本文共 442 字,大约阅读时间需要 1 分钟。
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。 - topmvp Topics covered: How to break into or disable a computer system, and how to defend a computer system from being broken into or disabled. Firewalls, intrusion detectors, log-and-audit utilities, and packet sniffers are covered in detail, as are varieties of attack and the specific vulnerabilities of popular operating systems. http://rapidshare.com/files/52831450/0672318717.zip