积分充值
 首页
前端开发
AngularDartElectronFlutterHTML/CSSJavaScriptReactSvelteTypeScriptVue.js构建工具
后端开发
.NetC#C++C语言DenoffmpegGoIdrisJavaJuliaKotlinLeanMakefilenimNode.jsPascalPHPPythonRISC-VRubyRustSwiftUML其它语言区块链开发测试微服务敏捷开发架构设计汇编语言
数据库
Apache DorisApache HBaseCassandraClickHouseFirebirdGreenplumMongoDBMySQLPieCloudDBPostgreSQLRedisSQLSQLiteTiDBVitess数据库中间件数据库工具数据库设计
系统运维
AndroidDevOpshttpdJenkinsLinuxPrometheusTraefikZabbix存储网络与安全
云计算&大数据
Apache APISIXApache FlinkApache KarafApache KyuubiApache OzonedaprDockerHadoopHarborIstioKubernetesOpenShiftPandasrancherRocketMQServerlessService MeshVirtualBoxVMWare云原生CNCF机器学习边缘计算
综合其他
BlenderGIMPKiCadKritaWeblate产品与服务人工智能亿图数据可视化版本控制笔试面试
文库资料
前端
AngularAnt DesignBabelBootstrapChart.jsCSS3EchartsElectronHighchartsHTML/CSSHTML5JavaScriptJerryScriptJestReactSassTypeScriptVue前端工具小程序
后端
.NETApacheC/C++C#CMakeCrystalDartDenoDjangoDubboErlangFastifyFlaskGinGoGoFrameGuzzleIrisJavaJuliaLispLLVMLuaMatplotlibMicronautnimNode.jsPerlPHPPythonQtRPCRubyRustR语言ScalaShellVlangwasmYewZephirZig算法
移动端
AndroidAPP工具FlutterFramework7HarmonyHippyIoniciOSkotlinNativeObject-CPWAReactSwiftuni-appWeex
数据库
ApacheArangoDBCassandraClickHouseCouchDBCrateDBDB2DocumentDBDorisDragonflyDBEdgeDBetcdFirebirdGaussDBGraphGreenPlumHStreamDBHugeGraphimmudbIndexedDBInfluxDBIoTDBKey-ValueKitDBLevelDBM3DBMatrixOneMilvusMongoDBMySQLNavicatNebulaNewSQLNoSQLOceanBaseOpenTSDBOracleOrientDBPostgreSQLPrestoDBQuestDBRedisRocksDBSequoiaDBServerSkytableSQLSQLiteTiDBTiKVTimescaleDBYugabyteDB关系型数据库数据库数据库ORM数据库中间件数据库工具时序数据库
云计算&大数据
ActiveMQAerakiAgentAlluxioAntreaApacheApache APISIXAPISIXBFEBitBookKeeperChaosChoerodonCiliumCloudStackConsulDaprDataEaseDC/OSDockerDrillDruidElasticJobElasticSearchEnvoyErdaFlinkFluentGrafanaHadoopHarborHelmHudiInLongKafkaKnativeKongKubeCubeKubeEdgeKubeflowKubeOperatorKubernetesKubeSphereKubeVelaKumaKylinLibcloudLinkerdLonghornMeiliSearchMeshNacosNATSOKDOpenOpenEBSOpenKruiseOpenPitrixOpenSearchOpenStackOpenTracingOzonePaddlePaddlePolicyPulsarPyTorchRainbondRancherRediSearchScikit-learnServerlessShardingSphereShenYuSparkStormSupersetXuperChainZadig云原生CNCF人工智能区块链数据挖掘机器学习深度学习算法工程边缘计算
UI&美工&设计
BlenderKritaSketchUI设计
网络&系统&运维
AnsibleApacheAWKCeleryCephCI/CDCurveDevOpsGoCDHAProxyIstioJenkinsJumpServerLinuxMacNginxOpenRestyPrometheusServertraefikTrafficUnixWindowsZabbixZipkin安全防护系统内核网络运维监控
综合其它
文章资讯
 上传文档  发布文章  登录账户
IT文库
  • 综合
  • 文档
  • 文章

无数据

分类

全部云计算&大数据(90)VirtualBox(85)系统运维(29)后端开发(25)httpd(23)区块链(16)数据库(12)综合其他(12)Krita(9)PostgreSQL(8)

语言

全部英语(124)中文(简体)(42)日语(1)韩语(1)

格式

全部PDF文档 PDF(127)其他文档 其他(40)DOC文档 DOC(1)
 
本次搜索耗时 0.028 秒,为您找到相关结果约 168 个.
  • 全部
  • 云计算&大数据
  • VirtualBox
  • 系统运维
  • 后端开发
  • httpd
  • 区块链
  • 数据库
  • 综合其他
  • Krita
  • PostgreSQL
  • 全部
  • 英语
  • 中文(简体)
  • 日语
  • 韩语
  • 全部
  • PDF文档 PDF
  • 其他文档 其他
  • DOC文档 DOC
  • 默认排序
  • 最新排序
  • 页数排序
  • 大小排序
  • 全部时间
  • 最近一天
  • 最近一周
  • 最近一个月
  • 最近三个月
  • 最近半年
  • 最近一年
  • pdf文档 Identity Aware Threat Detection and Network Monitoring by using eBPF

    Identity Aware Threat Detection and Network Monitoring by using eBPF Natalia Reka Ivanko, Isovalent October 28, 2020 ● ● ○ ● ○ ○ ○ ○ ● ● ● ● ● ● ● ● ○ ● ○ ○ ○ ● ● ● ○ ● ○ ○ ● ●
    0 码力 | 7 页 | 1.35 MB | 1 年前
    3
  • pdf文档 Vitess security audit

    Table of contents 1 Executive summary 2 Notable findings 3 Project Summary 4 Audit Scope 4 Threat model formalisation 5 Fuzzing 14 Issues found 16 SLSA review 38 Conclusions 40 1 Vitess Security different perspectives. To that end, the audit had the following high-level goals: 1. Formalise a threat model of VTAdmin. 2. Manually audit the VTAdmin code. 3. Manually audit the remaining Vitess code offered a level of synergy; Ada Logics found two CVEʼs during the audit which the threat model goal helped to assess. The threat model was also a force-multiplier for the fuzzing work that led to the discovery
    0 码力 | 41 页 | 1.10 MB | 1 年前
    3
  • pdf文档 Dapr september 2023 security audit report

    2023 Table of contents Table of contents 1 Executive summary 2 Project Summary 3 Audit Scope 4 Threat model 5 Fuzzing 15 Issues found 17 SLSA 43 Supply-chain mitigations 45 1 Dapr security audit goals: 1. Formalise a threat model of the code assets in scope. 2. Do a manual code audit of the code assets in scope. 3. Evaluate Daprs fuzzing suite against the formalised threat model. 4. Perform a SLSA an out-of-memory denial of service attack vector. We found the vulnerability a�er performing the threat modelling goal and understanding the flow of untrusted data through a Dapr deployment, and then adding
    0 码力 | 47 页 | 1.05 MB | 1 年前
    3
  • pdf文档 Istio audit report - ADA Logics - 2023-01-30 - v1.0

    summary 2 Notable findings 3 Project summary 4 Audit scope 6 Overall assessment 7 Fuzzing 9 Threat model 11 Issues found 17 Review of fixes for issues from previous audit 50 Istio SLSA compliance The engagement was a holistic security audit that had several high-level goals: 1. Formalise a threat model of Istio to guide the security audit as well as future security audits. 2. Carry out a manual great foundation for a secure product, and it demonstrates that the Istio community has formulated a threat model that is used to assess which parts of Istio are particularly exposed. In this audit, Ada Logics
    0 码力 | 55 页 | 703.94 KB | 1 年前
    3
  • pdf文档 Moxa Industrial Linux 3.0 (Debian 11) Manual for Arm-based Computers Version 1.0, January 2023

    Arm-based computer in a secure manner Defense-in-depth Strategy Security Layer Security Measures Threat mitigated/handled Responsibility Policy and procedure Establish policies and procedures to owner (Essential) Malicious code attack that could create or exploit system vulnerabilities (Threat ID #6) Perimeter Security Use LTE service provide with Carrier Grade NAT (CGNAT) and firewall manipulate network traffic (Threat ID #4) Endpoint Security End point Firewall (nftable) Unauthorized and malicious communications from untrusted network (Threat ID #2, Threat ID #5) Provided by
    0 码力 | 111 页 | 2.94 MB | 1 年前
    3
  • pdf文档 Embracing an Adversarial Mindset for Cpp Security

    •Interconnected Components •Feature Richness •Backwards CompatibilityFactors Influencing Trends Advanced Threat Detection •Regulatory and Compliance Pressures • Executive Order (US) – Baseline security standards token with the system token.BITTER APT group Who are they? A suspected South Asian cyber espionage threat group that has been active since at least 2013. BITTER has targeted government, energy, and engineering member to offset and the callback returns an arbitrary valuePrintNightmare & Russia State-Sponsored Threat Actor CVE-2021-1675 and CVE-2021-34527 • Remote code execution in Windows Print Spooler • Privilege
    0 码力 | 92 页 | 3.67 MB | 5 月前
    3
  • pdf文档 Istio Security Assessment

    easily accessible threat of total compromise. High Implies an immediate threat of system compromise, or an easily accessible threat of large-scale breach. Medium A difficult to exploit threat of large-scale of a small portion of the application. Low Implies a relatively minor threat to the application. Informational No immediate threat to the application. May provide suggestions for application improvement
    0 码力 | 51 页 | 849.66 KB | 1 年前
    3
  • pdf文档 秘钥管理秘钥Turtles all the way down - Securely managing Kubernetes Secrets

    environment ○ Volume of data ○ Re-keying method ○ Number of key copies ○ Personnel turnover ○ Threat model ○ New and disruptive technologies, e.g., quantum computers Key rotation: compliance PCI {SECRET3}DEK3 + {DEK3}KEKv3 Nov 12-Dec 12 Dec 12 - Jan 11 Jan 11 - Feb 10 KEKv1 KEKv2 KEKv3 KMS plugin: threat model and concerns ● KMS server is compromised ● KMS plugin is compromised ● Auth token for KMS manager In external secret store Kubernetes secrets: summary ● Use encryption based on your threat model, e.g., two layers, like full-disk + application-layer ● Rotate keys regularly to limit the
    0 码力 | 52 页 | 2.84 MB | 1 年前
    3
  • pdf文档 MITRE Defense Agile Acquisition Guide - Mar 2014

    that can keep pace with rapidly changing technologies and operations, including the evolving cyber threat. Countless articles and reports have documented the failure of IT programs in the current DoD acquisition & ACAT III (Required for space programs only) Request for Proposal MAIS & ACAT III System Threat Assessment Report MAIS & ACAT III Systems Engineering Plan (SEP) MAIS & ACAT III Test and Evaluation Reengineering MAIS & ACAT III Address in Acquisition Strategy and LCSP (Business Case for DBS) Capstone Threat Assessment MAIS & ACAT III Address in Acquisition Strategy (Business Case for DBS) Consideration
    0 码力 | 74 页 | 3.57 MB | 5 月前
    3
  • pdf文档 Firebird File and Metadata Security

    specified appropriate file permissions on secure databases, the embedded server itself is no threat. The threat comes from all the other things that the user could install. The fact that the embedded server
    0 码力 | 19 页 | 115.27 KB | 1 年前
    3
共 168 条
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 17
前往
页
相关搜索词
IdentityAwareThreatDetectionandNetworkMonitoringbyusingeBPFVitesssecurityauditDaprseptember2023reportIstioADALogics0130v1MoxaIndustrialLinux3.0Debian11ManualforArmbasedComputersVersion1.0JanuaryEmbracinganAdversarialMindsetCppSecurityAssessment秘钥管理TurtlesallthewaydownSecurelymanagingKubernetesSecretsMITREDefenseAgileAcquisitionGuideMar2014FirebirdFileMetadata
IT文库
关于我们 文库协议 联系我们 意见反馈 免责声明
本站文档数据由用户上传或本站整理自互联网,不以营利为目的,供所有人免费下载和学习使用。如侵犯您的权益,请联系我们进行删除。
IT文库 ©1024 - 2025 | 站点地图
Powered By MOREDOC AI v3.3.0-beta.70
  • 关注我们的公众号【刻舟求荐】,给您不一样的精彩
    关注我们的公众号【刻舟求荐】,给您不一样的精彩