-
-
Xcode.7.Essentials.2nd.Editio
... and find out how they can be implemented
Create custom components for your application through frameworks and live previews
Exploit Xcode’s advanced features to elevate your debugging and testing capabilities
Run your application on the physical device ...
-
Attacking.Network.Protocols.1593277504.pdf
... from an attacker’s perspective to help you discover, exploit, and ultimately protect vulnerabilities.
You’ll start with ... inner workings of a network protocol
Discover and exploit vulnerabilities such as memory corruptions, authentication bypasses, and ...
-
-
Linux(x86) 漏洞利用系列教程
Linux(x86) Bigtang Linux exploit 2015-7-18
翻译自https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/ phrack
linux
1
linux
linux ASLR,Stack Canary NX PIE
1. Classic Stack Based Buffer Overflow 2. Integer Overflow 3. Off- ...
-
网络协议攻击
... , including developing your own shell code
and bypassing exploit mitigations through return-oriented
programming.
Appendix: Network Protocol ... for practical
information on how to find and exploit security vulnerabilities in these
protocols. Chapters 4 and ...
-
Cocos2d-x Game Development Essentials 书籍
... open source 2D framework in the world. Cocos2d-x is an amazing open source game engine that allows developers to exploit their existing C++, Lua, and JavaScript knowledge for cross-platform deployment into iOS, Android, Windows Phone, BlackBerry, Tizen, ...
-
Attacking Network Protocols
... from an attacker's perspective to help you find, exploit, and ultimately protect vulnerabilities. Part I starts with a ... engineer code, brute force passwords, and decrypt traffic Exploit vulnerabilities with denial-of-service attacks, SQL injections, and ...
-
An MPI-CUDA Implementation for Massively Parallel Incompressible
... and scalability of incompressible flow
computations on the Lincoln Tesla cluster at the National Center for Supercomputing Applications (NCSA).
We exploit some of the advanced features of MPI and CUDA programming to overlap both GPU data transfer
and MPI ...
-
-
Data+Science+and+Analytics+with+Python-CRC(2017).pdf
... statistical modelling, but who have not necessarily delved into the wonders of data analytics and machine learning. The book uses Python1 as a tool to implement and exploit some of the most common algorithms used in data science and data analytics today.
-