您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. The Art Of Unix Programming

  2. 超级经典!!! The Art of Unix Programming Eric Steven Raymond Table of Contents 目录 Requests for reviewers and copy-editors Preface Who Should Read This Book How To Use This Book Related References Conventions Used In This Book Our Case Studies Author's Ac
  3. 所属分类:C

    • 发布日期:2009-09-22
    • 文件大小:3145728
    • 提供者:tutu1212
  1. The best software writting

  2. CONTENTS About the Editor . . . . . . . . . . . . . . . . . vii About the Authors . . . . . . . . . . . . . . . . ix Introduction . . . . . . . . . . . . . . . . . . . xv Ken Arnold Style Is Substance . . . . . . . . . . . . . . . . 1 Leon Bambrick
  3. 所属分类:C++

    • 发布日期:2009-10-06
    • 文件大小:2097152
    • 提供者:aimee_liu
  1. SessionHijacking

  2. With the emerging fields in e-commerce, financial and identity information are at a higher risk of being stolen. The purpose of this paper is to illustrate a common cum valiant security threat to which most systems are prone to i.e. Session Hijackin
  3. 所属分类:其它

    • 发布日期:2009-10-08
    • 文件大小:37888
    • 提供者:eqmcc
  1. linux device driver programming

  2. Preface This is, on the surface, a book about writing device drivers for the Linux system. That is a worthy goal, of course; the flow of new hardware products is not likely to slow down anytime soon, and somebody is going to have to make all those n
  3. 所属分类:Linux

    • 发布日期:2009-10-09
    • 文件大小:4194304
    • 提供者:zlao4
  1. Learning Perl

  2. If you’re looking for the best way to spend your first 30 to 45 hours with the Perl programming language, you’ve found it. In the pages that follow, you’ll find a carefully paced introduction to the language that is the workhorse of the Internet, as
  3. 所属分类:Perl

    • 发布日期:2009-11-13
    • 文件大小:7340032
    • 提供者:xiaoxie59
  1. HackersDelight.chm

  2. HackersDelight.chm
  3. 所属分类:Veritas

    • 发布日期:2007-11-26
    • 文件大小:2097152
    • 提供者:zzyjsjcom
  1. 智能关闭危险端口(bat文件)

  2. 智能关闭危险端口(bat文件) @echo off gpupdate >nul rem For Client only ipseccmd -w REG -p "HFUT_SECU" -o -x >nul ipseccmd -w REG -p "HFUT_SECU" -x >nul rem ipseccmd -w REG -p "HFUT_SECU" -r "Block TCP/80" -f *+0:80:TCP -n BLOCK -x >nul rem ipseccmd
  3. 所属分类:网络攻防

    • 发布日期:2009-12-28
    • 文件大小:4096
    • 提供者:lpddong
  1. Advanced graphics game programming

  2. gamasutra 游戏编程文集 ----------------------- Implementing modular HLSL with RenderMonkey 1 Animation with Cg 17 Building an AI sensory system 41 Enabling complex character animations 49 What designers need to know about physics 59 Contact physics 63 Adv
  3. 所属分类:Java

    • 发布日期:2009-12-31
    • 文件大小:25165824
    • 提供者:osoon
  1. Hacking+-+The+Art+Of+Exploitation+2e+(No+Starch,+2008).chm

  2. Hacking+-+The+Art+Of+Exploitation+2e+(No+Starch,+2008) Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselve
  3. 所属分类:专业指导

    • 发布日期:2009-12-31
    • 文件大小:4194304
    • 提供者:flyic_ustc
  1. The Art Of UNIX Programming (2003)

  2. Copyright Addison-Wesley Professional Computing Series List of Figures List of Tables List of Examples Preface Who Should Read This Book How to Use This Book Related References Conventions Used in This Book Our Case Studies Author's Acknowledgements
  3. 所属分类:C

    • 发布日期:2010-01-10
    • 文件大小:1048576
    • 提供者:zhangheyin
  1. Hacker

  2. Hacker's Delight "This is the first book that promises to tell the deep, dark secrets of computer arithmetic, and it delivers in spades. It contains every trick I knew plus many, many more. A godsend for library developers, compiler writers, and lov
  3. 所属分类:其它

    • 发布日期:2010-02-02
    • 文件大小:2097152
    • 提供者:psyche08
  1. POSIX 多线程程序设计

  2. Today, there are three primary sets of multithreading (MT) libraries: the“standards-based” libraries (all of the UNIX® implementations and VMS, whichare moving to POSIX), the OS/2® library, and the Win32 library. (The NT andOS/2 libraries are fairly
  3. 所属分类:C++

    • 发布日期:2007-12-11
    • 文件大小:963584
    • 提供者:ybbai_cti
  1. Combating Spyware in the Enterprise(syngress安全图书)

  2. Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware. Combating Spyware in the Enterprise begins by examining the various types of insidious spyware an
  3. 所属分类:Web开发

    • 发布日期:2010-03-01
    • 文件大小:7340032
    • 提供者:sunxianbin
  1. The.Web.Application.Hackers.Handbook.Oct.2007

  2. web应用程序黑客手册,一本权威的书籍。
  3. 所属分类:Web开发

    • 发布日期:2010-03-07
    • 文件大小:10485760
    • 提供者:zzjcs1971
  1. Wiley.The.Web.Application.Hackers.Handbook.Oct.2007 (书签已做好)

  2. 我花了半个多小时才做好了标签,可怜吧:(
  3. 所属分类:Web开发

    • 发布日期:2010-03-15
    • 文件大小:12582912
    • 提供者:mrwsr
  1. Python Programming

  2. Gray+Hat+Python+Python+Programming+for+Hackers+and+Reverse+Engineers
  3. 所属分类:Python

    • 发布日期:2010-03-27
    • 文件大小:3145728
    • 提供者:chance2000
  1. The Web App.Hacker

  2. This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus,
  3. 所属分类:Web开发

    • 发布日期:2010-03-27
    • 文件大小:10485760
    • 提供者:Randolph_yyu
  1. linux2.6.18源码

  2. Linux is a clone of the operating system Unix, written from scratch by Linus Torvalds with assistance from a loosely-knit team of hackers across the Net. It aims towards POSIX and Single UNIX Specification compliance. It has all the features you wou
  3. 所属分类:Linux

    • 发布日期:2010-03-31
    • 文件大小:6291456
    • 提供者:taoshengyang
  1. Developer’s Guide to Web Application Security(syngress安全图书)

  2. Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vu
  3. 所属分类:Web开发

    • 发布日期:2010-04-05
    • 文件大小:10485760
    • 提供者:sunxianbin
  1. The Art of Designing Embedded Systems.pdf

  2. Introduction Any idiot can write code. Even teenagers can sling gates and PAL equations around. What is it that separates us from these amateurs? Do years of college necessarily make us professionals, or is there some other factor that clearly delin
  3. 所属分类:C

    • 发布日期:2010-04-10
    • 文件大小:8388608
    • 提供者:freewind_wei
« 1 2 3 4 5 6 78 9 10 11 12 ... 17 »