-
Hook系统服务隐藏端口源码及示例程序
Hook系统服务隐藏端口源码及示例程序-Hook System hidden source ports and sample program
- 2022-08-17 00:18:35下载
- 积分:1
-
read the internal kernel data structures, in order to get reliable information a
read the internal kernel data structures, in order to get reliable information about the system state (like list of all processes, including those "hidden" by rootkits, even by fu )
- 2023-08-21 06:05:03下载
- 积分:1
-
dos下的文件压缩算法程序
dos下的文件压缩算法程序-dos under the compression algorithm
- 2023-06-23 07:15:04下载
- 积分:1
-
D : vc Directory newweb images a voice net1 documents used to replace the W...
D:vc目录newweb images一个语音net1文档,用来替换WinSock截获的函数调用
- 2022-07-07 01:39:59下载
- 积分:1
-
用MFC编写的COM程序,包括客户端测试程序。
用MFC编写的COM程序,包括客户端测试程序。-COM using MFC prepared procedures, including client-side test procedure.
- 2022-04-27 11:15:58下载
- 积分:1
-
Windows 时间同步 自动时间同步 代码中可改几秒同步 适合网络游戏开加速时防T...
Windows 时间同步 自动时间同步 代码中可改几秒同步 适合网络游戏开加速时防T-Windows time synchronization automatic time synchronization code can be synchronized for a few seconds to speed up online games open when anti-T
- 2023-03-28 17:05:04下载
- 积分:1
-
Network security and VPN technology, video tutorial, I am very practical, it is...
网络安全及VPN技术的视频教程,很实用,值得-Network security and VPN technology, video tutorial, I am very practical, it is worth
- 2022-07-12 11:58:28下载
- 积分:1
-
网络入侵检测降维算法。它的作用是把捕获的数据进行分析,输出有用的信息。...
网络入侵检测降维算法。它的作用是把捕获的数据进行分析,输出有用的信息。-the algorithm about reducing demension in analysing the data for ids.
- 2022-11-27 02:35:03下载
- 积分:1
-
本书明确而详尽地阐述了Java平台安全性,探究了Java安全结构的内幕。本书首先概述了计算机和网络安全概念并解释了Java安全模型,并在此基础上,详细描述了Ja...
本书明确而详尽地阐述了Java平台安全性,探究了Java安全结构的内幕。本书首先概述了计算机和网络安全概念并解释了Java安全模型,并在此基础上,详细描述了Java 2平台中新增加的许多安全结构方面的措施,同时对Java安全性的实施提出了使用指导,描绘了如何定制、扩展和精化安全结构以及成功实现的技术细节。本书为建立安全、有效、强大和可移植的Java应用程序和applet提供了重要的信息,对于致力于研究Java平台的专业人员是一本必不可少的参考书。
-Clear and this book gives a comprehensive description of the Java platform security, Java security architecture explores the insider. The book begins with an overview of computer and network security concepts and explain the Java security model, and on this basis, a detailed description of the Java 2 platform in the new structure of a number of security measures, while the implementation of Java security proposed the use of guide, describing how to customize, expansion and refinement of the security structures, as well as the successful implementation of the technical details. The book for the establishment of safe, effective, powerful and portable Java applications and applet provides important information for the Java platform dedicated to the research profes
- 2022-02-24 21:17:59下载
- 积分:1
-
网络安全分析案例
网络安全分析案例-Network Security Analysis Case
- 2022-08-16 12:15:43下载
- 积分:1