悟空视频

    在线播放云盘网盘BT下载影视图书

    Hacking Exposed Malware Rootkits - 图书

    导演:Sean Bodmer
    "A harrowing guide to where the bad guys hide, and how you can find them." --Dan Kaminsky, Director of Penetration Testing, IOActive "An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Project Don't let another machine be...(展开全部)
    Hacking Exposed Malware Rootkits
    图书

    Hacking Exposed Malware Rootkits - 图书

    导演:Sean Bodmer
    "A harrowing guide to where the bad guys hide, and how you can find them." --Dan Kaminsky, Director of Penetration Testing, IOActive "An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Project Don't let another machine be...(展开全部)
    Hacking Exposed Malware Rootkits
    图书

    Hacking Exposed Wireless - 图书

    导演:Vincent Liu
    Secure Your Wireless Networks the Hacking Exposed Way Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes...(展开全部)
    Hacking Exposed Wireless
    搜索《Hacking Exposed Wireless》
    图书

    Hacking Exposed Wireless - 图书

    导演:Vincent Liu
    Secure Your Wireless Networks the Hacking Exposed Way Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes...(展开全部)
    Hacking Exposed Wireless
    搜索《Hacking Exposed Wireless》
    图书

    Designing BSD Rootkits: An Introduction to Kernel Hacking - 图书

    2007
    导演:Joseph Kong
    Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process. Organized as a tutorial, Designing BSD Rootkits will teach you the fundamentals of programming and ...(展开全部)
    Designing BSD Rootkits: An Introduction to Kernel Hacking
    搜索《Designing BSD Rootkits: An Introduction to Kernel Hacking》
    图书

    ROOTKITS - 图书

    导演:霍格兰德
    《ROOTKITS-Windows内核的安全防护》是目前第一本关于rootkit的详尽指南,包括rootkit的概念、它们是怎样工作的、如何构建和检测它们。世界顶级软件安全专家、rootkit.com创始人Greg Hoglund和James Butler向大家详细介绍攻击者是如何进入系统并长期驻留而不会被检测到的,以及黑客是如何摧毁Windows XP和Windows 2000内核系统的,其概念可以应用于现代任何主流操作系统。通过《ROOTKITS-Windows内核的安全防护》,读者可以全面掌握rootkit,提升自己的计算机安全防范能力。
    ROOTKITS
    搜索《ROOTKITS》
    图书

    ROOTKITS - 图书

    导演:霍格兰德
    《ROOTKITS-Windows内核的安全防护》是目前第一本关于rootkit的详尽指南,包括rootkit的概念、它们是怎样工作的、如何构建和检测它们。世界顶级软件安全专家、rootkit.com创始人Greg Hoglund和James Butler向大家详细介绍攻击者是如何进入系统并长期驻留而不会被检测到的,以及黑客是如何摧毁Windows XP和Windows 2000内核系统的,其概念可以应用于现代任何主流操作系统。通过《ROOTKITS-Windows内核的安全防护》,读者可以全面掌握rootkit,提升自己的计算机安全防范能力。
    ROOTKITS
    搜索《ROOTKITS》
    图书

    Hacking Exposed Linux, 3rd Edition: Linux Security Secrets and Solutions - 图书

    2008
    导演:ISECOM
    The Latest Linux Security Solutions This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts....(展开全部)
    Hacking Exposed Linux, 3rd Edition: Linux Security Secrets and Solutions
    搜索《Hacking Exposed Linux, 3rd Edition: Linux Security Secrets and Solutions》
    图书

    Mastering Malware Analysis - 图书

    2019计算机·理论知识
    导演:Alexey Kleymenov Amr Thabet
    Next, you will get to grips with obfuscation and anti-disassembly, anti-debugging, as well as anti-virtual machine techniques. This book will help you deal with modern cross-platform malware. Throughout the course of this book, you will explore real-world examples of static and dynamic malware analysis, unpacking and decrypting, and rootkit detection. Finally, this book will help you strengthen your defenses and prevent malware breaches for IoT devices and mobile platforms. By the end of this book, you will have learned to effectively analyze, investigate, and build innovative solutions to handle any malware incidents.
    Mastering Malware Analysis
    搜索《Mastering Malware Analysis》
    图书

    Hacking Android - 图书

    2016计算机·编程设计
    导演:Srinivasa Rao Kotipalli Mohammed A. Imran
    This book is for anyone who wants to learn about Android security. Software developers, QA professionals, and beginner- to intermediate-level security professionals will find this book helpful. Basic knowledge of Android programming would be a plus.
    Hacking Android
    搜索《Hacking Android》
    图书
    加载中...