网络渗透攻击与安防修炼(完本)
这是一本关于网络渗/透攻击与防备的书本。全书共分为9章,主要内容包括:网络渗/透攻击行为及分析、攻击者如何打开渗/透突破口、渗/透中的侵/入与提权、远程控制侵/入、大型网络环境的深入探测、渗/透侵/入中的社会工程学等。本书与其他书本不一样的特征的地方在于,本书特别有效于性地以从前热炒一时的“侵/入腾讯事情”为例,以再现“侵/入腾讯事情”为过程,对渗/透侵/入进程进行了深入的分析揭秘。书中任何系统地解说了攻击者在渗/透中可能采纳的各种侵/入方法,并给出了高效的防备方案,有助于网络安全保护人员掌握黑k的攻击行为,更好地保护网络安全。本书可作为专业的网络安全管理人员、网络安全技术研究者阅读,在实践办公中具有极高的参考价值;也可作为相关专业学生的学习资料和参考资料。光盘中提供攻防实践演练与视频解说,以及书中触及的实例源代码。网络渗/透攻击与安防修炼\01_1-13.pdf
网络渗/透攻击与安防修炼\08_499-556.pdf
网络渗/透攻击与安防修炼\内容简介.doc
网络渗/透攻击与安防修炼\前语-N.doc
网络渗/透攻击与安防修炼\目录.doc
网络渗/透攻击与安防修炼\网络渗/透攻击与安防修炼--fm2.jpg
.....太多文件了略.....
(This is a book about network penetration/penetration attacks and prevention. The book is divided into 9 chapters, the main contents include: network penetration/penetration attack behavior and analysis, how attackers open penetration/penetration breaches, penetration/penetration and privilege escalation, remote control penetration/penetration, large-scale network environment In-depth detection, social engineering in penetration/penetration/intrusion, etc. The difference between this book and other books is that this book is particularly effective in taking the "invasion/invasion of Tencent" as an example, and the process of reproducing the "invasion/invasion of Tencent" as an example, to counter infiltration. The /penetration/intrusion process has been deeply analyzed to reveal the secrets. The book systematically explains the various intrusion/intrusion methods that attackers may adopt in infiltration/penetration, and gives efficient prevention plans, which helps network security protection personnel to grasp the attack behavior of hackers and better protect them. cyber security. This book can be read as a professional network security manager and a network security technology researcher. The CD-ROM provides offensive and defensive combat drills and video explanations, as well as the source code of the examples in the book.
Network penetration/penetration attack and security practice\01_1-13.pdf
Network penetration/penetration attack and security practice\08_499-556.pdf
Network penetration/penetration attack and security practice\Introduction.doc
Network penetration/penetration attack and security practice\Preface-N.doc
Network penetration/penetration attack and security practice\directory.doc
Network penetration/penetration attack and security practice\Network penetration/penetration attack and security practice--fm2.jpg
.....too many files .....)
页:
[1]