详细描述基于java的agent平台的jade开发工具,pdf文字清晰,附有部分笔记。读者对此书感兴趣,请到正规书店购买,支持正版!
2019-12-21 22:18:53 3.6MB jade,pdf,agent
1
SSD的官方文档SSD论文官方PDF版本SSD的官方文档SSD论文官方PDF版本
2019-12-21 22:15:19 2.2MB SSD
1
电磁兼容原理与技术,讲述其原理及相关技术。
2019-12-21 22:02:57 7.33MB 电磁兼容原理与技术
1
TMS320C6000系列DSPs原理与应用(第二版),这个有好多资源,不过都是pdg版本的,我转了一个pdf版本的,免费给大家。
2019-12-21 21:53:09 16.21MB tms320c6000
1
文件内包含北京邮电大学通信原理801历年考研真题及答案,希望可以帮到学弟学妹。
2019-12-21 21:38:29 56.91MB beiyou 801 kaoyan zhenti
1
Learning Linux Binary Analysis by Ryan "elfmaster" O'Neill 2016 | ISBN: 1782167102 | English | 282 pages | True PDF | 2 MB Key Features Grasp the intricacies of the ELF binary format of UNIX and Linux Design tools for reverse engineering and binary forensic analysis Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes Book Description Learning Linux Binary Analysis is packed with knowledge and code that will teach you the inner workings of the ELF format, and the methods used by hackers and security analysts for virus analysis, binary patching, software protection and more. This book will start by taking you through UNIX/Linux object utilities, and will move on to teaching you all about the ELF specimen. You will learn about process tracing, and will explore the different types of Linux and UNIX viruses, and how you can make use of ELF Virus Technology to deal with them. The latter half of the book discusses the usage of Kprobe instrumentation for kernel hacking, code patching, and debugging. You will discover how to detect and disinfect kernel-mode rootkits, and move on to analyze static code. Finally, you will be walked through complex userspace memory infection analysis. This book will lead you into territory that is uncharted even by some experts; right into the world of the computer hacker. What you will learn Explore the internal workings of the ELF binary format Discover techniques for UNIX Virus infection and analysis Work with binary hardening and software anti-tamper methods Patch executables and process memory Bypass anti-debugging measures used in malware Perform advanced forensic analysis of binaries Design ELF-related tools in the C language Learn to operate on memory with ptrace
2019-12-21 21:26:45 2.2MB Linux
1
包含两本书籍 《Windows7注册表秘技大搜捕.pdf》 和 《72小时精通BIOS与注册表.pdf》 ,都是pdf版本,高清 带书签、目录的
1
《TCP-IP详解卷一:协议》pdf版,学习计算机网络的优先书籍。
2019-12-21 21:18:48 13.15MB TCP-IP协议
1
很多使用LoadRunner的测试人员经常面临两个难题:脚本开发与性能测试分析。本书就是基于帮助测试人员解决这两个问题而编写,致力于使读者学精LoadRunnner这一强大的性能测试工具。 全书共分为四部分:入门篇、基础篇、探索篇、实战篇。第一篇入门篇的内容包括第1章和第2章,着重于讲解性能测试与LoadRunner的基础理论知识。第二篇基础篇的内容包括第3章至第5章,是LoadRunner的基本使用部分,着重讲解Virtual User Generator、Controller、Analysis的使用方法。
2019-12-21 21:17:05 1.6MB LoadRunner 实战 pdf
1
想学新概念的朋友能用得上,省得买课本了,pdf版本
2019-12-21 21:16:29 16.84MB 新概念英语
1