-
-
Manning.Tika.in.Action.Nov.2011.pdf
... hands-on guide for developers working with search engines, content management systems, and other similar applications who want to exploit the information locked in digital documents. The book introduces you to the world of mining text and binary ...
-
C++ unleashed
... topics in C++. The goal of this book is to pro-
vide a focused examination of each of these topics, covering the essential information
you need to fully exploit the power of the C++ language.
Many of the topics in this book deserve a book in their o
-
CLR via C# fourth editon (English)
... edition of Jeffrey Richter’s popular APPLIED MICROSOFT .NET FRAMEWORK PROGRAMMING, you get focused, pragmatic guidance on how to exploit the common language runtime (CLR) functionality in .NET Framework 2.0 for applications of all types—from Web Forms, ...
-
Professional VSTO 2005: Visual Studio 2005 Tools for Office
... facet of charting.) The obvious benefit of this clever architecture is that it significantly reduces the learning curve for those who wish to adopt this relatively new technology. And this book is designed to show you how to exploit this architecture.
-
Xenotix_XSS_Exploitation_Framework
Xenotix XSS Exploit Framework是一款用于检测和利用WEB应用程序中的XSS漏洞的渗透测试工具。这个工具可以将代码注入到含有xss漏洞的web页面中。
Xenotix的主要特点:
•内置XSS Payloads
•XSS键盘记录
•XSS Executable Drive-by downloader
•自动化XSS测试
•XSS编码
-
Programming with Quartz 2D and PDF Graphics in Mac OS X
... the sophisticated graphics system of Mac OS X. By using the methods described in this book, developers will be able to fully exploit the state-of-the-art graphics capabilities of Mac OS X in their applications, whether for Cocoa or Carbon development. ...
-
Real-Time KD-Tree Construction on Graphics Hardware
... -first search) order. We also develop a
special strategy for large nodes at upper tree levels so as to further
exploit the fine-grained parallelism of GPUs. For these nodes, we
parallelize the computation over all geometric primitives instead of
nodes at ...
-
Algorithms in C++
... for sorting, searching, and related applications. Although the substance of the book applies to programming in any language, the implementations by Van Wyk and Sedgewick also exploit the natural match between C++ classes and ADT implementations.
-
黑客渗透笔记完整版(第二卷)
... .5.6 tomcat弱口令的入侵
2.5.7 第三方管理工具radmin和vnc弱口令入侵
第三部分 犀利的溢出攻击
3.1 内存溢出
3.2 缓冲区溢出
3.2.1 本地溢出
3.2.2 远程溢出
3.2.3 metasploit工具的使用
3.3 exploit杂谈
第四部分 流行的web入侵方式
4.1 初窥脚本工具
4.1.1 扫描工具
4.1.2 注入工具
4.1.3 数据库类的工具
4.1.4 综合检测类工具
4.1.5 远控软件
4.2 整站系统的利用
4 ...
-
Credit Risk Modeling Using Bayesian Networks
... of the risk accumulating due to business links between borrowers. We also present two strategies of model assessment that exploit the measure of mutual information and show that the constructed Bayesian network is a reliable model that can be implemented ...
-