Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • 3D Game Development with Microsoft Silverlight 3: Beginner’s Gui... ... features that characterize Rich Internet Applications. Silverlight is a great (and growing) RIA platform and games are the next level to exploit in it. But it doesn’t offer 3D capabilities out of the box and integrating a 3D engine can involve lot of ...
  • MATLAB: A Practical Introduction 5th Edition ... ’s 2017 Textbook Excellence Award (“Texty”), guides the reader through both programming and built-in functions to easily exploit MATLAB’s extensive capabilities for tackling engineering and scientific problems. Assuming no knowledge of programming, this ...
  • Advanced BlackBerry Development ... devices and applications are selling by the millions. As a BlackBerry developer, you need an advanced skill set to successfully exploit the most compelling features of the platform. This book will help you develop that skill set and teach you how to ...
  • Mastering Python Design Patterns 2nd Edition Mastering Python Design Patterns: A guide to creating smart, efficient, and reusable software, 2nd Edition Exploit various design patterns to master the art of solving problems using Python Python is an object-oriented scripting language that is used in ...
  • Open Source Intelligence Methods and Tools Open Source Intelligence Methods and Tools focuses on building a deep understanding of how to exploit open source intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support intelligence ...
  • docker on amazon web services ... learn Build, deploy, and operate Docker applications using AWS Solve key operational challenges, such as secrets management Exploit the powerful capabilities and tight integration of other AWS services Design and operate Docker applications running on ...
  • Kali Linux Web Penetration Testing Cookbook 2nd - 2018 ... website Identify cross-site scripting and client-side vulnerabilities Exploit vulnerabilities that allow the insertion of code into ... want an accessible reference on how to find, exploit, and prevent security vulnerabilities in web applications. The ...
  • SQLi Dumper v.8.0(国外SQL网站注入工具) ... ###### Info ###### Title : Beyond SQLi: Obfuscate and Bypass Author : "ZeQ3uL" (Prathan Phongthiproek) and "Suphot Boonchamnan" Team : CWH Underground [http://www.exploit-db.com/author/?a=1275]
  • Energy Efficient Smart Phones for 5G Networks ... seamless mobility and high speed connectivity within a HetNet environment. Specifically, the authors investigate how we can exploit the cooperation paradigm and context-aware mechanism working in synergy to provide energy compliant phones that can ...
  • Professional Android(精通安卓第四版红皮书) ... of projects, each introducing a new Android platform feature and highlighting the techniques and best practices that exploit its utmost functionality. The exercises begin simply, and gradually build into advanced Android development. Clear, concise ...