搜索资源列表
Addison.Wesley.Pub.Exploiting.Software.How.to.Brea
- 从软件破解和利用的角度讨论软件安全测试技巧和方法的电子书,避免安全漏洞的出现。-break from the software and use the angle of software security testing techniques and methods of e-books, to avoid the emergence of security flaws.
atk4.0src
- An open-source security scanner and exploiting fr a mework for Microsoft Windows
20040627103943713
- 解压密码: www.77169.org 这个一个利用IE的漏洞,让对方自动下载程序,删除还原精灵的好方法,同时也可以实现执行*!看大家的发挥了!-unpacked Password : www.77169.org this one exploiting the loopholes, for the other side automatically download, delete NertRG a good way, but also
(The.Web.Application.Hacker__s.Handbook.Finding.and.Exploiting.Security.Flaws,.2ed),.Stuttard,.Pinto
- (The.Web.Application.Hacker__s.Handbook.Finding.and.Exploiting.Security.Flaws,.2ed),.Stuttard,.Pinto.
atk4.0src
- An open-source security scanner and exploiting fr a mework for Microsoft Windows
20040627103943713
- 解压密码: www.77169.org 这个一个利用IE的漏洞,让对方自动下载程序,删除还原精灵的好方法,同时也可以实现执行*!看大家的发挥了!-unpacked Password : www.77169.org this one exploiting the loopholes, for the other side automatically download, delete NertRG a good way, but also
Addison.Wesley.Pub.Exploiting.Software.How.to.Brea
- 从软件破解和利用的角度讨论软件安全测试技巧和方法的电子书,避免安全漏洞的出现。-break from the software and use the angle of software security testing techniques and methods of e-books, to avoid the emergence of security flaws.
2445
- 基于支持向量聚类的多聚焦图像融合算法∗ Exploiting SVC Algorithm for Multifocus Image Fusion-Based on support vector clustering algorithm for multi-focus image fusion
CAIMAN
- CAIMAN method是一种通过挖掘数据的帽子矩阵的对角信息来实现对数据分组的方法。-The CAIMAN method (Classification And Influence Matrix ANalysis) is a classification method exploiting the properties of the diagonal terms of the influence matrix, also calle
vcWebServer
- Web服务器的实现主要是服务器端接受并响应客户端的请求,本次设计是在Visual C++开发平台上使用Winsock编程技术开发Web服务器程序。 该Web服务器的结构采用“请求/响应”的模型,具有支持多线程,配置网站所在目录和缺省主页,支持GET、POST和HEAD等方法,基本的错误处理,支持ASP等功能。 -The realization of the Web Server is based on the acceptanc
blaster
- W32.Blaster.Worm is a worm that propagates by exploiting the Microsoft Windows DCOM RPC Interface Buffer Overrun Vulnerability (BID 8205). http://www.symantec.com/security_response/writeup.jsp?docid=2003-081113-0229-99
blaster
- W32.Blaster.Worm is a worm that propagates by exploiting the Microsoft Windows DCOM RPC Interface Buffer Overrun Vulnerability (BID 8205). http://www.symantec.com/security_response/writeup.jsp?docid=2003-081113-0229-99
main
- Just a keyboard shortcut doubleclicker in dev c++ i made for exploiting a game. Really simple to understand. It works even when not in focus.
dwprotected
- Matlab source code for DCT-based watermarking for grayscale images. DCT-based watermark recovering without resorting to the uncorrupted original image. Digital watermarking has been proposed as a viable solution to the n
New
- 本文讲述多媒体转码从H.263到新一代视频编码标准H.264的异构网络转码的新算法研究-In this paper, we investigate and propose efficient methods for transcoding H.263 video to H.264/AVC standard by exploiting the new coding features. Specifically, the propo
The_Shellcoders_Handbook[2Ed]
- The Shellcoder’s Handbook -- Discovering and Exploiting Security Holes Second Edition
BayesianInference
- Bayesian Analysis Exploiting Discretization-Bayesian Analysis Exploiting Discretization
ExploitingForceFeedbackinPilotTrainingandControlof
- 《Exploiting force feedback in pilot training and control of an underwater robotics vehicle: an implementation in LabVIEW》 Xunzhang Wang Seet, G.G.L. Lau, M.W.S. Low, E. Tan, K.C. OCEANS 2000 MTS/IEEE Conferenc
InitialPerformanceEvaluationofDFTSpreadOFDMBasedS
- Abstract—In this paper we present an initial performance evaluation of the 3GPP UTRA Long Term Evolution (UTRA LTE) uplink with baseline settings. The performance results are obtained from a detailed UTRA LTE uplin
Exploiting.Software
- Exploiting Software How to Break Code的chm版本,网上通常都是由这个chm转化而成的PDF版本,阅读起来没这个好-The chm version of <Exploiting Software How to Break Code>