Deep_Learning_for_Cyber_Security_Intrusion_Detection Mohamed Amine Ferrag
2021-03-19 15:15:36 294KB DeepLearning Cyber Security Intrusion
postgresql pgsql 未能加载程序集Mono.Security.dll 2.0,0,0 Npgsql 缺失的MonoSecurity.dll
2021-03-19 13:02:02 102KB pgsql mono postgresql mono.security
1
js实现的RSA算法 使用RSA加密过的数据可在网络上安全传输 使用方法: var module = "......"; var exponent = "......"; var key = RSAUtils.getKeyPair(exponent, "", module); var result= RSAUtils.encryptedString(key, "........"); console.log(result);
2021-03-19 10:20:35 19KB security 非对称加密 rsa js
1
附件是开源快速开发平台renren-security项目的最新4.0版本【完整版】的开发文档,解压后为PDF格式。fast的我也有,可以看我发布
2021-03-18 13:02:40 7.19MB renren-security 文档 java 开源
1
书名:The .NET Developer's Guide to Windows Security 作者Keith Brown。这本书实际就是《programming windows security》的第二版。英文 在这本书中能找到 别处难觅的关于windows安全特性的讲解。
2021-03-17 14:09:18 3.2MB windows 安全 安全性 英文
1
Parrot-security-4.1_amd64.iso
2021-03-15 18:02:20 98KB Linux parrot 操作系统
CCSP考试官方练习题
2021-03-15 18:00:51 9.83MB CCSP
1
HCIP 大纲PPT
2021-03-14 13:00:14 168KB CISN
1
This book is a wake-up call explaining how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. The vulnerability of the medical equipment inside the hospital to cyber-attacks far eclipses the actual building equipment. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical grade network. A medical grade network controls the diagnostic, treatment and life support equipment on which lives depend. Recent news reports how hackers struck hospitals with ransomware that prevented staff from accessing patient records or scheduling appointments. Unfortunately, medical equipment can also be hacked and shut down remotely as a form of extortion. Criminal hackers will not ask for a $500 payment to unlock an MRI, PET, CT Scan, or X-Ray machine—they will ask for much more. Litigation is bound to follow and the resulting punitive awards will drive up hospital insurance costs and healthcare costs in general. This will undoubtedly result in increased regulations for hospitals and higher costs for compliance. Unless hospitals and other healthcare facilities take the steps necessary now to secure their medical grade networks, they will be targeted for cyber-physical attack, possibly with life-threatening consequences. Cybersecurity for Hospitals and Healthcare Facilities shows what hackers can do, why hackers would target a hospital, the way they research a target, ways they can gain access to a medical grade network (cyber-attack vectors), and ways they hope to monetize their cyber-attack. By understanding and detecting the threats, hospital administrators can take action now – before their hospital becomes the next victim. Table of Contents Chapter 1: Hacker Reconnaissance of a Hospital Network Chapter 2: How Hackers Gain Access to a Healthcare Facility or Hospital Network Chapter 3: Active Medical Device Cyber-Attacks Chapter 4: Medical Facility Cybe
2021-03-13 20:03:48 8.07MB Cyber security
1
Java安全框架官方文档
2021-03-12 21:00:08 3.51MB Java安全框架官方文档
1