书名:The .NET Developer's Guide to Windows Security 作者Keith Brown。这本书实际就是《programming windows security》的第二版。英文 在这本书中能找到 别处难觅的关于windows安全特性的讲解。
2021-03-17 14:09:18 3.2MB windows 安全 安全性 英文
1
Parrot-security-4.1_amd64.iso
2021-03-15 18:02:20 98KB Linux parrot 操作系统
CCSP考试官方练习题
2021-03-15 18:00:51 9.83MB CCSP
1
HCIP 大纲PPT
2021-03-14 13:00:14 168KB CISN
1
This book is a wake-up call explaining how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. The vulnerability of the medical equipment inside the hospital to cyber-attacks far eclipses the actual building equipment. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical grade network. A medical grade network controls the diagnostic, treatment and life support equipment on which lives depend. Recent news reports how hackers struck hospitals with ransomware that prevented staff from accessing patient records or scheduling appointments. Unfortunately, medical equipment can also be hacked and shut down remotely as a form of extortion. Criminal hackers will not ask for a $500 payment to unlock an MRI, PET, CT Scan, or X-Ray machine—they will ask for much more. Litigation is bound to follow and the resulting punitive awards will drive up hospital insurance costs and healthcare costs in general. This will undoubtedly result in increased regulations for hospitals and higher costs for compliance. Unless hospitals and other healthcare facilities take the steps necessary now to secure their medical grade networks, they will be targeted for cyber-physical attack, possibly with life-threatening consequences. Cybersecurity for Hospitals and Healthcare Facilities shows what hackers can do, why hackers would target a hospital, the way they research a target, ways they can gain access to a medical grade network (cyber-attack vectors), and ways they hope to monetize their cyber-attack. By understanding and detecting the threats, hospital administrators can take action now – before their hospital becomes the next victim. Table of Contents Chapter 1: Hacker Reconnaissance of a Hospital Network Chapter 2: How Hackers Gain Access to a Healthcare Facility or Hospital Network Chapter 3: Active Medical Device Cyber-Attacks Chapter 4: Medical Facility Cybe
2021-03-13 20:03:48 8.07MB Cyber security
1
Java安全框架官方文档
2021-03-12 21:00:08 3.51MB Java安全框架官方文档
1
互联网和安全网页 了解如何保护您的网页
2021-03-12 18:05:35 3KB HTML
1
出色的工业控制系统安全 与工业控制系统(ICS)安全性相关的资源的精选列表。 随时自己的。 工具 网络安全评估工具(CSET:registered:)可帮助组织保护其关键的国家网络资产。 该工具为用户提供了一种系统的,可重复的方法,以评估其网络系统和网络的安全状况。 它包括与所有工业控制和IT系统相关的高级和详细问题。 Digital Bond创建了三个与运行CoDeSys的PLC进行交互的工具,其中包括命令外壳,文件传输和NMap脚本。 Redpoint是一个数字债券研究项目,旨在使用nmap扩展枚举ICS应用程序和设备。 可以在评估过程中使用它来发现ICS设备并提取有助于二次测试的信息。 Redpoint工具使用合法的协议或应用程序命令来发现和枚举设备和应用程序。 没有努力去开发或破坏任何东西,但是要明智和谨慎。 GRASSMARLIN为工业控制系统(ICS)和监督控制与数据采集(SCADA)网络提供I
2021-03-11 15:07:21 17KB 系统开源
1
Cryptography and Network Security Principles and Practice, International Edition(6th) 英文无水印原版pdf 第6版 pdf所有页面使用FoxitReader、PDF-XChangeViewer、SumatraPDF和Firefox测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 查看此书详细信息请在美国亚马逊官网搜索此书
2021-03-10 21:43:04 37.12MB Cryptography Network Security Principles
1
HPE_Security_Fortify_SCA_and_Apps_19.10_Windows下载地址,仅供学习参考使用
2021-03-10 19:06:28 71B fortify 19.10 license
1