中...