资源大小: 272KB
发布时间: 2010-05-01
文件格式: pdf
下载次数: 0
分享到:

下载地址:

下载地址1
(本站为飞网专业下载站,域名:down.cfei.net)

资源简介:

Since the advent of distributed intruder tools in the late 1990s, defenders have striven to identify and take down as much of the attack network as possible, as fast as possible.This has never been an easy task, owing in large part to thewide distribution of attacking agents and command and control (C2) servers, often spread across thousands of individual networks, or Autonomous Systems in routing terms, aroundthe globe.Differentials in the abilities and capabilities of these sites, aswell as kn


飞网下载站,免费下载共享资料,内容涉及教育资源、专业资料、IT资源、娱乐生活、经济管理、办公文书、游戏资料等。