Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • Packt.OpenCV.3.Computer.Vision.Application.Programming.Cookbook.... ... image using histograms Segment images into homogenous regions and extract meaningful objects Apply image filters to enhance image content Exploit the image geometry in order to relay different views of a pictured scene Calibrate the camera from different ...
  • Bandit Algorithms for Website Optimization.pdf 下载 介绍关于explore和exploit之间平衡的问题,即EE问题,又叫多臂赌博机问题,使用的算法为Bandit算法,例如,UCB、汤普森采样算法等。
  • Rx.NET in Action ... of Rx-based reactive applications, you'll get hands-on with in-depth code examples to discover firsthand how to exploit the rich query capabilities that Rx provides and the Rx concurrency model that allows you to control both the asynchronicity of your ...
  • Modern X86 Assembly Language Programming 原版pdf by Kusswurm ... still exist where it makes sense for software developers to exploit the benefits of assembly language programming. The inclusion of ... and development tools are unable to fully (or even partially) exploit the SIMD capabilities of a modern x86 processor. ...
  • mimikatz与域渗透 Briefing How does Kerberos work in AD? Golden ticket & exploit Silver ticket & exploit Trust ticket & exploit Sid history & exploit
  • poison ivy 2.3.2 RAT 【Server 最大 7KB】 ... 程式 2.Poison Ivy RAT running in Windows 7 演示视频 3.Poison Ivy 2.3.2 Exploit 视频[armitage msf] 4.poison Ivy 2.3.2.PDF操作文档 5.README.txt
  • Rx.NET in Action ... of Rx-based reactive applications, you'll get hands-on with in-depth code examples to discover firsthand how to exploit the rich query capabilities that Rx provides and the Rx concurrency model that allows you to control both the asynchronicity of your ...
  • 反序列化测试工具 ysoserial-master-v0.0.5 打包 用法 java -cp ysoserial-master-v0.0.5 ysoserial.exploit.RMIRegistryExploit 192.168.192.118 1099 CommonsCollections1 "notepad.exe"
  • Web Animation Using JavaScript - js网页动画-英文原版 ... physics principles to make apps respond naturally to users’ input (just like motion behaves in the real world), how to exploit CSS transforms to create rich depth in animations, and how to fully leverage JavaScript animation libraries like Velocity.js to ...
  • Local File Disclosure using SQL Injection ... and into outfile in MySQL, performing command execution using SA account in MSSQL. In this paper, we are going to exploit SQL Injection vulnerability in file download function which download file from server on the basis of output returned by vulnerable ...