['%E9%80%9A%E8%BF%87IAST%E5%92%8CRASP%E6%94%B9%E5%8F%98%E5%BA%94%E7%94%A8%E5%AE%89%E5%85%A8%E7%9A%84%E5%8F%91%E5%B1%95%E6%80%81%E5%8A%BF.pdf', 'CSO基础之密钥管理的艺术.pdf', 'Cyber Exposure:理解与降低企业安全风险.pdf', 'DevSecOps在金融机构落地实践.pdf', 'SDL与安全能力服务化.pdf', '云安全现状与未来的一些思考.pdf', '云环境下的应用和数据安全实践.pdf', '企业数据防泄露.pdf', '区块链中共识算法的安全隐患.pdf', '唯品会攻击检测实践.pdf', '数据隐私保护技术及其在区块链场景中的应用.pdf', '构筑金融云合规体系.pdf', '苏宁业务发展中风控演进之道.pdf', '蓝军演练平台的建设实践.pdf']
2022-01-04 17:00:17 13.84MB 数据安全 安全实践 企业安全 区块链
['OWASP无服务器安全风险Top10.pdf', '论src漏洞挖掘的前期信息收集 .pdf', '隐私合规测试实践.pdf']
['供应链攻击.pdf', '域渗透中的DPAPI和Kerberos协议.pdf', '安全江湖之侠客行.pdf', '黑客与精酿.pdf']
2022-01-04 17:00:14 7.63MB 应用安全 云安全 信息安全 渗透测试
['Java反序列化漏洞自动挖掘方法.pdf', '代码审计点线面实战.pdf', '红队行动之鱼叉攻击SMTP Relay.pdf', '黑客与精酿.pdf']
2022-01-04 17:00:13 10.29MB 安全培训 云安全 AI安全 应用安全
['404.pdf', '从现实世界到CTF的智能合约攻防.pdf', '你好,捕鱼人.pdf', '实战中内网穿透的打法.pdf', '渗透Webpack等站点,从此更加优雅.pdf', '红蓝对抗中的SSRF深入利用实战.pdf']
1、Apple iOS UI Access Permission Vulnerabilities 2、Social Media Mining for Threat Intelligence 3、Dissecting a Cloud-Connected E-Scooter 4、Offensive Memory Forensics 5、Make ARM Shellcode Great Again 6、Applications of Open Source Hardware in Security Research 7、Hacking The 0day Market
2022-01-03 09:00:17 88.03MB 安全准入 渗透测试 安全建设 云安全
2016携程信息安全沙龙PPT汇总(5份).zip - 应急响应
2022-01-03 09:00:15 14.74MB 安全运维 攻防实训 移动安全 安全开发
互联网情报落地.pdf 安全工作的甲方乙方.pdf 移动互联网黑色产业链浅析.pdf
2022-01-03 09:00:14 4.03MB 工控安全 安全管理 攻防靶场 开发安全
1.A.1.pdf 1.A.2.pdf 4.A.2.pdf 5.B.3.pdf A probabilistic verification scheme for vehicular safety applications.pdf Economic Impact of IoT Cyber Risk.pdf Embedded policing and policy enforcement approach for future secure IoT technologies.pdf Ethical and normative challenges of identification in the Internet of Things.pdf GSAM Internet of things programme.pdf IoT in the wild what negotiating public deployments can tell us about the state of the Internet of Things.pdf IoT interoperability security considerations and challenges in implementation.pdf Jeremy Watson.pdf Keynote Advanced Security Research Greg Akers Cisco.pdf Mechanisms for meaningful consent in IoT.pdf Respectful things adding social intelligence to ‘Smart’ Devices.pdf Smart Bears don’t talk to strangers.pdf Smart IoT and soft AI.pdf The consumer security index for IoT.pdf Using graph databases to assess the security of thingernets based on the thingabilities and thingertivity of things.pdf What children s imagined uses of the BBC Micro bit tells us about designing for their IoT privacy security and safety.pdf WSNs under attack! How bad is it Evaluating connectivity impact using centrality measures.pdf
2022-01-03 09:00:14 36.22MB 系统安全 安全运维 安全管理 安全建设