52ky 发表于 2022-9-19 17:56:12

黑k攻防实践详解

本人微信:veiduoliya欢迎大家加我。本书是《黑k攻防实践入门》的姊妹篇,由邓吉、柳靖编著,电子工业出书社2006年出书。本书从“攻”、“防”两个不一样的视点,通过实际中的侵/入实例,并联系作者的心得体会,图文并茂地再现了网络侵/入与防护的全进程。本书共分3篇共11章,系统地介绍了侵/入的全面进程,以及相应的防护方法和方法。其间包括信息的收集、基于认证的侵/入及防护、基于漏洞的侵/入及防护、基于木马的侵/入及防护、侵/入中的隐藏技术、侵/入后的留后门以及清足迹技术。本书用图解的方法对每一个侵/入过程都进行了详细的分析,以估测侵/入者的侵/入意图;对侵/入进程中常见的问题进行了必要的说明与回答;并对一些常见的侵/入手段进行了对比与分析,以方便读者理解侵/入者常用的方法、方法,捍卫网络安全。本资料共包括以下附件:
黑k攻防实践详解.pdf
.....

(My WeChat: veiduoliya welcome everyone to add me. This book is the companion volume of "Introduction to Hacker Attack and Defense", edited by Deng Ji and Liu Jing, and published by Electronic Industry Publishing House in 2006. From the two different viewpoints of "attack" and "defense", this book reproduces the whole process of network intrusion/intrusion and protection with pictures and texts through actual intrusion/intrusion examples and the author's experience. This book is divided into 3 parts and 11 chapters, which systematically introduces the comprehensive process of intrusion/intrusion, and the corresponding protection methods and methods. It includes information collection, authentication-based intrusion/intrusion and protection, vulnerability-based intrusion/intrusion and protection, Trojan-based intrusion/intrusion and protection, hidden technology during intrusion/intrusion, backdoor after intrusion/intrusion, and cleanup. footprint technology. This book uses a graphical method to analyze each intrusion/intrusion process in detail to estimate the intrusion/intrusion intention of the intruder; necessary explanations and answers to common problems in the intrusion/intrusion process; And some common intrusion/intrusion methods are compared and analyzed to facilitate readers to understand the methods and methods commonly used by intruders/intruders to defend network security. This document includes the following attachments:
Detailed explanation of hacker attack and defense.pdf
.....)




页: [1]
查看完整版本: 黑k攻防实践详解