本文主要是介绍Hack Proofing Your Network (Second Edition),希望对大家解决编程问题提供一定的参考价值,需要的开发者们随着小编来一起学习吧!
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。 http://blog.csdn.net/topmvp - topmvpThe book explains important terms like "smashing the stack, " "blind spoofing, " "building a backward bridge, " "steganography, " and "buffer overflow, " and why you need to worry about them. It also shows how to protect servers from attacks by using a five-step approach: Planning, Network/Machine Recon, Research/Develop, Execute Attack and Achieve Goal, and Cleanup.
http://rapidshare.com/files/53725804/1928994709.zip
这篇关于Hack Proofing Your Network (Second Edition)的文章就介绍到这儿,希望我们推荐的文章对编程师们有所帮助!