您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Exploiting Software :How to Break Code.chm

  2. Exploiting Software :How to Break Code.chm
  3. 所属分类:其它

    • 发布日期:2009-07-12
    • 文件大小:4194304
    • 提供者:wxzyn5168
  1. Exploiting Software How To Break Code

  2. How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers.
  3. 所属分类:其它

    • 发布日期:2007-10-02
    • 文件大小:4194304
    • 提供者:anzhihun
  1. 《Exploiting Software》

  2. 《Exploiting Software》
  3. 所属分类:C++

    • 发布日期:2009-10-12
    • 文件大小:4194304
    • 提供者:knightx
  1. 软件剖析—代码攻防之道 Exploiting Software

  2. EXPLOITING SOFTWARE-HOW TO BREAK CODE 黑客破解软件的伎俩 如何找到软件的漏洞并攻击
  3. 所属分类:网络攻防

    • 发布日期:2009-11-11
    • 文件大小:14680064
    • 提供者:Sepra
  1. Exploiting Software - How to Break Code.rar

  2. Exploiting Software - How to Break Code.rar
  3. 所属分类:其它

    • 发布日期:2007-11-05
    • 文件大小:4194304
    • 提供者:wanfustudio
  1. Addison Wesley Exploiting Software How To Break Code.chm

  2. Exploiting Software How To Break Code
  3. 所属分类:其它

    • 发布日期:2009-12-01
    • 文件大小:4194304
    • 提供者:coremedy
  1. Exploiting Online Games

  2.  Online Games represent the most complex multi-user systems on the planet. The security problems that plague games today will plague the business applications of tomorrow. Learn how to cheat and break games like World of Warcraft from the inside out
  3. 所属分类:其它

    • 发布日期:2010-06-01
    • 文件大小:8388608
    • 提供者:zeroneten
  1. Addison+Wesley+Exploiting+Software+How+To+Break+Code

  2. How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers.
  3. 所属分类:其它

    • 发布日期:2010-07-23
    • 文件大小:4194304
    • 提供者:shmp2005
  1. Exploiting Software How to Break Code

  2. Exploiting Software How to Break Code英文版CHM
  3. 所属分类:其它

    • 发布日期:2008-02-19
    • 文件大小:4194304
    • 提供者:robertzhang10
  1. Exploiting Java Memory Corruptions

  2. Exploiting Java Memory Corruptions
  3. 所属分类:网络安全

    • 发布日期:2011-12-06
    • 文件大小:3145728
    • 提供者:kangkai810
  1. exploiting software hacking

  2. In this issue you will learn about Cisco IOS, whis is the predominant OS for networking devices on the internet. Cisco IOS has evolved an advanced feature set in the CLI and flexible scr ipting abilities that provide the network administrator with o
  3. 所属分类:其它

    • 发布日期:2013-05-31
    • 文件大小:8388608
    • 提供者:hawk5000
  1. multi-label classification by exploiting label correlations

  2. multi-label classification by exploiting label correlations
  3. 所属分类:专业指导

    • 发布日期:2013-11-24
    • 文件大小:2097152
    • 提供者:u012821415
  1. Exploiting Windows Device Drivers

  2. Exploiting Windows Device Drivers
  3. 所属分类:C

    • 发布日期:2008-10-23
    • 文件大小:265216
    • 提供者:skykrnl
  1. Exploiting Reflection Change for Automatic Reflection Removal

  2. Exploiting Reflection Change for Automatic Reflection Removal.去除像反光
  3. 所属分类:嵌入式

    • 发布日期:2015-05-30
    • 文件大小:9437184
    • 提供者:hudaliquan
  1. Exploiting Format String Vulnerabilities

  2. Exploiting Format String Vulnerabilities
  3. 所属分类:系统安全

    • 发布日期:2017-03-22
    • 文件大小:234496
    • 提供者:wizardforcel
  1. Exploiting_Freelist[0]_On_XPSP2

  2. Windows XP Service pack 2 introduced some new security measures in an attempt to prevent the use of overwritten heap headers to do arbitrary byte writing. This method of exploiting heap overflows, and the protection offered by service pack 2, is wid
  3. 所属分类:其它

    • 发布日期:2008-12-06
    • 文件大小:265216
    • 提供者:dhlduda
  1. Exploiting Event-Based Communication for Real-Time Distributed and Parallel Video Content Analysis

  2. Exploiting Event-Based Communication for Real-Time Distributed and Parallel Video Content Analysis.pdf
  3. 所属分类:其它

    • 发布日期:2007-07-04
    • 文件大小:2097152
    • 提供者:supercpp
  1. Exploiting Domain Knowledge via Grouped Weight Sharing

  2. Exploiting Domain Knowledge via Grouped Weight Sharing
  3. 所属分类:深度学习

    • 发布日期:2018-09-05
    • 文件大小:274432
    • 提供者:qq_16439395
  1. Exploiting Deep Features for Remote Sensing Image Retrieval

  2. 深度学习方法在图像检索上的应用 Exploiting Deep Features for Remote Sensing Image Retrieval 图像检索——从视觉特征、相似性度量、相关性反馈三个核心方面提出RS图像特征提取的基准(武大)
  3. 所属分类:深度学习

    • 发布日期:2018-09-16
    • 文件大小:4194304
    • 提供者:weixin_40744915
  1. Exploiting Linked Data and Knowledge Graphs in Large Organisations

  2. Exploiting Linked Data and Knowledge Graphs in Large Organisations,知识图谱的国外经典书籍。
  3. 所属分类:搜索引擎

    • 发布日期:2019-03-01
    • 文件大小:6291456
    • 提供者:qq_30288223
« 12 3 4 5 6 7 8 9 10 ... 14 »