• 博客(0)
  • 资源 (6)

空空如也

DB2 Data Movement Utilities Guide and Reference

IBM db2 文档 Data Movement Utilities Guide and Reference

2015-03-20

Kali_Linux安全渗透教程(内部资料)

渗透测试教程 kali linux 高清PDF

2014-12-25

CEH Certified Ethical Hacker All-in-One Exam Guide

An all-new exam guide for version 8 of the Computer Hacking Forensic Investigator (CHFI) exam from EC-Council Get complete coverage of all the material included on version 8 of the EC-Council's Computer Hacking Forensic Investigator exam from this comprehensive resource. Written by an expert information security professional and educator, this authoritative guide addresses the tools and techniques required to successfully conduct a computer forensic investigation. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass this challenging exam, this definitive volume also serves as an essential on-the-job reference. CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide covers all exam topics, including: Computer forensics investigation process Setting up a computer forensics lab First responder procedures Search and seizure laws Collecting and transporting digital evidence Understanding hard disks and file systems Recovering deleted files and partitions Windows forensics Forensics investigations using the AccessData Forensic Toolkit (FTK) and Guidance Software's EnCase Forensic Network, wireless, and mobile forensics Investigating web attacks Preparing investigative reports Becoming an expert witness Electronic content includes: 300 practice exam questions Test engine that provides full-length practice exams and customized quizzes by chapter or by exam domain PDF copy of the book

2014-12-25

unlock结束正在占用的进程

卸载时提示有进程正在使用之类的问题时,可以使用压缩包里的工具强制结束该进程顺利完成卸载

2012-06-19

计算机网络第五版ppt

计算机网络第五版ppt计算机网络第五版ppt计算机网络第五版ppt计算机网络第五版ppt计算机网络第五版ppt计算机网络第五版ppt计算机网络第五版ppt

2010-04-07

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除