Google DeepMind的David Silver的强化学习课程讲义,包括Markov Decision Processes、Planning by Dynamic Programming、Model-Free Prediction、Model-Free Control、Function Approximation、Policy Gradient Methods、Integrating Learning and Planning、Exploration and Exploitation以
Basic Security Testing with Kali Linux 2 Kali Linux 2 (2016) is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use, so they can find security issues before the bad guys do. In Basic Securit
Master Wireshark to solve real-world security problems If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging net
Metasploit Bootcamp by Nipun Jaswal English | 25 May 2017 | ASIN: B0725ZGX9H | 230 Pages | AZW3 | 16.52 MB Key Features A fast-paced guide that will quickly enhance your penetration testing skills in just 7 days Carry out penetration testing in comp
Master Wireshark to solve real-world security problems If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging net
drozer (formerly Mercury) is the leading security testing framework for Android. drozer allows you to search for security vulnerabilities in apps and devices by assuming the role of an app and interacting with the Dalvik VM, other apps' IPC endpoint
研究病毒的运行原理,并进行有效防范 Discovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more Identifying and responding to code obfusc
英文版的PDF格式 This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks
Genetic Algorithms have been used to solve difficult ptimization problems in a number of fields. However, order to solve a problem with GA, the user has to ecify a number of parameters. This parameter tuning a difficult task as different genetic ope
Go is becoming more and more popular as a language for security experts. Its wide use in the server and cloud environment, its speed and ease of use, and its evident capabilities in data analysis have made it a prime choice for developers concerned
Attacking Network Protocols A Hacker's Guide to Capture, Analysis, and Exploitation 英文无水印原版pdf pdf所有页面使用FoxitReader、PDF-XChangeViewer、SumatraPDF和Firefox测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 查看此书详细信息请在美国亚马逊官网搜索此书
What’s in This Book? This book contains a mix of theoretical and practical chapters. For the practical chapters, I’ve developed and made available a networking library called Canape Core, which you can use to build your own tools for protocol analys
Implement bulletproof e-business security the proven Hacking Exposed way. Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exp