Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • SQL-attack-defense.zip 深入分析SQL注入攻击及安全防范,从数据库安全管理员的角度对现在一些比较流行的攻击方法和防范方法进行分析
  • ippl-0.13.tar.gz network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
  • netguard-1.0.0.tar.gz network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
  • jail-1.5.tar.gz network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
  • protolog-1.0.0.tar.gz network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
  • ng-0.0.2.tar.gz network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
  • portsentry-0.90.tar.gz network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
  • Battle_with_monster.zip You battle with a monster in which you can attack, defend, or heal. Uses random numbers to decide the attack and healing ammounts. Have fun!
  • Design.rar sending intrusion detection for A wireless Intrusion detection system and a new attack model
  • vm.zip ... modification. The synchronization is not required in the algorithm. Experimental results show that the proposed algorithm can resist on the attack of A/D and D/A successfully with features of large capacity and zero bit error. It will be helpful for ...