文件名称:Network-penetration-Attack
-
所属分类:
- 标签属性:
- 上传时间:2012-11-16
-
文件大小:1.43mb
-
已下载:1次
-
提 供 者:
-
相关连接:无下载说明:别用迅雷下载,失败请重下,重下不扣分!
介绍说明--下载内容来自于网络,使用问题请自行百度
黑客的基本攻击方法及原理,以及一些简单软件应用。
网络渗透攻击事件的发生极为普遍,众多的网络管理员和网络安全工作者却对网络安全环境所面临的严峻考验缺乏足够的认识,因而也未曾采取全面的防范补救措施应对各种攻击行为。《孙子兵法》曰“知已知彼,百战不殆;不知彼而知已,一胜一负;不知彼不知已,每战必败”。建立有效的防御体系的惟一障碍是知识的不足。不论你是一位信息安全技术的爱好者、一位IT专家或一名有经验的信息安全实践者,只要你想建立起一个有效的防御体系,就必须了解黑客们所使用的基本工具和手段。
以“网络渗透攻击”为切入点,就是要让实训对象认清网络安全环境和网络渗透入侵的一些普遍规律,并有针对性的补充知识和采取全面的防范补救措施,为网络防御提供事件依据和需求来源。力争打破常规实训体系,不同于普通实训书籍或培训机构的教学模式,实现由浅入深、由意识到技术分而治之的教学模式。-The fundamental hacker attack methods and principles, as well as some simple software application.
Network attack events is very common, many network administrators and network security workers to network security environment is facing a severe test to lack enough understanding, and therefore not taking comprehensive precautionary and remedial measures to deal with all kinds of aggressive behavior. " Grandchildren strategics" Yue" Zhiyizhibi, invincible do not know and confidant, one of a negative do not know do not know, every war must be". The establishment of an effective defense system only obstacle is lack of knowledge. Whether you re a information security technology enthusiasts, a IT expert or an experienced information security practitioners, as long as you want to set up an effective defense system, it is necessary to understand the hackers were using basic tools and methods.
With "the network attack" as the breakthrough point, is to make the training object recognize
网络渗透攻击事件的发生极为普遍,众多的网络管理员和网络安全工作者却对网络安全环境所面临的严峻考验缺乏足够的认识,因而也未曾采取全面的防范补救措施应对各种攻击行为。《孙子兵法》曰“知已知彼,百战不殆;不知彼而知已,一胜一负;不知彼不知已,每战必败”。建立有效的防御体系的惟一障碍是知识的不足。不论你是一位信息安全技术的爱好者、一位IT专家或一名有经验的信息安全实践者,只要你想建立起一个有效的防御体系,就必须了解黑客们所使用的基本工具和手段。
以“网络渗透攻击”为切入点,就是要让实训对象认清网络安全环境和网络渗透入侵的一些普遍规律,并有针对性的补充知识和采取全面的防范补救措施,为网络防御提供事件依据和需求来源。力争打破常规实训体系,不同于普通实训书籍或培训机构的教学模式,实现由浅入深、由意识到技术分而治之的教学模式。-The fundamental hacker attack methods and principles, as well as some simple software application.
Network attack events is very common, many network administrators and network security workers to network security environment is facing a severe test to lack enough understanding, and therefore not taking comprehensive precautionary and remedial measures to deal with all kinds of aggressive behavior. " Grandchildren strategics" Yue" Zhiyizhibi, invincible do not know and confidant, one of a negative do not know do not know, every war must be". The establishment of an effective defense system only obstacle is lack of knowledge. Whether you re a information security technology enthusiasts, a IT expert or an experienced information security practitioners, as long as you want to set up an effective defense system, it is necessary to understand the hackers were using basic tools and methods.
With "the network attack" as the breakthrough point, is to make the training object recognize
(系统自动生成,下载前可以参看下载内容)
下载文件列表
网络渗透攻击实训教程.doc
本网站为编程资源及源代码搜集、介绍的搜索网站,版权归原作者所有! 粤ICP备11031372号
1999-2046 搜珍网 All Rights Reserved.