This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. 译作:《黑客入侵的艺术》,也是从朋友的宝箱中搜来的,以前层大致浏览过,是难得一件的好资料。
资源简介:This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. ...
上传时间: 2013-12-28
上传用户:离殇
资源简介:This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. ...
上传时间: 2014-08-14
上传用户:Breathe0125
资源简介:This paper analyzes the vector control theory of asynchronous motors based on the magnetic orientation of motor rotors, and its mathematical model is made. Then the variable frequency vector speed-adjusting experimental system is built with...
上传时间: 2013-12-08
上传用户:shinesyh
资源简介:This book is a hands-on introduction to the principles and practice of embedded system design using the PIC microcontroller. Packed with helpful examples and illustrations, it gives an in-depth treatment of microcontroller design, pro...
上传时间: 2014-01-17
上传用户:wuyuying
资源简介:This document teach about the theory of motor control such as H-bridge and other theories such as PID control, PWN.
上传时间: 2013-11-25
上传用户:daguda
资源简介:pic mcu code:This application note describes the design and implementation of a USB Mass Storage Device (MSD) using a Secure Digital card, which should prove useful to developers of USB mass storage solutions. This application may be us...
上传时间: 2014-11-23
上传用户:天诚24
资源简介:Using a holistic approach to teaching developers the ins-and-outs of GNU/Linux programming using APIs, tools, communication, and scripting, this book introduces programmers to the environment from the lowest layers to the user layers.
上传时间: 2013-12-23
上传用户:kristycreasy
资源简介:A fast approach to the detection and correction of skew documentsIn this paper, a fast approach is proposed to detect and correct skew documents.
上传时间: 2015-09-19
上传用户:yiwen213
资源简介:This book is concerned with the description and analysis of the global second generation (2G) mobile radio systems: the Global System of Mobile Communications (GSM) and cdmaOne. A subsidiary goal is to examine how these two systems will e...
上传时间: 2014-01-14
上传用户:2467478207
资源简介:This demonstration shows that reordering the rows and columns of a sparse matrix S can affect the time and storage required for a matrix operation such as factoring S into its Cholesky decomposition
上传时间: 2016-01-14
上传用户:奇奇奔奔