《Cryptography in C and C++》 b33K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4m8A6j5$3E0#2M7q4)9J5k6h3#2G2k6X3W2D9k6g2)9J5k6h3y4G2L8g2)9J5c8U0f1@1x3o6f1K6y4K6f1%4x3U0M7$3x3K6M7K6z5e0M7`.
The art of Reversing.pdf 784K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4m8A6j5$3E0#2M7q4)9J5k6h3#2G2k6X3W2D9k6g2)9J5k6h3y4G2L8g2)9J5c8U0M7K6x3K6M7K6x3o6p5@1x3e0R3#2x3K6l9#2x3e0M7`.
Hacking:The Are of Exploition d63K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4m8A6j5$3E0#2M7q4)9J5k6h3#2G2k6X3W2D9k6g2)9J5k6h3y4G2L8g2)9J5c8U0f1#2z5o6f1#2y4e0x3K6y4e0R3I4x3K6x3I4x3K6R3`.
刚刚把这本漏了~