intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Attack solutions

Xem 1-20 trên 65 kết quả Attack solutions
  • TCP-targeted low-rate distributed denial-of-service (LDDoS) attacks pose a serious challenge to the reliability and security of the Internet. Among various proposed solutions, we are particularly interested in the Congestion Participation Rate (CPR) metric and the CPR-based approach.

    pdf17p viambani 18-06-2024 2 1   Download

  • In recent years, we have experienced rapid and beneficial development of IoT solutions throughout all aspects of life. In addition to the apparent advantages, the increased number and variety of devices have resulted in more security issues.

    pdf13p viamancio 04-06-2024 0 0   Download

  • Ebook Hacking exposed: Linux security secrets solutions - Part 1 includes contents: Chapter 1 linux security overview; chapter 2 proactive measures and recovering from a break-in; chapter 3 mapping your machine and network getting in from the outside; chapter 4 social engineering, trojans, and other hacker trickery; chapter 5 physical attacks; chapter 6 attacking over the network; chapter 7 abusing the network itself.

    pdf268p longtimenosee05 31-03-2024 4 0   Download

  • Ebook Cross site scripting attacks: XSS exploits and defense – Part 1 includes contents: Chapter 1: cross-site scripting fundamentals solutions, chapter 2: the XSS discovery toolkit, chapter 3: XSS theory, chapter 4: XSS attack methods, chapter 5: advanced XSS attack vectors.

    pdf234p haojiubujain010 14-12-2023 2 1   Download

  • The first aim of this document is to present how buffer overflows work and may compromise a system or a network security, and to focus on some existing protection solutions. Finally, we will try to point out the most interesting sets to secure an environment, and compare them on criteria such as efficiency or performance loss.

    pdf102p haojiubujain010 14-12-2023 1 0   Download

  • Ebook Hack attacks testing: How to conduct your own security audit - Part 1 includes contents: Chapter 1: Basic windows 2000/windows 2000 server installation and configuration, chapter 2 basic linux and solaris installations and configurations, chapter 3 mac OS X tiger box solutions, chapter 4 installing and configuring a testing target, chapter 5 cerberus internet scanner, chapter 6 cybercop scanner, chapter 7 internet scanner, chapter 8 security threat avoidance technology scanner, chapter 9 tigersuite 4.0.

    pdf309p haojiubujain010 14-12-2023 13 2   Download

  • Ebook Hacking exposed Linux: Linux security secrets & solutions (Third edition) – Part 1 includes contents: Chapter 1 applying security, Chapter 2 applying interactive controls, Chapter 3 applying process controls, Chapter 4 local access control, Chapter 5 data networks security, Chapter 6 unconventional data attack vectors, chapter 7 voice over IP, chapter 8 wireless networks, chapter 9 input/output devices, chapter 10 RFID radio frequency identification, chapter 11 emanation attacks, chapter 12 trusted computing.

    pdf397p haojiubujain010 14-12-2023 7 2   Download

  • Ebook Hacking exposed web applications: Web application security secrets and solutions (Third edition) – Part 2 includes contents: Chapter 6 input injection attacks, chapter 7 attacking XML web services, chapter 8 attacking web application management, chapter 9 hacking web clients, chapter 10 the enterprise web application security program, A: Web application security checklist, B: Web hacking tools and techniques cribsheet.

    pdf233p haojiubujain010 14-12-2023 6 2   Download

  • Ebook Hacking exposed web applications: Web application security secrets and solutions (Third edition) –Part 1 includes contents: Chapter 1 hacking web apps 101, chapter 2 profiling, chapter 3 hacking web platforms, chapter 4 attacking web authentication, chapter 5 attacking web authorization.

    pdf248p haojiubujain010 14-12-2023 3 1   Download

  • Ebook Hacking exposed web applications: Web application security secrets and solutions (First edition) – Part 2 includes contents: Chapter 5 authentication; chapter 6 authorization; chapter 7 attacking session state management; chapter 8 input validation attacks; chapter 9 attacking web datastores; chapter 10 attacking web services; chapter 11 hacking web application management; chapter 12 web client hacking; chapter 13 case studies; appendixes a web site security checklist; appendixes b web hacking tools and techniques cribsheet; appendixes c using libwhisker; appendixes d urlscan installa...

    pdf261p haojiubujain010 14-12-2023 1 1   Download

  • Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 2 includes contents: Chapter 8 achieving stealth and maintaining presence, chapter 9 hacking SQL server, chapter 10 hacking Microsoft client apps, chapter 11 physical attacks, chapter 12 windows security features and tools, chapter a windows security checklist, chapter b about the companion website.

    pdf230p haojiubujain010 14-12-2023 11 1   Download

  • Ebook "Optimizing and maintaining a database administration solution using microsoft SQL"includes content: Troubleshooting database and server performance, analyzing queries, failure diagnosis, disaster recovery, performance monitoring, database maintenance, design data integrity, SQL server integration services, business requirements, replication, security strategies, detecting and responding to attacks.

    pdf775p haojiubujain07 20-09-2023 5 4   Download

  • The research studies solutions to overcome technical barriers for seafood products exported from Vietnam to the Japanese market. The authors used the TOWS matrix to analyze opportunities and challenges from technical barriers to trade of Japan for seafood exports and the strengths and weaknesses of Vietnamese seafood enterprises in meeting Japanese technical barriers.

    pdf10p vimulcahy 18-09-2023 6 4   Download

  • In this paper, we propose an efficient distributed denial-of-service (DDoS) attack deFEnse solution, namely SAFE–which utilizes an elastic traffic flow inspection mechanism, for Software-Defined Networking (SDN) based data centers.

    pdf16p vimulcahy 18-09-2023 4 3   Download

  • "Computer Security, Privacy, & Politics " offers a review of recent developments of computer security, focusing on the relevance and implications of global privacy, law, and politics for society, individuals, and corporations.It compiles timely content on such topics as reverse engineering of software, understanding emerging computer exploits, emerging lawsuits and cases, global and societal implications, and protection from attacks on privacy.

    pdf333p haojiubujain06 05-09-2023 2 2   Download

  • In this article, the authors propose a solution to improve the security of digital signature schemes, implemented in both levels of digital signatures. At the first level, the authors propose a new hard problem - different from the hard problems used before and hasn’t been solved by anyone so far (except by "brute force attack" method).

    pdf11p viargus 20-02-2023 2 2   Download

  • The understanding of the asymptotic behavior of dynamical systems is one of the most important problems of modern mathematical physics. One way to attack the problem for a dissipative dynamical system is to consider its global attractor. This is an invariant set that attracts all the trajectories of the system. In the paper "Global existence and long-time behavior of solutions to a class of degenerate parabolic equations" we study the following semilinear degenerate parabolic equation with variable.

    pdf14p runordie3 27-06-2022 10 3   Download

  • This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. The main idea is to maintain maximum sized cliques required for location cloaking in an undirected graph.

    pdf19p spiritedaway36 28-11-2021 15 3   Download

  • In the 4.0 technology wave, Blockchain is considered by the technology world to be the most noteworthy advancement after the birth of Internet. The findings of this paper will find out about Blockchain and Bitcoin Cryptocurrency. Along with that, we will mention to a weak point of Blockchain- Double spending and research on security against attacks including Double spending hypothesis attacks and attack resistance in practice help Blockchain apply for Bitcoin cryptocurrency.

    pdf13p huyetthienthan 23-11-2021 12 3   Download

  • With the advancement of technology, the Internet of Things has become a major part in our daily life. It brought up unbelievable influences, potential and growth to human’s society. IoT allows wearable devices, home appliances and software to share and communicate throughout a network using the Internet. Due to the fact that all of a user's private data will be uploaded on the Internet, we must keep an eye on security problems caused by IoT.

    pdf9p huyetthienthan 23-11-2021 34 2   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
320 tài liệu
1228 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2