搜索资源列表
Kevin
- 这是一本信息安全相关的书籍,是著名的黑客凯文米特尼克缩写。有时间可以读一下。-this book was written by a famous hacker named Kevin David Mitnick,hope can take you some help.
hkfx2009condense_version_vol_B
- 黑客防线2009精华本下。该电子档资料仅供学习探讨之用,请购买正版书籍,支持国内网络安全。-the condense version of the defence against hacker,Vol.B,2009. only for studying and discussing purposes, please purchase genuine books, support the domestic network security.
mima
- 密码学,黑客攻防等等,适合信息安全专业同学学习-Cryptography, hacker attack and defense, etc., for students studying information security professional
007
- 随着计算机的发展,越来越多人用上了个人计算机,而主流的操作系统是Microsoft的Windows。这种操作系统占据着PC操作系统市场的90 以上。但问题也随之而来,越来越多的针对该平台的病毒、木马、黑客程序、恶意程序、流氓软件以及间谍程序盗窃和破坏用户数据。 研究发现,大多数上述非法程序是通过注册表来达到自启动的。那么只要我们拦截上述程序对注册表的访问,便可禁止他们启动,达到了保护用户数据的目的。在本次设计中,使用了SSDT Hook这种技术对注册表的访问进行拦截。这种拦截技术通用,功能强
heikechuanshuo
- 黑客传说 讲述黑客的一些信息 可以提高编程内功及基础知识-Some legends tell of hacker hackers information to improve internal strength and basic knowledge of programming
HackerDisassemblingUncovered
- 这本书开启了大门的安全机制美妙的世界,告诉你如何保护是创建,然后绕过。这是给任何人谁喜欢迷人的困惑,对任何人谁花的方案和作业系统的深度的备用(或办公室)的时间翻找。最后,这是任何人谁是不断从事或附带书面保护,谁想要知道如何对付黑客无处不在称职和可靠。 -This book opens the door to the wonderful world of security mechanisms, showing you how protection is created, and then b
Linux-Server-Hacks---
- LINUX hacker.对于向了解LINUX 成为一名LINUX下的黑客 必须看的英文原版著作-LINUX hacker. For to be a LINUX LINUX to understand the hacker have to look under the original writings in English
2222
- 抵御黑客入侵防护服务器安全的七个技巧,有效地抵御黑客入侵。-Server security against hacker intrusion of seven skills, effective against hackers.
RunAsSystem
- \黑客防线资源\线程注入实现System权限-\ Hacker defense resources \ System thread into the realization of rights
artofdeception
- 欺骗的艺术,著名黑客凯文米特尼克的著作,主要讲他的一些经历和心得。-The Art of Deception,the book of the famous hacker Kevin Mitnick.
howtobeahacker
- 几本经典的黑客入门书籍,大家可以看看,介绍常用命令与软件等-introduction to hacker learing,about basic order and software
Password
- MD5算法,针对网上出现的CSDN密码泄露事件,本程序可将任意一个密码转化成128位的十进制字符串,即嵌入到数据库中以暗文的形式存储,而且MD5是不可以算法,防止了黑客很难获取正确的密码,感谢您的进一步修改更新-MD5 algorithm for passwords CSDN appear online leak, the program can be password into any 128-bit decimal characters String, that is embedded
processhacker-2.25-src
- Process Hacker 2.25 Source Code
Hackers-grow-diary
- 本书以日记的形式讲述了一名黑客转变为安全专家的过程,并有日记引出各章节要讲的内容。-Book form of a diary about a hacker into the process of security experts, and leads to various sections of a diary is about.
ImHaker_Jan2012
- ImHacker 2012. This is electronic magazin for hacker`s and virusmakers
B---Hacking-Exposed---Windows-Security-Secrets-a-
- Windows security secrets and solutions against hacker attacks
B---Hacker-Attack
- Book about the world of Hackers and Crackers, interesting information about it.
123456heikegongfang
- 一本关于电脑安全方面的书籍,可有效防范病毒,木马计黑客的知识书籍-A book on computer security can be effective against viruses, Trojan Horse hacker s knowledge books
How.to.Cheat.at.Securing.Linux.2008
- 黑客 不错的英文技术图书,希望对大家有帮助。- Hacker technology books, we want to help.
hackers-guide
- 黑客秘籍(chm版)共10本,仍在不断完善中。-Hacker s guide(chm), 10 books