悟空视频

    在线播放云盘网盘BT下载影视图书

    Infantry Attacks - 图书

    1995
    导演:Erwin Rommel
    Infantry Attacks
    图书

    Power Analysis Attacks - 图书

    导演:Elisabeth Oswald
    Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance. Power Analysis Attacks: Revealing the Secrets of Smart Cards is the first comprehensive trea...(展开全部)
    Power Analysis Attacks
    搜索《Power Analysis Attacks》
    图书

    SQL Injection Attacks and Defense - 图书

    2009
    导演:Justin Clarke
    SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known information about these attacks and s...(展开全部)
    SQL Injection Attacks and Defense
    搜索《SQL Injection Attacks and Defense》
    图书

    Cybersecurity Attacks:Red Team Strategies - 图书

    2020计算机·编程设计
    导演:Johann Rehberger
    It's now more important than ever for organizations to be ready to detect and respond to security events and breaches. Preventive measures alone are not enough for dealing with adversaries. A well-rounded prevention, detection, and response program is required. This book will guide you through the stages of building a red team program, including strategies and homefield advantage opportunities to boost security.The book starts by guiding you through establishing, managing, and measuring a red team program, including effective ways for sharing results and findings to raise awareness. Gradually, you'll learn about progressive operations such as cryptocurrency mining, focused privacy testing, targeting telemetry, and even blue team tooling. Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. Finally, you'll get to grips with protecting assets using decoys, auditing, and alerting with examples for major operating systems.By the end of this book, you'll have learned how to build, manage, and measure a red team program effectively and be well-versed with the fundamental operational techniques required to enhance your existing skills.
    Cybersecurity Attacks:Red Team Strategies
    搜索《Cybersecurity Attacks:Red Team Strategies》
    图书

    SQL Injection Attacks and Defense - 图书

    2009
    导演:Justin Clarke
    SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known information about these attacks and s...(展开全部)
    SQL Injection Attacks and Defense
    搜索《SQL Injection Attacks and Defense》
    图书

    The Zombie Survival Guide: Recorded Attacks - 图书

    导演:Max Brooks
    Product Description Those who don’t learn from history are condemned to repeat it. From the Stone Age to the information age, the undead have threatened to engulf the human race. They’re coming. They’re hungry. Don’t wait for them to come to you! This is the graphic novel the fans demanded: major zombie attacks from the dawn of humanity. On the African savannas, against the leg...(展开全部)
    The Zombie Survival Guide: Recorded Attacks
    搜索《The Zombie Survival Guide: Recorded Attacks》
    图书

    Adversarial AI Attacks, Mitigations, and Defense Strategies - 图书

    2024计算机·理论知识
    导演:John Sotiropoulos
    “The book not only explains how adversarial attacks work but also shows you how to build your own test environment and run attacks to see how they can corrupt ML models. It's a comprehensive guide that walks you through the technical details and then flips to show you how to defend against these very same attacks.” – Elaine Doyle, VP and Cybersecurity Architect, Salesforce Key Features Understand the unique security challenges presented by predictive and generative A
    Adversarial AI Attacks, Mitigations, and Defense Strategies
    搜索《Adversarial AI Attacks, Mitigations, and Defense Strategies》
    图书

    Cross Site Scripting Attacks: Xss Exploits and Defense - 图书

    2007
    导演:Seth Fogie
    Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS i...(展开全部)
    Cross Site Scripting Attacks: Xss Exploits and Defense
    搜索《Cross Site Scripting Attacks: Xss Exploits and Defense》
    图书

    SQL Injection Attacks and Defense: 2nd Edition - 图书

    导演:Justin Clarke
    "SQL Injection Attacks and Defense, First Edition": Winner of the Best Book Bejtlich Read Award. "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage". (Richard Bejtlich, Tao Security blog). SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the I...(展开全部)
    SQL Injection Attacks and Defense: 2nd Edition
    搜索《SQL Injection Attacks and Defense: 2nd Edition》
    图书

    SQL Injection Attacks and Defense: 2nd Edition - 图书

    导演:Justin Clarke
    "SQL Injection Attacks and Defense, First Edition": Winner of the Best Book Bejtlich Read Award. "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage". (Richard Bejtlich, Tao Security blog). SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the I...(展开全部)
    SQL Injection Attacks and Defense: 2nd Edition
    搜索《SQL Injection Attacks and Defense: 2nd Edition》
    图书
    加载中...