您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Google DeepMind的David Silver的强化学习课程讲义

  2. Google DeepMind的David Silver的强化学习课程讲义,包括Markov Decision Processes、Planning by Dynamic Programming、Model-Free Prediction、Model-Free Control、Function Approximation、Policy Gradient Methods、Integrating Learning and Planning、Exploration and Exploitation以
  3. 所属分类:讲义

    • 发布日期:2016-06-20
    • 文件大小:20971520
    • 提供者:happytofly
  1. Basic.Security.Testing.with.Kali.Linux.2.153050656

  2. Basic Security Testing with Kali Linux 2 Kali Linux 2 (2016) is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use, so they can find security issues before the bad guys do. In Basic Securit
  3. 所属分类:系统安全

    • 发布日期:2016-07-25
    • 文件大小:15728640
    • 提供者:ramissue
  1. Wireshark.for.Security.pdf

  2. Master Wireshark to solve real-world security problems If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging net
  3. 所属分类:网络安全

    • 发布日期:2017-03-27
    • 文件大小:14680064
    • 提供者:ramissue
  1. Format String Exploitation Tutorial-Saif EI-Sherei

  2. 详细解释了字符串格式化漏洞的形成和利用方法
  3. 所属分类:其它

    • 发布日期:2017-04-23
    • 文件大小:494592
    • 提供者:iextract
  1. Metasploit Bootcamp

  2. Metasploit Bootcamp by Nipun Jaswal English | 25 May 2017 | ASIN: B0725ZGX9H | 230 Pages | AZW3 | 16.52 MB Key Features A fast-paced guide that will quickly enhance your penetration testing skills in just 7 days Carry out penetration testing in comp
  3. 所属分类:网络安全

    • 发布日期:2017-06-11
    • 文件大小:16777216
    • 提供者:u013003382
  1. 预期边际替代率的估计——特殊风险的系统开发

  2. Estimating the expected marginal rate of substitution A systematic exploitation of idiosyncratic risk
  3. 所属分类:讲义

    • 发布日期:2017-07-24
    • 文件大小:380928
    • 提供者:shifengwang123
  1. Wireshark.for.Security.pdf

  2. Master Wireshark to solve real-world security problems If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging net
  3. 所属分类:网络安全

    • 发布日期:2017-08-26
    • 文件大小:14680064
    • 提供者:robertyuzj
  1. drozer2.3.4

  2. drozer (formerly Mercury) is the leading security testing framework for Android. drozer allows you to search for security vulnerabilities in apps and devices by assuming the role of an app and interacting with the Dalvik VM, other apps' IPC endpoint
  3. 所属分类:其它

    • 发布日期:2017-09-21
    • 文件大小:39845888
    • 提供者:u013821237
  1. Metasploit+beef攻击实验

  2. BeEF,全称The Browser Exploitation Framework,是一款针对浏览器的渗透测试工具。
  3. 所属分类:网络攻防

    • 发布日期:2017-10-12
    • 文件大小:412672
    • 提供者:qq_39594257
  1. David Silver的强化学习Reinforcement Learning课程PPT

  2. David Silver的强化学习课程PPT Lecture 1: Introduction to Reinforcement Learning Lecture 2: Markov Decision Processes Lecture 3: Planning by Dynamic Programming Lecture 4: Model-Free Prediction Lecture 5: Model-Free Control Lecture 6: Value Function Approxi
  3. 所属分类:深度学习

    • 发布日期:2017-12-18
    • 文件大小:16777216
    • 提供者:w_fly_cn
  1. EXPLOITATION OF SAR

  2. 是关于合成孔径雷达,在三峡地区的一篇比较不错的论文,不知道这里是否有人对此感兴趣。先贴一贴
  3. 所属分类:专业指导

    • 发布日期:2009-01-01
    • 文件大小:1048576
    • 提供者:qwer_ws
  1. The Art of Computer Virus Research and Defense

  2. 研究病毒的运行原理,并进行有效防范 Discovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more Identifying and responding to code obfusc
  3. 所属分类:网络攻防

    • 发布日期:2009-02-22
    • 文件大小:13631488
    • 提供者:lei_captain
  1. Hacking: The Art of Exploitation

  2. 英文版的PDF格式 This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks
  3. 所属分类:专业指导

    • 发布日期:2009-03-17
    • 文件大小:1048576
    • 提供者:lxiaol918
  1. 学生成绩管理系统 visualstudio开发工具

  2. 一篇很完整、很不错的论文、希望你们喜欢 摘要 学生成绩管理系统是典型的信息管理系统,其开发主要包括后台数据库的建立和维护以及前端应用程序的开发两个方面。对于前者要求建立起数据一致性和完整性强.数 据安全性好的库。而对于后者则要求应用程序功能完备,易使用等特点。 经过分析如此情况,我们使用Microsoft公司的visualstudio开发工具,利用其提供的各种面向对象的开发工具,尤其是数据窗口这一能方便而简洁操纵数据库的智能化对象,首先在短时间内建立系统应用原型,然后,对初始原型系统进行需求迭
  3. 所属分类:C#

    • 发布日期:2009-03-24
    • 文件大小:385024
    • 提供者:alikb
  1. 自适应遗传算法的国外IEEE优秀论文

  2. Genetic Algorithms have been used to solve difficult ptimization problems in a number of fields. However, order to solve a problem with GA, the user has to ecify a number of parameters. This parameter tuning a difficult task as different genetic ope
  3. 所属分类:其它

    • 发布日期:2009-04-20
    • 文件大小:191488
    • 提供者:clearnight
  1. Security with Go

  2. Go is becoming more and more popular as a language for security experts. Its wide use in the server and cloud environment, its speed and ease of use, and its evident capabilities in data analysis have made it a prime choice for developers concerned
  3. 所属分类:系统安全

    • 发布日期:2018-03-15
    • 文件大小:919552
    • 提供者:lanjiajie
  1. Attacking Network Protocols A Hacker

  2. Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and Exploitation 英文无水印原版pdf pdf所有页面使用FoxitReader、PDF-XChangeViewer、SumatraPDF和Firefox测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 查看此书详细信息请在美国亚马逊官网搜索此书
  3. 所属分类:其它

    • 发布日期:2018-03-16
    • 文件大小:12582912
    • 提供者:u011433684
  1. 网络协议攻击

  2. What’s in This Book? This book contains a mix of theoretical and practical chapters. For the practical chapters, I’ve developed and made available a networking library called Canape Core, which you can use to build your own tools for protocol analys
  3. 所属分类:网络安全

    • 发布日期:2018-03-21
    • 文件大小:12582912
    • 提供者:weixin_41792059
  1. hacking exposed web applications

  2. Implement bulletproof e-business security the proven Hacking Exposed way. Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exp
  3. 所属分类:Web开发

    • 发布日期:2018-03-29
    • 文件大小:3145728
    • 提供者:sinat_21954747
  1. AIS3 2017 Binary Exploitation

  2. 主要用于学习pwn的二进制安全,缓冲区溢出技术,栈溢出,堆溢出等
  3. 所属分类:系统安全

    • 发布日期:2018-04-15
    • 文件大小:3145728
    • 提供者:github_36788573
« 1 2 3 4 5 67 8 9 »