下载地址:
下载地址1资源简介:
Showing you how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems, this book covers all hardware-specific and network-centered security issues as well as countermeasures and implementation techniques.
飞网下载站,免费下载共享资料,内容涉及教育资源、专业资料、IT资源、娱乐生活、经济管理、办公文书、游戏资料等。
相关资源:
Learning_Perl_Objects_References_and_Modules.none
Thinking.In.Java.3rd.Edition.Chinese.eBook.pdf
Prentice.Hall-Unix.Shells.By.Example,4th.Edition.none
SQL.Server.2000.Stored.Procedures.Handbook.none
Oracle.Essentials.Oracle.Database.11g.4th.Edition.pdf
Cisco.Press.CCIE.Voice.Quick.Reference.Sheets.Oct.2007.rar
Spring+Security+3.x+Reference.none
Linux.Device.Drivers.3rd.Edition.none
Microsoft.Windows.Internals.Fourth.Edition.Dec.2004.internal.Fixed.eBook-DDU.none