[{"title":"( 17 个子文件 149.91MB ) 网络攻防实践_课程报告.zip","children":[{"title":"Kali Linux渗透测试技术详解.rar <span style='color:#111;'> 58.30MB </span>","children":null,"spread":false},{"title":"课程设计任务.txt <span style='color:#111;'> 130B </span>","children":null,"spread":false},{"title":"基于Metasploit渗透攻击的无线网络安全研究_MUIRURI JEFF.caj <span style='color:#111;'> 1.05MB </span>","children":null,"spread":false},{"title":"基于VirtualBox的网络渗透测试平台的设计与实现_吕俊霖.caj <span style='color:#111;'> 2.39MB </span>","children":null,"spread":false},{"title":"关于计算机网络攻防建模仿真的研究_吴玉凤.pdf <span style='color:#111;'> 1.38MB </span>","children":null,"spread":false},{"title":"网络攻击与防御技术的研究与实践_赵子铭.pdf <span style='color:#111;'> 89.30KB </span>","children":null,"spread":false},{"title":"软件定义网络环境下DoS攻防实验设计_陈镭.pdf <span style='color:#111;'> 1.54MB </span>","children":null,"spread":false},{"title":"Kali Linux渗透测试技术详解.pdf <span style='color:#111;'> 63.41MB </span>","children":null,"spread":false},{"title":"2020年网络安全态势报告_.pdf <span style='color:#111;'> 4.72MB </span>","children":null,"spread":false},{"title":"Traffic networks are vulnerable.pdf <span style='color:#111;'> 3.51MB </span>","children":null,"spread":false},{"title":"基于Kali_Linux的渗透测试研究_贺义君.caj <span style='color:#111;'> 9.79MB </span>","children":null,"spread":false},{"title":"基于Metasploit渗透攻击的无线网络安全研究.caj <span style='color:#111;'> 1.05MB </span>","children":null,"spread":false},{"title":"Phishing Website Detection Forest by Penalizing Attributes Algorithm.pdf <span style='color:#111;'> 1.19MB </span>","children":null,"spread":false},{"title":"网络攻防实践.txt <span style='color:#111;'> 276B </span>","children":null,"spread":false},{"title":"基于Kali_Linux的渗透测试平台的研究_郭川.caj <span style='color:#111;'> 13.15MB </span>","children":null,"spread":false},{"title":"基于Kali_Linux的网络安全技术探讨与研究_刘倩.caj <span style='color:#111;'> 2.97MB </span>","children":null,"spread":false},{"title":"无线校园网络钓鱼AP攻击检测技术研究_朱莉.pdf <span style='color:#111;'> 1.79MB </span>","children":null,"spread":false}],"spread":true}]