您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Google DeepMind的David Silver的强化学习课程讲义

  2. ,包括Markov Decision Processes、Planning by Dynamic Programming、Model-Free Prediction、Model-Free Control、Function Approximation、Policy Gradient Methods、Integrating Learning and Planning、Exploration and Exploitation以及游戏案例分析
  3. 所属分类:深度学习

    • 发布日期:2018-05-08
    • 文件大小:7340032
    • 提供者:gelinggeling88
  1. Autosar SWS ComManager

  2. This specification and the material contained in it, as released by AUTOSAR is for the purpose of information only. AUTOSAR and the companies that have contributed to it shall not be liable for any use of the specification. The material contained in
  3. 所属分类:C

    • 发布日期:2018-05-22
    • 文件大小:1048576
    • 提供者:meiyongguodeid
  1. Local File Disclosure using SQL Injection

  2. SQL Injection AKA mother of hacking is one of the notorious and well known vulnerability which has caused lots of damage to cyber world. Researchers has published lots of stuff on different-2 exploitation techniques for conducting various type of at
  3. 所属分类:系统安全

    • 发布日期:2018-05-29
    • 文件大小:1048576
    • 提供者:fengnanman
  1. Kali Linux Penetration Testing 资料

  2. Advanced Penetration Testing For Highly-Secured Environments The Ultimate Security Guide -2012.pdf BackTrack 5 Wireless Penetration Testing Beginner's Guide [Sucax].pdf Basic Security Testing with Kali Linux (2014).PDF Gray Hat Hacking 2nd Edition.p
  3. 所属分类:网络攻防

    • 发布日期:2018-05-31
    • 文件大小:167772160
    • 提供者:darling757267
  1. online clustering of bandits

  2. Abstract We introduce a novel algorithmic approach to content recommendation based on adaptive clustering of exploration-exploitation("bandit") strategies.We provide sharo regret analysis of this algorithm in a standard stochastic noise setting,demo
  3. 所属分类:算法与数据结构

    • 发布日期:2018-06-05
    • 文件大小:2097152
    • 提供者:u010811683
  1. David Silver强化学习课件ppt

  2. David Silver强化学习课程文件Lecture 1: Introduction to Reinforcement Learning Lecture 2: Markov Decision Processes Lecture 3: Planning by Dynamic Programming Lecture 4: Model-Free Prediction Lecture 5: Model-Free Control Lecture 6: Value Function Approximat
  3. 所属分类:深度学习

    • 发布日期:2018-07-03
    • 文件大小:14680064
    • 提供者:qq_21997625
  1. Hands-On Penetration Testing on Windows - 2018 pdf 5分

  2. Hands-On Penetration Testing on Windows pdf 页数:454 来源: https://itbooks.ctfile.com/fs/18113597-302639985 Master the art of identifying vulnerabilities within the Windows OS and develop the desired solutions for it using Kali Linux. Book Descr iption
  3. 所属分类:网络攻防

    • 发布日期:2018-08-09
    • 文件大小:25165824
    • 提供者:oychw
  1. GPU-BASED-TECHNIQUES-FOR-GLOBAL-ILLUMINATION-EFFECTS

  2. This book presents techniques to render photo-realistic images by programming the Graphics Processing Unit (GPU). We discuss effects such as mirror reflections, refractions, caustics, diffuse or glossy indirect illumination, radiosity, single or mul
  3. 所属分类:其他

    • 发布日期:2018-08-31
    • 文件大小:7340032
    • 提供者:wuyuehang1990
  1. Google DeepMind的David Silver的强化学习 讲义

  2. Google DeepMind的David Silver的强化学习课程讲义,包括Markov Decision Processes、Planning by Dynamic Programming、Model-Free Prediction、Model-Free Control、Function Approximation、Policy Gradient Methods、Integrating Learning and Planning、Exploration and Exploitation以
  3. 所属分类:其它

    • 发布日期:2018-01-27
    • 文件大小:20971520
    • 提供者:zxzy17
  1. Attacking Network Protocols

  2. A Hacker’s Guide to Capture, Analysis, and Exploitation epub格式
  3. 所属分类:网络基础

    • 发布日期:2018-02-22
    • 文件大小:29360128
    • 提供者:beadinsea
  1. The Shellcoder

  2. The Shellcoder's Handbook 2nd Edition About the Authors vii Acknowledgments xi Introduction to the Second Edition xxiii Part I Introduction to Exploitation: Linux on x86 Chapter 1 Before You Begin 3 Basic Concepts 3 Memory Management 4 Assembly 6 Re
  3. 所属分类:系统安全

    • 发布日期:2018-06-30
    • 文件大小:8388608
    • 提供者:ldwj2016
  1. Network Scanning Cookbook

  2. Network scanning is a discipline of network security that identifies active hosts on networks and determining whether there are any vulnerabilities that could be exploited. Nessus and Nmap are among the top tools that enable you to scan your network
  3. 所属分类:网络攻防

    • 发布日期:2018-10-19
    • 文件大小:28311552
    • 提供者:tlforest
  1. Hacking with Kali (用Kali进行Hack)

  2. This book will walk the reader through the penetration testing lifecycle using the most advanced live disk available today, Kali Linux. AĞer this brief introduction, the chapter details how to find, download, install, and customize Kali Linux. Next
  3. 所属分类:网络攻防

    • 发布日期:2018-10-26
    • 文件大小:8388608
    • 提供者:letmedownthem
  1. Kali Linux Network Scanning Cookbook

  2. Kali Linux Network Scanning Cookbook - Second Edition by Michael Hixon English | 6 Jun. 2017 | ASIN: B06VW5FB1S | 634 Pages | AZW3 | 36.7 MB Key Features Learn the fundamentals behind commonly used scanning techniques Deploy powerful scanning tools
  3. 所属分类:网络监控

    • 发布日期:2018-11-22
    • 文件大小:5242880
    • 提供者:qq_36485711
  1. Adversarial Cross-Modal Retrieval

  2. 基于对抗的跨媒体检索Cross-modal retrieval aims to enable flexible retrieval experience across different modalities (e.g., texts vs. images). The core of crossmodal retrieval research is to learn a common subspace where the items of different modalities can be
  3. 所属分类:机器学习

    • 发布日期:2018-11-27
    • 文件大小:1048576
    • 提供者:sdustephen
  1. Kali_Linux_Web_Penetration_Testing_Cookbook

  2. Key Features, Familiarize yourself with the most common web vulnerabilities a web application faces, and understand how attackers take advantage of themSet up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run e
  3. 所属分类:网络安全

    • 发布日期:2018-11-28
    • 文件大小:22020096
    • 提供者:u010296996
  1. Specification of RTE

  2. This specification and the material contained in it, as released by AUTOSAR, is for the purpose of information only. AUTOSAR and the companies that have contributed to it shall not be liable for any use of the specification. The material contained i
  3. 所属分类:交通

    • 发布日期:2019-03-18
    • 文件大小:5242880
    • 提供者:jiang_mr
  1. The Hacker Playbook 3 Practical Guide To Penetration Testing

  2. Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put yourself in the center of the action toward victory.
  3. 所属分类:网络攻防

    • 发布日期:2019-03-21
    • 文件大小:8388608
    • 提供者:iixoh
  1. The IoT Hacker

  2. The ten chapters of this book cover a number of topics, ranging from hardware and embedded exploitation, to firmware exploitation, to radio communication, including BLE and ZigBee exploitation.
  3. 所属分类:其它

    • 发布日期:2019-04-02
    • 文件大小:18874368
    • 提供者:localsg
  1. GPU工作原理分析资料.pdf

  2. In the early 1990s, ubiquitous interactive 3D graphics was still the stuff of science fiction. By the end of the decade, nearly every new computer contained a graphics processing unit (GPU) dedicated to providing a high-performance, visually rich, in
  3. 所属分类:其它

    • 发布日期:2019-07-23
    • 文件大小:3145728
    • 提供者:weixin_39841365
« 1 2 3 4 5 6 78 9 »