-
-
F# for C# Developers
... software components faster and more efficiently. Focusing on F# 3.0 and Microsoft Visual Studio 2012, you’ll learn how to exploit F# features to solve both computationally-complex problems as well as everyday programming tasks.
Topics include: C# and F# ...
-
-
-
metasploit用户指南
... 和流行的 shellcode,并且不断更新,最新版本的 MSF 包含了 176 种针对当前流行的操作系统和应用软件的 exploit,以及 104 个 shellcode。而做为安全工具,它在安全测试中起到的作用也不容忽视。合理的利用 MSF,将为漏洞自动化探测以至及时修补系统漏洞提供有力的保障。同时作为开发,也大大降低了Exploit 的开发周期和对开发者背景知识的要求。
-
Pro Java 7 NIO.2
... class java.nio.file.Path. This class is a
milestone of NIO.2, and every application that involves I/O operations will exploit the powerful facilities
of this class. Practically, it is the most commonly used class of NIO.2, since many I/O operations are
...
-
[Metasploit] Metasploit 开发入门教程 (英文版)
... 's most important to your organization, all using the Metasploit Framework
Overview
Step-by-step instructions to learn exploit development with Metasploit, along with crucial aspects of client-side exploitation to secure against unauthorized access and ...
-
SQLol下载 SQL注入测试平台 SQLol
... . DO NOT
EXPOSE SQLol IN AN UNTRUSTED ENVIRONMENT.***
SQLol is a configurable SQL injection testbed. SQLol allows
you to exploit SQL injection flaws, but furthermore allows
a large amount of control over the manifestation of the flaw.
To better ...
-
Android NDK Beginner's Guide
... and can be combined with C and C++. And second, a Java virtual machine does not always give you enough capability to exploit the full power of mobile devices, even with just-in-time compilation enabled. Resources are limited on these devices and have to ...
-
Expert Oracle Database Architecture 2nd Ed
... : you can treat Oracle as a black box and just stick data into it or you can understand how it works and exploit it as a powerful computing environment. If you choose the latter, then youll find that there are few information management problems that you ...
-
wifi_hack PDF
... Just for reference sake, I am using my
Eee PC with an external DVDRom drive to boot it). All you have to do is go to www.remote-
exploit.org and download the ISO that fits what you would like to use it on (CD, DVD, or
USB/SD). Once you do that, you will ...
-