Book Descr iption Completely updated second edition of Google Hacking for Penetration Testers, which has sold 30,000 copies worldwide! Product Descr iption A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing of
09年9月的新书 Bill Dudney Chris Adamson Packing the power of desktop applications into a small mobile device, the iPhone SDK offers developers the ability to create dynamic, visually-appealing, and highly-capable mobile applications, using the same APIs
Traditional data mining methods are designed to deal with “static” databases, i.e. databases where the ordering of records (or other database objects) has nothing to do with the patterns of interest. Though the assumption of order irrelevance may be
[IDA.pro.学习资料].The.IDA.Pro.Book.2009 目录: Copyright Dedication FOREWORD ACKNOWLEDGMENTS INTRODUCTION Part I: INTRODUCTION TO IDA Chapter 1. INTRODUCTION TO DISASSEMBLY Section 1.1. Disassembly Theory Section 1.2. The What of Disassembly Section 1.3.
Preface xiii List of abbreviations xv A guide to the book xxiii 1 Introduction 1 1.1 The vision of Ambient Intelligence 1 1.2 Application examples 3 1.3 Types of applications 6 1.4 Challenges for WSNs 7 1.4.1 Characteristic requirements 7 1.4.2 Requ
About The Book The Access developer’s premier reference to building powerfully extensible database solutions. Whether you’re extending an existing database or developing a complex custom solution, get the code and instruction you need to exploit the
Delve inside the core SQL Server engine and put that knowledge to work with guidance from a team of well-known internals experts. Whether database developer, architect, or administrator, you will gain the deep knowledge you need to exploit key archi
Product Descr iption A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those que
Book Descr iption Dig into LINQ — and transform the way you work with data. With LINQ, you can query data from a variety of sources — including databases, objects, and XML files — directly from Microsoft Visual Basic® or C#. Guided by data-access ex
懂的,不解释!强大的功能! Here is a list of major features implemented in sqlmap: * Full support for MySQL, Oracle, PostgreSQL and Microsoft SQL Server database management system back-end. Besides these four DBMS, sqlmap can also identify Microsoft Access, DB2,
Here is a list of major features implemented in sqlmap: * Full support for MySQL, Oracle, PostgreSQL and Microsoft SQL Server database management system back-end. Besides these four DBMS, sqlmap can also identify Microsoft Access, DB2, Informix and
In Sams Teach Yourself Java 6 in 21 Days, you are introduced to all aspects of Java software development using the most current version of the language and the best available techniques. By the time you’re finished, you’ll be well acquainted with th
10大安全测试平台之一. SQLol Released at Austin Hackers Association meeting 0x3f Daniel Crowley http://www.trustwave.com INTRODUCTION ============ ***WARNING: SQLol IS INTENTIONALLY VULNERABLE. DO NOT USE ON A PRODUCTION WEB SERVER. DO NOT EXPOSE SQLol IN AN
Now in its third edition, this best-selling book continues to bring you some of the best thinking on how to apply Oracle Database to produce scalable applications that perform well and deliver correct results. Tom Kyte and Darl Kuhn share a simple p
Speed up the execution of important database queries by making good choices about which indexes to create. Choose correct index types for different scenarios. Avoid indexing pitfalls that can actually have indexes hurting performance rather than hel