找回密码
 立即注册
攻击网络Network防备 | 家庭/个人应用 2022-09-09 57 0star收藏 版权: . 保留作者信息 . 禁止商业使用 . 禁止修改作品
【资料作者】牛少彰,江为强【出版社】邮电大学出版社?目录第一篇网络攻击与防备概论第1章网络攻击与防备的前史、现状与发展趋势1.1网络与黑k的前史1.2网络攻击技术的回忆与演化1.3网络安全技术的现状与发展第2章网络攻击与防备与方法2.1网络攻击的意图2.2网络攻击的方法分类2.3网络安全策略2.4网络防备的方法分类2.5网络攻击与防备的博弈第3章网络攻击与防备模型3.1网络攻击的整体模型描绘3.2网络防备的原理及模型3.3网络攻防实训方式建设的总体方案第二篇网络攻击篇第4章获取方案系统信息4.1获取攻击方案主机的系统信息4.2获取网络信息的基本工具4.3信息踩点4.4信息查点4.5实验:端口扫描第5章方案主机的系统故障发掘技术5.1系统故障也许造成的损害5.2系统故障的分类5.3系统的首要漏洞分类5.4几种常见漏洞的分析5.5漏洞库及其使用5.6故障发掘的进程与方法5.7获取系统故障的工具5.8实验:漏洞扫描第6章网络攻击身份欺骗6.1IP欺骗攻击6.2与IP协议相关的欺骗手法6.3别的身份欺骗手法6.4实验:ARP欺骗第7章网络攻击行为躲藏第……

(【Author】Niu Shaozhang, Jiang Weiqiang 【Press】University of Posts and Telecommunications History 1.2 Memories and Evolution of Network Attack Technology 1.3 Current Situation and Development of Network Security Technology Chapter 2 Network Attack and Prevention and Methods The game with defense Chapter 3 Network attack and defense model 3.1 Overall model description of network attack 3.2 The principle and model of network defense 3.3 The overall plan for the construction of network attack and defense training methods Chapter 4 Network attack Chapter 4 Obtaining program system information 4.1 4.2 Basic tools to obtain network information 5.4 Analysis of Several Common Vulnerabilities 5.5 Vulnerability Library and Its Use 5.6 Process and Methods of Fault Discovery 5.7 Tools for Obtaining System Faults 5.8 Experiment: Vulnerability Scanning Chapter 6 Network Attack Identity Spoofing 6.1 IP Spoofing Attack 6.2 IP Protocol Related spoofing techniques 6.3 Other identity spoofing techniques 6.4 Experiment: ARP spoofing Chapter 7 Cyberattack Hiding Chapter 7)

[下载]13061193713.rar




上一篇:价值77亿美元的McAfee来跟你谈谈什么是安全悖论
下一篇:五步学会数据丢失预防