ISNetworksProvider.jar tsik.jar ws-security.jar 这三个jar包用在webservices安全加密中。在网上找了很久才收集到。
2021-12-10 11:40:13 1.07MB webservices ws-security
1
SonarQube的FindBugs插件sonar-findbugs-plugin.jar(版本:4.0.1-SNAPSHOT),包含FindBugs Security Audit等规则,可以离线集成到sonarqube。
2021-12-10 09:13:43 25.44MB sonar findbugs
1
适用人群所有的IT从业者,尤其适合快速掌握新技术,快速增长工作经验人群,对教育公平,教育公益,教育爱心公益人士 课程概述该互联网实战项目是基于?Spring?Boot?2+?SpringSecurity5+Element?UI+Vue?Admin?Template+蚂蚁可视化AntV?等技术栈开发的项目,采用分布式,多模块,前后端分离开发。包括图形展示、权限管理、用户管理等功能。【后端技术】技术说明Spring?Boot2MVC框架?开发的一站式解决方案Spring?Security5?认证和授权框架MyBatisPlus3.3.1?基于?MyBatis?框架的快速研发框架MyBatisCode工具生成?MyBatis?相关代码Jackson提供了处理?JSON?数据的工具Lombok简化对象封装工具?Druid???数据库连接池?【前端技术】Vue???????互联网最火的前端框架Vue?Router路由框架Vuex全局状态管理框架Axios前端?HTTP?框架Element?UI前端?UI?框架Vue?Element?Admin前端模板Antv??蚂蚁金服可视化技术,阿里巴巴可视化
1
C#连接PostgreSql需要的Npgsql.dll和Mono.Security.dll各版本支持文件
2021-12-08 15:03:44 2.37MB C# postgreSql
1
C#/Winform 开发的验证码控件,支持自定义字符和字符长度
2021-12-07 21:43:51 6KB security code
1
Ladon 7.2 20200815 程序简介 Ladon一种用于大型网络渗透性的多线程插件化综合扫描神器,包括端口扫描,服务识别,网络资产,密码爆破,高危漏洞检测以及一键GetShell,支持批量A段/ B段/ C段以及跨7.2版本内置94个功能模块,外部模块18个,通过多种协议以及方法快速获取目标网络存活主机IP,计算机名,工作组,共享资源,网卡地址,操作系统版本,网站,子域名,中间件,开放服务,路由器,数据库等信息,漏洞检测包含MS17010,SMBGhost,Weblogic,ActiveMQ,Tomcat,Struts2系列等,密码爆破13种含数据库(Mysql,Oracle ,MS
2021-12-07 13:48:37 13.49MB security tools hack exploit
1
黑帽Rust-抢先体验 使用Rust编程语言深入研究攻击性安全 概括 不管是在电影中还是在主流媒体中,黑客通常都被浪漫化:他们被描绘成黑魔法师,讨厌的罪犯,或者在最坏的情况下被描绘成带有兜帽和撬棍的盗贼。 实际上,从无聊的少年探索互联网到主权国家的军队以及不满的前雇员,攻击者的形象范围非常大。 攻击者的动机是什么? 他们如何看起来如此容易地闯入任何网络? 他们如何对待受害者? 我们将戴上黑帽子,探索进攻性安全的世界,无论是网络攻击,网络犯罪还是网络战争。 扫描程序,漏洞利用,网络钓鱼工具包,植入物...从理论到实践,我们将探索进攻安全性的奥秘,并使用Rust编程语言(Stack Overflow最受欢迎的语言)连续五年来构建自己的进攻工具。 安全编程字段由其极大的范围定义(从shellcode到服务器和Web应用程序)。 由于其无与伦比的保证和功能集,Rust是一种期待已久的“一刀切”
2021-12-07 13:40:00 364KB rust security audit bug-bounty
1
作者简介 Dr. William Stallings has authored 18 titles, and counting revised editions, over 40 books on computer security, computer networking, and computer architecture. His writings have appeared in numerous publications, including the Proceedings of the IEEE, ACM Computing Reviews and Cryptologia. He has 13 times received the award for the best Computer Science textbook of the year from the Text and Academic Authors Association. In over 30 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. As a consultant, he has advised government agencies, computer and software vendors, and major users on the design, selection, and use of networking software and products. He created and maintains the Computer Science Student Resource Site at ComputerScienceStudent.com. This site provides documents and links on a variety of subjects of general interest to computer science students (and professionals). He is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology. Dr. Stallings holds a PhD from MIT in computer science and a BS from Notre Dame in electrical engineering. 目录 1. Computer and Network Security Concepts 2. Introduction to Number Theory 3. Classical Encryption Techniques 4. Block Ciphers and the Data Encryption Standard 5. Finite Fields 6. Advanced Encryption Standard 7. Block Cipher Operation 8. Random Bit Generation and Stream Ciphers 9. Public-Key Cryptography and RSA 10. Other Public-Key Cryptosystems 11. Cryptographic Hash Functions 12. Message Authentication Codes 13. Digital Signatures 14. Key Management and Distribution 15. User Authentication Protocols 16. Network Access Control and Cloud Security 17. Transport-Level Security 18. Wireless Netwo
2021-12-06 16:43:40 8.7MB Willia Crypto Networ Princi
1
离线安装包,亲测可用
2021-12-05 16:00:33 22KB rpm
离线安装包,亲测可用
2021-12-05 12:00:39 22KB rpm