-
-
Mac Kung Fu
...
Mac Kung Fu details things even Mac Geniuses don’t know. And why should they? Many of the tips in this book exploit settings or experimental features never officially made public.
Each tip in this unique book is deliberately short and readable, and you ...
-
kali-linux中文指南.pdf - 高清
... Aircrack-ng (一应用于对无线局域网进行渗透测试的软件)用户可通过硬盘、live CD或live USB运行Kali Linux。Metasploit的Metasploit Framework支持Kali Linux,Metasploit一套针对远程主机进行开发和执行Exploit代码的工具。
Kali Linux既有32位和64位的映像。可用于x86 指令集。同时还有基于ARM架构的映像,可用于树莓派和三星的ARM Chromebook。
-
-
-
Game Programming Using QT
... design animation, add game physics, and build astonishing UI for the games. Towards the final chapters, you'll learn to exploit mobile device features such as accelerators and sensors to build engaging user experiences. If you are planning to learn about ...
-
Game Programming Using QT
... design animation, add game physics, and build astonishing UI for the games. Towards the final chapters, you'll learn to exploit mobile device features such as accelerators and sensors to build engaging user experiences. If you are planning to learn about ...
-
Reactive Programming with RxJava
... with Observables that produce data too quickly to be consumed
Explore strategies to debug and to test programs written in the reactive style
Efficiently exploit parallelism and concurrency in your programs
Learn about the transition to RxJava version 2
-
Expert.Oracle.Indexing.and.Access.Paths
... that makes appropriate use of indexing, and especially of the vendor-specific indexing features on offer.
Few databases fully exploit the wealth of data access mechanisms provided by Oracle. Expert Oracle Indexing and Access Paths helps by bringing ...
-
Cplusplus.Game.Development.Cookbook.17858
... using the various concepts of object-oriented programming
Use algorithms when developing games with various sorting and searching techniques
Exploit data structures in a game's development for data storage
Create your first 2D game using GDI library and ...
-
Kali.Linux.2.Assuring.Security.by.Penetration.Testing.3rd.Editio...
... penetration test
Conduct reconnaissance and enumeration of target networks
Exploit and gain a foothold on a target system ... testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment ...
-