找回密码
 立即注册
programming编程andthe | 企业管理 2022-09-20 104 0star收藏 版权: . 保留作者信息 . 禁止商业使用 . 禁止修改作品
黑k的攻击与防卫是对立的两边,本书从编程和网络技术的视点,深入探讨了“攻”与“防”的技术,提供了一些主要用C/C++来描绘的有参考价值的代码。这些代码都已在VisualC++6.0或C++Builder5.0环境下编译调试通过。本书首要介绍了攻防编程的基础知识,如Windows内部机制简述,编程的方法、工具和技巧等;然后分析了特洛伊木马、扫描器、病毒等程序代码,揭露了多种黑k攻击的技术内情;介绍了很有参考价值的API函数及编程的好书、好网站,以便开辟读者的视界。本书还侧重介绍了自己防火墙方面的编程技术,为自己防火墙编程爱好者提供了有效的学习参考资料。
黑k攻防编程解析_潘志翔.pdf

(Hacker's attack and defense are opposite sides. From the perspective of programming and network technology, this book deeply discusses the "attack" and "defense" technologies, and provides some valuable codes that are mainly described in C/C  . These codes have been compiled and debugged in VisualC  6.0 or C  Builder5.0 environment. This book firstly introduces the basic knowledge of offensive and defensive programming, such as a brief description of the internal mechanism of Windows, programming methods, tools and skills, etc.; then analyzes Trojan horses, scanners, viruses and other program codes, and exposes the technical inside story of various hacker attacks ; Introduced the API functions of great reference value and the good books and websites of programming, in order to open up the readers' horizons. This book also focuses on the programming technology that introduced its own firewall, and provides effective learning reference materials for the lovers of firewall programming.
Hacker attack and defense programming analysis_Pan Zhixiang.pdf)

[下载]10321451777.rar




上一篇:CCSP认证视频教程-12
下一篇:密码故事_人类智力的另类较量