Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • Mac Kung Fu ... Mac Kung Fu details things even Mac Geniuses don’t know. And why should they? Many of the tips in this book exploit settings or experimental features never officially made public. Each tip in this unique book is deliberately short and readable, and you ...
  • kali-linux中文指南.pdf - 高清 ... Aircrack-ng (一应用于对无线局域网进行渗透测试的软件)用户可通过硬盘、live CD或live USB运行Kali Linux。Metasploit的Metasploit Framework支持Kali Linux,Metasploit一套针对远程主机进行开发和执行Exploit代码的工具。 Kali Linux既有32位和64位的映像。可用于x86 指令集。同时还有基于ARM架构的映像,可用于树莓派和三星的ARM Chromebook。
  • MATLAB A Practical Introduction to Programming and Problem Solvi... ... . Assuming no knowledge of programming, this book guides the reader both programming and built-in functions to easily exploit MATLAB's extensive capabilities for tackling engineering problems. The book starts with programming concepts, such as variables, ...
  • Matlab.4th.Edition.A.Practical.Introduction.to.Programming.and.P... ... . Assuming no knowledge of programming, this book guides the reader both programming and built-in functions to easily exploit MATLAB's extensive capabilities for tackling engineering problems. The book starts with programming concepts, such as variables, ...
  • Game Programming Using QT ... design animation, add game physics, and build astonishing UI for the games. Towards the final chapters, you'll learn to exploit mobile device features such as accelerators and sensors to build engaging user experiences. If you are planning to learn about ...
  • Game Programming Using QT ... design animation, add game physics, and build astonishing UI for the games. Towards the final chapters, you'll learn to exploit mobile device features such as accelerators and sensors to build engaging user experiences. If you are planning to learn about ...
  • Reactive Programming with RxJava ... with Observables that produce data too quickly to be consumed Explore strategies to debug and to test programs written in the reactive style Efficiently exploit parallelism and concurrency in your programs Learn about the transition to RxJava version 2
  • Expert.Oracle.Indexing.and.Access.Paths ... that makes appropriate use of indexing, and especially of the vendor-specific indexing features on offer. Few databases fully exploit the wealth of data access mechanisms provided by Oracle. Expert Oracle Indexing and Access Paths helps by bringing ...
  • Cplusplus.Game.Development.Cookbook.17858 ... using the various concepts of object-oriented programming Use algorithms when developing games with various sorting and searching techniques Exploit data structures in a game's development for data storage Create your first 2D game using GDI library and ...
  • Kali.Linux.2.Assuring.Security.by.Penetration.Testing.3rd.Editio... ... penetration test Conduct reconnaissance and enumeration of target networks Exploit and gain a foothold on a target system ... testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment ...