-
-
DCOMrumencode.zip
...
Chapter 5 (Infrastructure) Infrastructure
Chapter 6 (Building Components with ATL) OCRServer
Chapter 7 (Using COM Objects) OCRClient
Chapter 8 (COM in Cyberspace) Cyber
Chapter 9 (Applying Security) Security
Chapter 10 (Connecting Objects) Chat
-
-
The.Shellcoder.s.Handbook.Discovering.And.Exploiti
Every day, patches are created to cover up security holes in software applications and operating systems. But by the ... discover vulnerabilities in C-language-based software, exploit the vulnerabilities you find, and prevent new security holes from occurring.
-
UnderstandingWirelessLANSecurity.rar
In this paper, we provide an overview of the security concerns introduced by wireless LANs, current approaches to wireless ... , their limitations, and the weaknesses of various “band aid” security solutions. We conclude by describing how the ReefEdge Connect ...
-
-
0602042.rar
New security and control protocol for VoIP based on steganography and digital watermarking
(关于ip telephone security的外文资料2006年)
-
Software_Testing_By_Ron_Patton.rar
... for release. Updated from the previous edition in 2000 to include a chapter that specifically deals with testing software for security bugs, the processes and techniques used throughout the book are timeless. This book is an excellent investment if you ...
-
Security.rar
c# vs2005 asp.net2.0 一个des加/解密字符串的类,相信这方面的代码已经不少了,这个类唯一的好处就是你不用上网找代码了,直接用吧
-
ComputerSecurity.rar
An Immunological Model of Distributed Detection and its Application to Computer Security(PhD thesis)
-
Wormhole_Simulation_Code.rar
This code was used to produce simulation results described in:
Using Directional Antennas to Prevent Wormhole Attacks
Lingxuan Hu and David Evans. Network and Distributed System Security
Symposium, San Diego, 5-6 February 2004.
-