Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • Xcode.7.Essentials.2nd.Editio ... and find out how they can be implemented Create custom components for your application through frameworks and live previews Exploit Xcode’s advanced features to elevate your debugging and testing capabilities Run your application on the physical device ...
  • Attacking.Network.Protocols.1593277504.pdf ... from an attacker’s perspective to help you discover, exploit, and ultimately ­protect vulnerabilities. You’ll start with ... inner workings of a network protocol Discover and exploit vulnerabilities such as memory corruptions, authentication bypasses, and ...
  • Memcrashed-DDoS-Exploit-master.zip Memcrashed-DDoS 利用工具可以反射放大,ddos的强力是给哦
  • Linux(x86) 漏洞利用系列教程 Linux(x86) Bigtang Linux exploit 2015-7-18 翻译自https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/ phrack linux 1 linux linux ASLR,Stack Canary NX PIE 1. Classic Stack Based Buffer Overflow 2. Integer Overflow 3. Off- ...
  • 网络协议攻击 ... , including developing your own shell code and bypassing exploit mitigations through return-oriented programming. Appendix: Network Protocol ... for practical information on how to find and exploit security vulnerabilities in these protocols. Chapters 4 and ...
  • Cocos2d-x Game Development Essentials 书籍 ... open source 2D framework in the world. Cocos2d-x is an amazing open source game engine that allows developers to exploit their existing C++, Lua, and JavaScript knowledge for cross-platform deployment into iOS, Android, Windows Phone, BlackBerry, Tizen, ...
  • Attacking Network Protocols ... from an attacker's perspective to help you find, exploit, and ultimately protect vulnerabilities. Part I starts with a ... engineer code, brute force passwords, and decrypt traffic Exploit vulnerabilities with denial-of-service attacks, SQL injections, and ...
  • An MPI-CUDA Implementation for Massively Parallel Incompressible ... and scalability of incompressible flow computations on the Lincoln Tesla cluster at the National Center for Supercomputing Applications (NCSA). We exploit some of the advanced features of MPI and CUDA programming to overlap both GPU data transfer and MPI ...
  • Fast Object Detection in 3D Point Clouds Using Convolutional Neu... ... ). In particular, this is achieved by leveraging a feature-centric voting scheme to implement novel convolutional layers which explicitly exploit the sparsity encountered in the input. To this end, we examine the trade-off between accuracy and speed for ...
  • Data+Science+and+Analytics+with+Python-CRC(2017).pdf ... statistical modelling, but who have not necessarily delved into the wonders of data analytics and machine learning. The book uses Python1 as a tool to implement and exploit some of the most common algorithms used in data science and data analytics today.