没有合适的资源?快使用搜索试试~
我知道了~
文库首页
安全技术
网络攻防
The Little Black Book Of Computer Viruses(Mark.A.Ludwig)
The Little Black Book Of Computer Viruses(Mark.A.Ludwig)
virus
Ludwig
需积分: 12
22 下载量
183 浏览量
2009-03-03
14:44:36
上传
评论
收藏
1.39MB
PDF
举报
温馨提示
立即下载
病毒与安全方面的重要参考文献! 看懂才是硬道理! 不懂就更要收藏喽
资源推荐
资源评论
Java 2 Core Language Little Black Book.pdf
浏览:176
Java 2 Core Language Little Black Book is for the intermediate-to-advanced Java programmer. If you are just starting out, however, you might find it useful to study this book in conjunction with a lan
TheLittleBlackBookOnTestDesign
浏览:163
This little book describes ways to take advantage of the multiple information sources needed for ambitious system testing.
The Giant Black Book of Computer Virus
浏览:67
The.Giant.Black.Book.of.Computer.Viruses.1995.PDF.eBook-HannahMontana Get to know computer virus.
The Giant Black Book of Computer Viruses
浏览:167
5星 · 资源好评率100%
computer viruses. It is not one of those all too common books that decry viruses and call for secrecy about the technology they employ, while curiously giving you just enough technical details about .
the gaint black book of computer virus.pdf
浏览:19
5星 · 资源好评率100%
关于计算机病毒的讲解的数目......国外的,感兴趣的朋友开看看吧
The Black Book of the Programmer 2nd Edition pdf
浏览:185
The Black Book of the Programmer shows what distinguishes a neophyte programmer from the one that acts and works professionally. In the era of entrepreneurship and the new economy, the professional .
电脑病毒小册子 (英文版)
浏览:183
5星 · 资源好评率100%
英文 原名 The Little Black Book of Computer Viruses ,不错的 病毒研究 教材
Computer And Intrusion Forensics.7z
浏览:141
3.2 The role of computer forensics in law enforcement . . . . . . . . 117 vi Contents 3.3 Principles of evidence. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 3.3.1 Jurisdictional ...
Computer Viruses For Dummies.pdf
浏览:42
Computer Viruses For Dummies is a reference book, not (believe it or not) a mystery; you don’t have to read the chapters in order. Start anywhere you like. Feel free to skip chapters thataren’t of ...
Hacking Windows® XP
浏览:126
Appendix A:What’s on the CD-ROM. . . . . . . . . . . . . . . . . . . . . . . . . . . 335 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 End-User ...
A Stochastic Dynamic Model of Computer Viruses
浏览:171
A Stochastic Dynamic Model of Computer Viruses
Computer Viruses and Malware Advances in Information Security
浏览:32
Computer Viruses and Malware Advances in Information Security
Prosecuting Computer Crimes
浏览:41
This manual is a product of the Computer Crime and Intellectual Property Section (CCIPS) of the United States Department of Justice. Just as in Searching and Seizing Computers and Electronic Evidence
Learning.Linux.Binary.Analysis.1782
浏览:140
5星 · 资源好评率100%
right into the world of the computer hacker. Table of Contents Chapter 1. The Linux Environment and Its Tools Chapter 2. The ELF Binary Format Chapter 3. Linux Process Tracing Chapter 4. ELF Virus .
AAA and Network Security for Mobile Access.pdf
浏览:118
The book is geared towards people who have a basic understanding of Internet Protocol (IP) and TCP/IP stack layering concepts. Except for the above, most of the other IP-related concepts are explained
An Introduction to Cryptography - 2nd Edition - 2007
浏览:72
RICHARD A. MOLLIN 1 Mathematical Basics 1 1.1 Divisibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Primes, Primality Testing, and Induction . . . . . . . . . . 6 1.3 An ...
计算机专业毕业外文翻译
浏览:116
3星 · 编辑精心推荐
Computer viruses make full use of certain commonly used operating systems and application software for protection of the weak low Spots have rampant in recent years as the popularity of the Internet
计算机网络第六版答案
浏览:10
This document contains the solutions to review questions and problems for the 5th edition of Computer Networking: A Top-Down Approach by Jim Kurose and Keith Ross. These solutions are being made ...
Identifying viruses from metag.emmx
浏览:189
Identifying viruses from metag.emmx
The.Antivirus.Hackers.Handbook.1119028752
浏览:142
5星 · 资源好评率100%
While not all viruses are damaging, understanding how to better protect your computer against them can help you maintain the integrity of your network. * Discover how to reverse engineer your ...
激活码专用版EAST
浏览:73
4 Professional Edition is a collection of award winning, high-end technologies that work in perfect synergy, having one common goal: to protect your system and valuable data against computer viruses.
学习linux二进制分析英文版
浏览:100
You will learn about process tracing, and will explore the different types of Linux and UNIX viruses, and how you can make use of ELF Virus Technology to deal with them., The latter half of the book
北邮大三上2022年《算法设计与分析》期末试题-A卷
浏览:87
北邮大三上2022年《算法设计与分析》期末试题-A卷-计科专业-5.0
计算机毕业设计答辩PPT模板(11套).zip
浏览:140
5星 · 资源好评率100%
计算机毕业设计答辩PPT模板(11套) 计算机毕业设计答辩PPT模板(11套) 计算机毕业设计答辩PPT模板(11套) 计算机毕业设计答辩PPT模板(11套) 计算机毕业设计答辩PPT模板(11套) 计算机毕业设计答辩PPT模板(11套) 计算机毕业设计答辩PPT模板(11套) 计算机毕业设计答辩PPT模板(11套) 计算机毕业设计答辩PPT模板(11套) 计算机毕业设计答辩PP
1000套计算机毕业设计带源码
浏览:150
5星 · 资源好评率100%
1000套计算机毕业设计带源码 可直接用带ppt 1000套计算机毕业设计带源码 可直接用带ppt1000套计算机毕业设计带源码 可直接用带ppt1000套计算机毕业设计带源码 可直接用带ppt1000套计算机毕业设计带源码 可直接用带ppt1000套计算机毕业设计带源码 可直接用带ppt1000套计算机毕业设计带源码 可直接用带ppt1000套计算机毕业设计带源码 可直接用带ppt1000套计算
2019city.zip
浏览:36
5星 · 资源好评率100%
最近因项目需要最新版的五级省、市、区、街镇、居委五级数据, 网上的大多数都是2019年以前的老版数据,2019年全国做过新的行政区划划分,故而有了我这篇资源。 表结构如下: CREATE TABLE `city` ( `id` bigint(20) NOT NULL COMMENT '区划代码', `name` varchar(50) DEFAULT NULL COMMENT '名称',
MATLABSimulink电力系统建模与仿真
浏览:169
4星 · 用户满意度95%
MATLABSimulink电力系统建模与仿真
计算机统考408思维导图xmind
浏览:184
5星 · 资源好评率100%
报考浙大计算机时,自己做的思维导图,包含数学一、英语一、政治、408。内容为重要知识点以及常见、重要题型的思路总结。希望能对考计算机的学弟学妹们有所帮助。
头歌实践教学平台 MIPS流水CPU设计---HUST
浏览:148
5星 · 资源好评率100%
本实验从 MIPS 单周期 CPU 开始逐步构建无冲突冒险的理想指令流水线,能处理分支相关的指令流水线,采用气泡处理数据相关的气泡式流水线,采用重定向解决数据相关的重定向流水线。并最终在 MIPS 五段流水线上实现动态分支预测技术。 第1关:单周期CPU(24条指令).txt 第2关:理想流水线设计.txt 第3关:气泡流水线设计(EX段分支3624版本).txt 第4关:重定向流水线(EX段分
计算机绘图大作业(有答案)
浏览:11
计算机绘图大作业(有答案)
评论
收藏
内容反馈
立即下载
资源评论
资源反馈
评论星级较低,若资源使用遇到问题可联系上传者,3个工作日内问题未解决可申请退款~
联系上传者
评论
debug_de_bug
粉丝: 6
资源:
32
私信
上传资源 快速赚钱
我的内容管理
展开
我的资源
快来上传第一个资源
我的收益
登录查看自己的收益
我的积分
登录查看自己的积分
我的C币
登录后查看C币余额
我的收藏
我的下载
下载帮助
前往需求广场,查看用户热搜
最新资源
文献检测情况智能.xls
Matlab实现BO-GPR贝叶斯算法优化高斯过程回归多变量回归预测(完整源码和数据)
StudentDormitory.class
yolov8 区域声光报警+计数
IMG_20240423_163451.jpg
IMG_20240423_142909.jpg
LIBMODBUS+QT SLAVE实现
2
webpack 可运行的前端脚本
Spring Boot最常用的30个注解.docx
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功