找回密码
 立即注册
intrusionandTheprotection | 企业管理 2022-09-20 116 0star收藏 版权: . 保留作者信息 . 禁止商业使用 . 禁止修改作品
书是《黑k攻防实践入门》的姊妹篇,从“攻”、“防”两个不一样的视点,通过现实中的侵/入实例,并联系作者的心得体会,图文并茂地再现了网络侵/入与防护的全进程。本书共分3篇共11章,系统地介绍了侵/入的全面进程,以及相应的防护方法和方法。其中包括信息的收集、基于认证的侵/入及防护、基于漏洞的侵/入及防护、基于木马的侵/入及防护、侵/入中的隐藏技术、侵/入后的留后门以及清脚印技术。本书用图解的方法对每一个侵/入过程都进行了详细的分析,以估测侵/入者的侵/入意图;对侵/入进程中常见的问题进行了必要的说明与回答;并对一些常见的侵/入手法进行了对比与分析,以方便读者理解侵/入者常用的方法、方法,保卫网络安全。
黑k攻防实践详解.pdf
.....

(The book is the companion volume of "Introduction to Hacker Attack and Defense". From the two different perspectives of "attack" and "defense", through real intrusion/intrusion examples, and the author's experience and experience, it reproduces network intrusion/intrusion with pictures and texts. The entire process of entry and protection. This book is divided into 3 parts and 11 chapters, which systematically introduces the comprehensive process of intrusion/intrusion, and the corresponding protection methods and methods. These include information collection, authentication-based intrusion/intrusion and protection, vulnerability-based intrusion/intrusion and protection, Trojan-based intrusion/intrusion and protection, hidden technology during intrusion/intrusion, backdoor after intrusion/intrusion, and clearing Footprint technology. This book uses a graphical method to analyze each intrusion/intrusion process in detail to estimate the intrusion/intrusion intention of the intruder; necessary explanations and answers to common problems in the intrusion/intrusion process; And some common intrusion/intrusion methods are compared and analyzed, in order to facilitate readers to understand the methods and methods commonly used by intruders/intruders to protect network security.
Detailed explanation of hacker attack and defense.pdf
.....)

[下载]10311506429.rar




上一篇:Commvault防火墙配置手册
下一篇:WEB安全技术培训