Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • the hacker playbook ... - Cracking, Exploits, And Tricks Password Cracking John The Ripper OclHashcat Vulnerability Searching Searchsploit (Kali Linux) Bugtraq Exploit-db Querying Metasploit Tips and Tricks RC Scripts Within Metasploit Windows Sniffer Bypass UAC Kali Linux ...
  • 社交网络推荐系统Social Network-Based Recommender Systems ... may offer a wide range of important benefits such as receiving online help and support and the ability to exploit professional opportunities. One of the most profound properties of social networks is their dynamic nature governed by people constantly ...
  • 模式识别2011springer ... are represented using some appropriate pre-processing techniques in the form of vectors of numbers, we will describe algorithms that exploit numeric data in order to make important decisions like classification. Plenty of worked out examples have been ...
  • Kali Linux Network Scanning Cookbook ... and tools Identify distinct vulnerabilities in both web applications and remote services and understand the techniques that are used to exploit them Perform comprehensive scans to identify listening on TCP and UDP sockets Get an overview of the different ...
  • David K.-Barton. Radar System Analysis and Modeling ... two decades, it is appropriate to update the material to reflect further develop­ mcnts in radar technology and to exploit the analysis and modeling capabilities of modem personal computers. Radar System Analysis and Modeling summarizes the theory of ...
  • Kali_Linux_Web_Penetration_Testing_Cookbook ... recipes, how to detect a wide array of vulnerabilities, exploit them to analyze their consequences, and ultimately buffer attackable ... book, you will have the required skills to identify, exploit, and prevent web application vulnerabilities., What you will ...
  • Kali Linux Web Penetration Testing Cookbook 2nd - 2018 ... will have acquired the skills you need to identify, exploit, and prevent web application vulnerabilities. What you will ... website Identify cross-site scripting and client-side vulnerabilities Exploit vulnerabilities that allow the insertion of code into ...
  • Intel Threading Building Blocks Multi-core systems have arrived. Parallel programming models are needed to enable the creation of programs that exploit them. A good deal of education is needed to help sequential programmers adapt to the requirements of this new technology. This book ...
  • Optimal Transport for Domain Adaptation ... PDFs, which constrains labeled samples of the same class in the source domain to remain close during transport. This way, we exploit at the same time the labeled samples in the source and the distributions observed in both domains. Experiments on toy and ...
  • Web Penetration Testing with Kali Linux, 3rd Edition ... relate to web application hacking. You'll gain a deep understanding of classicalSQL, command-injection flaws, and the many ways to exploit these flaws. Web penetration testing also needs a general overview of client-side attacks, which is rounded out by a ...