Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • Learn iOS 8 App Development%2C 2nd Edition-Apress%282014%29.pdf ... SDK, but few explain how to develop apps optimally and soundly. This book teaches both core Swift language concepts and how to exploit design patterns and logic with the iOS SDK, based on Swift and the Cocoa Touch framework. Why spend months or years ...
  • Intel Galileo Networking Cookbook(PACKT,2015) ... applications and the Internet of Things. The book features several recipes all based on the Intel Galileo board, and that exploit the powerful features of the board. Each chapter explores a given field using the Galileo board. The book is mainly ...
  • Intel.Galileo.Networking.Cookbook.1785281194 ... applications and the Internet of Things. The book features several recipes all based on the Intel Galileo board, and that exploit the powerful features of the board. Each chapter explores a given field using the Galileo board. The book is mainly ...
  • Python.3.Object-Oriented.Programming.2nd.Edition.1784398780 ... of unit testing and why it's so important in Python Grasp common concurrency techniques and pitfalls in Python 3 Exploit object-oriented programming in key Python technologies such as Kivy and Django. Object-oriented programming concurrently with asyncio ...
  • The.Antivirus.Hackers.Handbook.1119028752 ... knowledge about software development to evade, attack, and exploit antivirus software-all of which can help you ... for software reverse engineers, penetration testers, security researchers, exploit writers, antivirus vendors, and software engineers who want ...
  • The Antivirus Hacker's Handbook(Wiley,2015) ... engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software ... new knowledge about software development to evade, attack, and exploit antivirus software - all of which can help you ...
  • users_guide_chinese Metasploit Framework 下的 Exploit 应用开发中文手册
  • 黑客防线-缓冲区溢出攻击与防范 系统 全面 详尽的漏洞挖掘与Exploit编写教程
  • Statistical analyses of measured radar ground clutter data ... strongly depends on the distribution and spectral characteristics of ground clutter. To design signal processing algorithms that exploit the knowledge of clutter characteristics, a preliminary statistical analysis of ground-clutter data is necessary. We ...
  • Building.a.Recommendation.System.with.R.1783554495 Learn the art of building robust and powerful recommendation engines using R About This Book Learn to exploit various data mining techniques Understand some of the most popular recommendation techniques This is a step-by-step guide full of real-world ...