----- 黑客手册:IT审计师与保密专业人员指南
Preface FOUNDATION MATERIAL Case Study in Subversion Know Your Opponent Anatomy of an Attack Your Defensive Arsenal Programming The Protocols (TCP/IP) (OSI Layers 2-3) The Protocols (TCP/IP) (OSI Layers 4-7) SYSTEM AND NETWORK PENETRATION Domain Name Service (DNS) Directory Services Simple Mail Transfer Protocol (SMTP) Hypertext Transfer Protocol (http) Database Hacking Malware Network Hardware CONSOLIDATION Consolidating Gains After the Fall Conclusion
{{comment.content}}