搜索资源列表
网络安全技术解析-20020920
- 本教程是面向对网络安全感兴趣的菜鸟们的,只要对网络安全感兴趣,无须计算机基础,就能轻松上手,赶快看看吧!也希望籍此结交高手,交流心得,扩大我们计算机从业人员队伍。-this tutorial is geared to network security Caidaomen interest, as long as network security interest, not computer based, it was easy to get started soon and see! Also
safety
- 信息网络安全方案(计算机安全论文:设计一个信息网络安全方案)。-information network security program (computer security thesis : designing an information network security solutions).
fff
- 计算机网络监听数据包,用VisualC++编程-computer network monitoring data packets with VisualC + + Programming
DirWatcherMFC
- 监视文件DirWatcher watches the file system and listens for file system change notifications and raises events when a directory, or file in a directory changes. DirWatcher can be used to watch directories on the local computer, a network drive, or a remot
DirWatcherDemoKit
- DirWatcher watches the file system and listens for file system change notifications and raises events when a directory, or file in a directory changes. DirWatcher can be used to watch directories on the local computer, a network drive, or a remote co
wangluobaojiequ
- 实现对网络安全的保障,对入侵计算机的数据包进行截取检测 -realization of network security for the protection of computer hacking of data packets for an interception Detection
anquan_mg
- 网络安全--取证与蜜罐(计算机取证技术部分).pdf-network security -- with the evidence Honeypot (Computer Forensics). Pdf
WPOLICY.ZIP
- 以前用delphi+kol写的监视工具,可以制定禁止某些程序的运行,如一些游戏的关键字。可通过网络升级数据库,也就是说在服务端一次更新关键字数据库,所有终端电脑同时更新。包内含有client和server的代码。-previously wrote Da surveillance tools could be developed to prohibit the operation of certain procedures, such as the keyword game. Through th
《黑客攻学兼防》
- 《黑客攻学兼防》让你更加了解计算机网络背后的秘密!黑客不再神秘!-"hacker attack and anti-science" allows you to a better understanding of the computer network behind the secret! Hackers no longer mysterious!
Network--System-VCPP
- 检测计算机的网络运行和上网环境的安全,如有病毒就进行提示-Detection of computer network operations and the security of the Internet environment, if the virus prompts
FUZZY-COGNITIVE-MAPS-FOR-DECISION-SUPPORT-IN-AN.r
- The “health” of a computer network needs to be assessed and protected in much the same manner as the health of a person. The task of an intrusion detection system is to protect a computer system by detecting and diagnosing attempted breaches
BadAndroid-v0.1
- BadAndroid v0.1 安卓恶意程序demo,仅供参考!-############################# ## BadAndroid v0.1 ## ## Android USB-Ethernet ## ## Emulation and DNS MitM ## ############################# ## Jakob Lell ## ## <jakob@srlabs.de>
