Welcome![Sign In][Sign Up]
Location:
Search - hacker skills

Search list

[Windows Develop3

Description: 电脑基础知识相关精华书籍3包括 电脑技巧精彩文章100篇-(1).chm 黑客零起点网络手册.chm 计算机故障速查手册.pdf 刻录问题集锦.chm 电脑技巧3000招.CHM 等10多个电脑精髓书籍-Basic knowledge of computer-related books, three, including computer skills essence excellent article 100- (1). Chm Hacker Web beginners manual. Chm computer failure Quick Fact Manual. Pdf DVD FAQs. Chm computer skills 3000 strokes. CHM more than 10 Computer essence of books
Platform: | Size: 62093312 | Author: gaomj | Hits:

[ERP-EIP-OA-PortalHackerProgramming

Description: 黑客编程技巧大全,非常用值得学习的一本书。-Hacker programming skills Daquan, very much worth learning to use a book.
Platform: | Size: 350208 | Author: HKATV | Hits:

[Exploit2222

Description: 抵御黑客入侵防护服务器安全的七个技巧,有效地抵御黑客入侵。-Server security against hacker intrusion of seven skills, effective against hackers.
Platform: | Size: 6144 | Author: 李磊 | Hits:

[Internet-Network2011

Description: 2011精编黑客入门.pdf 黑客入门(超级详细版) pdf可编辑 二.黑客应掌握的基本技能 从这一节开始,我们就真正踏上学习黑客的道路了,首先要介绍的是作为一名初级黑客所必 须掌握的基本技能,学习这可以通过这一节的阅读了解到黑客并不神秘,而且学习起来很容 易上手。为了保证初学者对黑客的兴趣,所以本书采取了循环式进度,也就是说每一章节的 内容都是独立、全面的,学习者只有完整的学习过一章的内容,才能够进而学习下一章的内 容。-2011 entry for fine hacker. Pdf hacker entry (super detailed version) pdf editable two. Hackers should master the basic skills from the beginning of this section, we actually set foot on the path of a hacker to learn, first introduced as a junior hackers must master the basic skills, learning which can be learned by reading this section is not a mystery hacker, but learning it is very easy to use. In order to ensure the interest of hackers, beginners, so take a circular progress of the book, that the contents of each chapter is independent, comprehensive, learners only learned the full chapter content, and thus be able to learn the next chapter content.
Platform: | Size: 230400 | Author: 王裕海 | Hits:

[Other3DvisionKinectProcessingandArduino

Description: 欢迎视觉革命。在微软的Kinec带领下,您现在可以使用三维计算机视觉技术建立数字化三维模型,人和物体,你可以用手势和语音指令操作。这手势指导,提供所有的技术和概念的信息,你需要为Kinect建立出色应用,使用的加工编程语言和Arduino的微控制器。 无论你是学生,业余爱好者,制造商,玩家,或硬件黑客,Things See让你与几个Kinect的项目运行,给予你用这神奇的三维计算机视觉技术建立你自己的玩意和创意项目的技能和经验。解锁你的能力,建立与Kinect的交互式应用程序。 了解面部识别,步态分析和深度成像 分析和操作点云 用骨架和姿势检测,跟踪检测对象,使用block tracjing 检测物体 使用手势接口作为辅助技术 为设计和制造创建模型,使用三维扫描技术和三维打印机钻研动物和动画的运动跟踪 在这本书中用廉价的现成组件构建书里的每一个项目.-Welcome to the Vision Revolution. With Microsoft’s Kinect leading the way, you can now use 3D computer vision technology to build digital 3D models of people and objects that you can manipulate with gestures and spoken commands. This hands-on guide provides all the technical and conceptual information you need to build cool applications for Kinect, using the Processing programming language and the Arduino microcontroller. Whether you’re a student, hobbyist, maker, gamer, or hardware hacker, Making Things See gets you running with several Kinect projects, and gives you the skills and experience you need to build your own fun and creative projects with this magical 3D computer vision technology. Unlock your ability to build interactive applications with Kinect. Learn about face recognition, gait analysis, and depth imaging Analyze and manipulate point clouds Track people with skeletonization and pose detection, and use blob tracking to detect objects Use gestural interfaces f
Platform: | Size: 12392448 | Author: hjm | Hits:

[Otherruqin

Description: 利用DOS指令入侵对方电脑,方法简答,是黑客的基本技能-Invasion of the enemy s computer using the DOS command short answer is the hacker s basic skills
Platform: | Size: 17408 | Author: 黄惠超 | Hits:

[Software EngineeringWeb-front-end-hacking-techniques

Description: Web 前端的黑客攻防技术是一门非常新颖且有趣的黑客技术,主要包含Web 前端安全的跨站脚本 (XSS)、跨站请求伪造(CSRF)、界面操作劫持这三大类,涉及的知识点涵盖信任与信任关系、Cookie 安全、Flash 安全、DOM 渲染、字符集、跨域、原生态攻击、高级钓鱼、蠕虫思想等,这些都是研究前端 安全的人必备的知识点。本书作者深入剖析了许多经典的攻防技巧,并给出了许多独到的安全见解。-Web front-end hacker attack and defense is a very novel technology and interesting hacking techniques, mainly includes Web front-end secure cross-site scripting (XSS), cross-site request forgery (CSRF), interface operation hijack these three categories, involving knowledge covers the relationship of trust and confidence, Cookie Security, Flash security, DOM rendering, character sets, cross-domain, original attack, senior phishing, worms and other ideas, these are people who study the necessary front-end security knowledge. The author of many classic-depth analysis of offensive and defensive skills, and gives many unique security insights.
Platform: | Size: 2396160 | Author: sskyline | Hits:
« 1 2»

CodeBus www.codebus.net