['12 Ways to Hack MFA.pdf', '4G to 5G Evolution:In-Depth Security Perspective.pdf', '99 Security Tools and You Still Got Breached%3F.pdf', 'A Cloud Security Architecture Workshop.pdf', 'Accelerate and Simplify Incident Response with Security Automation.pdf', 'Achieving Operational Security Excellence in Connected IoT Solutions.pdf', 'AI and Machine Learning:Managing the Risks of Major Lawsuits.pdf', 'AI:Hacking Without Humans How Can Human Brains Be Hacked%3F.pdf', 'Are Spoof-Proof Biometrics Really Possible%3F.pdf', 'ATT&CK in Practice A Primer to Improve Your Cyber Defense.pdf', 'Attack Vectors in Orbit:The Need for IoT and Satellite Security.pdf', 'Automated Fault Analysis of Block Cipher Implementations.pdf', 'Automatic Search for A Variant of Division Property Using Three Subsets.pdf', 'Automation vs Human Eyes:Optimizing Human Intuition for Success.pdf', 'Aviation Cybersecurity:Keeping the Wings On.pdf', 'Awareness at Scale:Creating Risk-Aware Cultures in Big Companies.pdf', 'Barney Fife Metrics:The Bullet That we Have but Don’t Use, and Why.pdf', 'Better Securing the Now and the Next:Applying Engineering First Principles to Achieve Demonstrably Better Cybersecurity.pdf', 'Bitcoin Por Favor:Cybercriminal Usage of Cryptocurrency in Latin America.pdf', 'Blockchain Anchored Swap Meet —a mock trial.pdf', 'Blockchain Augmentation of the Trusted Supply Chain.pdf', 'Blockchain Based Digital Identity:Exploring the messy space between promise and reality.pdf', 'Blockchainification of Cyber Supply Chain Risk:Hype vs. Hope.pdf', 'Building a Defensible Cyberspace(Paper).pdf', 'Building a Leading Cloud Security Program.pdf', 'Building Identity for an Open Perimeter.pdf', 'Changing the World with the UK’s Code of Practice for Consumer IoT Security.pdf', 'Cheaper by the dozen:application security on a limited budget.pdf', 'Combatting the Scourge of Fileless Attacks.pdf', 'Container Security at the Speed of CI\uf022CD.pdf', 'Cryptocurrency Hacking and the Legal Climate for Bl
2022-01-04 12:00:07 566.71MB 开发安全 零信任 红蓝对抗 物联网安全
互联网情报落地.pdf 安全工作的甲方乙方.pdf 移动互联网黑色产业链浅析.pdf
2022-01-03 09:00:14 4.03MB 工控安全 安全管理 攻防靶场 开发安全
安卓APP通讯分析和抓包的几种常见模式.pdf 安卓应用漏洞挖掘分享.pdf 谈Vx浅Works系统fuzzing与漏洞利用.pdf
2022-01-03 09:00:13 7.09MB 漏洞挖掘 安全培训 开发安全 攻防靶场
Leviathan 一个大规模的审计工具包,具有广泛的服务发现,强力,SQL注入检测和运行自定义漏洞利用功能
2021-12-24 16:07:58 1.31MB Python开发-安全相关
1
Nessus扫描完成,总要花挺多时间去整理报告,为此写了一个小脚本,用于自动化生成中文漏洞报告。
2021-12-20 15:36:53 233KB Python开发-安全相关
1
HTTP Decrypt 利用HTTP协议 远程加解密数据包,实现Burp一条龙服务
2021-12-17 17:24:06 13.13MB Python开发-安全相关
1
Python安全脚本
2021-12-14 20:24:15 19KB Python开发-安全相关
1
Mobile Application Security,英文版本,PDF 格式,大小 4 Mb,作者:Himanshu Dwivedi、Chris Clark、 David Thiel。 Secure today's mobile devices and applications Implement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how to protect against vulnerabilities in the latest smartphone and PDA platforms. Maximize isolation, lockdown internal and removable storage, work with sandboxing and signing, and encrypt sensitive user information. Safeguards against viruses, worms, malware, and buffer overflow exploits are also covered in this comprehensive resource. Design highly isolated, secure, and authenticated mobile applications Use the Google Android emulator, debugger, and third-party security tools Configure Apple iPhone APIs to prevent overflow and SQL injection attacks Employ private and public key cryptography on Windows Mobile devices Enforce fine-grained security policies using the BlackBerry Enterprise Server Plug holes in Java Mobile Edition, SymbianOS, and WebOS applications Test for XSS, CSRF, HTTP redirects, and phishing attacks on WAP/Mobile HTML applications Identify and eliminate threats from Bluetooth, SMS, and GPS services
2021-12-04 22:15:20 3.73MB iPhone 移动开发 安全 移动安全
1
「安全研究」直面打压 放弃幻想 加快推进国产自主可控可替代计划 - 技术分析 无线安全 信息安全 web安全 安全人才 安全测试
2021-11-28 22:00:15 1.15MB 自动化 移动安全 开发安全 android
「基础架构安全」内建安全的软件开发 - 安全威胁 安全意识 攻防靶场 web安全 安全运营 安全方案
2021-11-26 21:00:08 1.62MB 渗透测试 网络安全 数据库审计 spark