首页
社区
课程
招聘
[下载]Ebook links
发表于: 2008-8-16 13:18 3707

[下载]Ebook links

2008-8-16 13:18
3707
Ebook links

Kernel Windows Undocumented File Formats Source Code

13fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0S2M7r3W2V1M7$3S2S2M7X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6X3K9h3I4W2M7#2)9J5c8U0p5K6y4K6b7&6z5e0f1@1y4W2)9J5c8W2)9#2k6V1E0W2M7X3&6W2L8q4)9#2k6W2)9#2k6U0t1H3g2$3W2F1k6r3!0%4M7#2)9#2k6U0t1H3g2h3&6V1L8$3y4#2L8h3g2F1N6r3g2V1i4K6g2X3x3U0m8r3K9h3I4W2i4K6g2X3x3U0m8r3L8%4u0E0j5i4c8K6i4K6g2X3x3U0m8e0L8%4g2J5j5$3g2Q4y4h3j5J5x3p5y4G2k6r3g2Q4x3X3g2*7K9i4l9`.
Size:2717 KB

The Art of Disassembly

4dfK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0S2M7r3W2V1M7$3S2S2M7X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6X3K9h3I4W2M7#2)9J5c8U0p5K6y4K6b7&6z5e0f1#2x3q4)9J5c8W2c8Z5k6g2)9#2k6U0t1H3b7i4u0@1i4K6g2X3x3U0m8G2k6W2)9#2k6U0t1H3c8r3W2K6j5i4y4K6k6h3#2T1L8s2W2Q4x3X3g2J5j5i4t1`.
Size:2661 KB

How Debuggers Work

854K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0S2M7r3W2V1M7$3S2S2M7X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6X3K9h3I4W2M7#2)9J5c8U0p5K6y4K6b7&6z5e0f1#2y4g2)9J5c8W2N6A6L8r3g2&6i4K6g2X3x3U0m8Q4x3X3c8Q4y4h3j5J5x3p5S2G2N6#2)9#2k6U0t1H3c8r3g2T1N6h3N6Y4k6i4u0K6i4K6g2X3x3U0m8i4L8%4u0C8i4K6u0W2k6r3A6$3N6b7`.`.
Size:2697 KB

A.LIST Publishing Hacker Disassembling Uncovered

109K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0S2M7r3W2V1M7$3S2S2M7X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6X3K9h3I4W2M7#2)9J5c8U0p5K6y4K6b7&6z5e0f1%4y4#2)9J5c8V1q4Q4x3X3g2x3d9g2y4f1i4K6u0W2f1s2g2T1L8r3W2K6K9r3W2F1k6#2)9J5k6f1S2S2j5$3E0W2M7W2)9J5k6f1c8A6M7$3q4K6M7$3g2E0j5X3I4A6L8X3N6Q4x3X3g2g2L8X3y4G2N6X3g2J5k6h3c8Q4x3X3g2W2b7X3!0G2K9#2)9J5k6p5I4A6b7W2)9J5k6h3y4Z5L8b7`.`.
Size:4950 KB

Crackproof Your Software 2002

001K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0S2M7r3W2V1M7$3S2S2M7X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6X3K9h3I4W2M7#2)9J5c8U0p5K6y4K6b7&6z5e0f1&6x3q4)9J5c8V1y4J5j5h3y4C8M7s2u0G2L8$3k6Q4y4h3j5J5x3q4W2G2N6i4u0Q4y4h3j5J5x3q4y4G2k6Y4c8%4j5i4u0W2i4K6g2X3x3U0m8Q4y4h3j5J5x3o6l9J5i4K6g2X3i4K6u0W2M7r3c8X3
Size:7569 KB

Springer Reverse Engineering of Object Oriented Code Monographs in Computer Science

fc8K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0S2M7r3W2V1M7$3S2S2M7X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6X3K9h3I4W2M7#2)9J5c8U0p5K6y4K6b7&6z5e0f1&6x3g2)9J5c8W2y4H3M7X3W2F1k6$3g2J5i4K6u0W2f1X3g2$3k6i4u0K6k6g2)9J5k6f1g2F1k6$3W2F1k6h3g2J5K9h3&6Y4i4K6u0W2L8$3k6Q4x3X3g2a6j5X3A6W2j5%4c8Q4x3X3g2a6M7X3W2W2L8Y4c8W2k6q4)9J5k6f1y4G2k6r3g2Q4x3X3g2y4L8$3&6G2k6%4u0S2M7r3S2K6i4K6u0W2K9h3&6Q4x3X3g2o6L8$3#2H3N6i4c8W2M7W2)9J5k6g2y4U0K9h3g2F1j5$3g2Q4x3X3g2W2b7X3!0G2K9#2)9J5k6r3E0n7i4K6u0W2M7r3c8X3
Size:6785 KB

Reversing. Secrets of Reverse.Engineering (another link)

2d0K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0S2M7r3W2V1M7$3S2S2M7X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6X3K9h3I4W2M7#2)9J5c8U0p5K6y4K6b7&6z5e0j5I4x3W2)9J5c8W2N6A6L8r3g2&6i4K6u0W2f1X3g2$3k6i4u0K6K9h3&6Y4i4K6u0W2f1$3g2U0M7X3g2@1M7#2)9J5k6h3!0X3i4K6u0W2f1X3g2$3k6i4u0K6k6g2)9J5k6f1g2F1k6$3W2F1k6h3g2J5K9h3&6Y4i4K6u0W2b7i4m8J5i4K6u0W2x3U0l9H3y4g2)9J5k6h3g2n7L8$3!0C8i4K6u0V1c8p5c8g2i4K6u0W2M7r3c8X3
Size:8779 KB

The Debugger Handbook

1d9K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0S2M7r3W2V1M7$3S2S2M7X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6X3K9h3I4W2M7#2)9J5c8U0p5K6y4K6b7&6z5e0j5@1y4#2)9J5c8U0l9^5y4o6V1K6z5o6l9K6y4o6m8Q4x3X3g2m8g2f1g2d9b7V1q4o6d9q4)9J5k6g2c8Z5k6g2)9#2k6U0t1H3c8r3g2T1N6h3N6Y4k6i4u0Q4y4h3j5J5y4%4y4Q4y4h3j5J5x3p5S2S2L8X3c8T1L8$3!0C8i4K6u0W2M7r3c8X3
Size:15487 KB

The Developer’s Guide to Debugging

ff3K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3I4W2N6r3W2@1j5X3W2@1i4K6u0W2L8X3g2@1i4K6u0r3k6r3!0%4L8X3I4G2j5h3c8Q4x3V1j5$3j5U0V1K6k6U0j5K6x3e0l9#2x3e0S2Q4x3V1k6f1K9r3g2Q4x3X3g2p5k6i4k6Q4x3X3g2s2N6h3W2Q4x3X3g2@1L8#2)9J5k6f1c8T1k6#2)9J5k6i4u0S2M7W2)9J5k6h3S2@1L8h3H3`.

size:1.64mg

[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课

收藏
免费 1
支持
分享
最新回复 (3)
雪    币: 200
活跃值: (11)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
2
Learn.C.Sharp.Includes.the.C.Sharp.3.0.Features

53dK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3c8W2M7r3!0K6K9i4c8X3K9h3I4W2M7#2)9J5k6h3y4G2L8g2)9J5c8X3k6A6L8r3g2K6i4K6u0r3y4K6p5#2y4o6p5K6x3b7`.`.

==================

Addison.Wesley.Advanced.Windows.Debugging.Nov.2007

8e3K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3c8W2M7r3!0K6K9i4c8X3K9h3I4W2M7#2)9J5k6h3y4G2L8g2)9J5c8X3k6A6L8r3g2K6i4K6u0r3y4K6p5#2y4o6x3@1z5b7`.`.

==================

Computer Viruses for Dummies

365K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3c8W2M7r3!0K6K9i4c8X3K9h3I4W2M7#2)9J5k6h3y4G2L8g2)9J5c8X3k6A6L8r3g2K6i4K6u0r3y4K6p5#2y4o6x3&6z5l9`.`.

==================

cryptography.for.dummies.2004

2a0K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3c8W2M7r3!0K6K9i4c8X3K9h3I4W2M7#2)9J5k6h3y4G2L8g2)9J5c8X3k6A6L8r3g2K6i4K6u0r3y4K6p5#2y4o6b7^5x3R3`.`.

==================

Microsoft Windows Registry Guide, 2nd Edition (2005)

368K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3c8W2M7r3!0K6K9i4c8X3K9h3I4W2M7#2)9J5k6h3y4G2L8g2)9J5c8X3k6A6L8r3g2K6i4K6u0r3y4K6p5#2y4o6f1$3y4H3`.`.
=================
Reverse Engineering of Object Oriented Code

7deK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3c8W2M7r3!0K6K9i4c8X3K9h3I4W2M7#2)9J5k6h3y4G2L8g2)9J5c8X3k6A6L8r3g2K6i4K6u0r3y4K6p5#2y4o6j5@1x3H3`.`.

====================

Trojans Worms, and Spyware A Computer

7f7K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3c8W2M7r3!0K6K9i4c8X3K9h3I4W2M7#2)9J5k6h3y4G2L8g2)9J5c8X3k6A6L8r3g2K6i4K6u0r3y4K6p5#2y4o6j5$3y4H3`.`.

====================

Windows 2000 Native API Reference

1ebK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3c8W2M7r3!0K6K9i4c8X3K9h3I4W2M7#2)9J5k6h3y4G2L8g2)9J5c8X3k6A6L8r3g2K6i4K6u0r3y4K6p5#2y4o6M7K6y4b7`.`.

====================

Microsoft.Press.Microsoft.Visual.C.Sharp.2008.Step.by.Step.Dec.2007

455K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3c8W2M7r3!0K6K9i4c8X3K9h3I4W2M7#2)9J5k6h3y4G2L8g2)9J5c8X3k6A6L8r3g2K6i4K6u0r3y4K6p5#2y4o6M7%4x3H3`.`.

8dbK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3c8W2M7r3!0K6K9i4c8X3K9h3I4W2M7#2)9J5k6h3y4G2L8g2)9J5c8X3k6A6L8r3g2K6i4K6u0r3y4K6p5#2y4o6M7^5z5b7`.`.

c04K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3c8W2M7r3!0K6K9i4c8X3K9h3I4W2M7#2)9J5k6h3y4G2L8g2)9J5c8X3k6A6L8r3g2K6i4K6u0r3y4K6p5#2y4o6R3K6y4l9`.`.

94fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3c8W2M7r3!0K6K9i4c8X3K9h3I4W2M7#2)9J5k6h3y4G2L8g2)9J5c8X3k6A6L8r3g2K6i4K6u0r3y4K6p5#2y4o6R3$3z5l9`.`.

9f3K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3c8W2M7r3!0K6K9i4c8X3K9h3I4W2M7#2)9J5k6h3y4G2L8g2)9J5c8X3k6A6L8r3g2K6i4K6u0r3y4K6p5#2y4o6V1I4y4H3`.`.

9fbK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3c8W2M7r3!0K6K9i4c8X3K9h3I4W2M7#2)9J5k6h3y4G2L8g2)9J5c8X3k6A6L8r3g2K6i4K6u0r3y4K6p5#2y4o6V1#2z5l9`.`.
========================

MSPress- Writing Secure Code  

794K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0S2M7r3W2V1M7$3S2S2M7X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6X3K9h3I4W2M7#2)9J5c8U0b7^5y4K6x3K6x3K6R3&6i4K6u0r3i4K6g2X3e0g2y4b7M7X3g2K6M7#2)9#2k6W2)9#2k6U0t1H3g2%4u0A6N6r3W2F1k6#2)9#2k6U0t1H3f1$3g2U0N6i4u0W2i4K6g2X3x3U0m8o6L8$3c8W2i4K6u0W2M7r3c8X3
==================
19 Deadly Sins of Software Security

b04K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0S2M7r3W2V1M7$3S2S2M7X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6X3K9h3I4W2M7#2)9J5c8U0b7^5y4K6x3K6x3K6b7H3i4K6u0r3x3o6l9%4x3U0t1$3x3o6R3#2z5q4)9J5k6f1#2U0k6%4u0S2N6#2)9J5k6p5S2A6L8r3I4Q4y4h3j5J5x3p5!0Q4x3V1q4Q4x3V1q4G2M7X3&6W2i4K6g2X3x3U0m8y4k6h3c8A6j5g2)9J5k6e0p5&6i4K6g2X3x3U0m8p5k6h3q4V1L8s2W2Q4y4h3j5J5x3q4y4A6L8Y4y4Q4y4h3j5J5x3r3!0X3i4K6g2X3x3U0m8e0L8$3k6@1N6$3q4J5k6g2)9#2k6U0t1H3f1$3g2U0N6i4u0A6N6s2W2Q4y4h3j5J5x3q4)9#2k6W2y4W2j5%4g2J5K9i4c8&6i4K6g2X3x3R3`.`.
=======================
High Level Reverse Engineering

873K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0S2M7r3W2V1M7$3S2S2M7X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6X3K9h3I4W2M7#2)9J5c8U0p5I4y4e0V1$3y4U0p5%4y4q4)9J5c8V1S2A6k6$3S2Q4x3X3c8x3k6i4k6W2L8q4)9#2k6W2u0W2N6X3g2J5M7$3g2Q4y4h3k6q4L8X3N6A6L8X3g2W2M7X3W2F1k6#2)9J5k6i4m8V1k6R3`.`.
========================
Writing Secure Code

8bcK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0S2M7r3W2V1M7$3S2S2M7X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6X3K9h3I4W2M7#2)9J5c8U0b7^5y4K6x3K6x3K6R3&6i4K6u0r3i4K6g2X3e0g2y4b7M7X3g2K6M7#2)9#2k6W2)9#2k6U0t1H3g2%4u0A6N6r3W2F1k6#2)9#2k6U0t1H3f1$3g2U0N6i4u0W2i4K6g2X3x3U0m8o6L8$3c8W2i4K6u0W2M7r3c8X3
======================
Software Security Building Security In 2006

107K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0S2M7r3W2V1M7$3S2S2M7X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6X3K9h3I4W2M7#2)9J5c8U0b7^5y4K6x3K6x3K6R3K6i4K6u0r3b7h3c8V1K9i4y4G2L8W2)9J5k6g2N6W2M7$3I4W2P5g2)9#2k6W2)9J5k6g2y4G2k6Y4c8%4j5i4u0W2i4K6u0W2f1$3g2U0N6i4u0A6N6s2W2Q4x3X3g2n7N6h3W2D9k6r3W2F1k6#2)9J5k6g2y4W2j5%4g2J5K9i4c8&6i4K6u0W2d9h3&6Q4x3X3g2Q4y4h3j5J5x3o6l9$3i4K6g2X3i4K6u0W2b7V1u0x3i4K6u0W2j5$3S2E0

or

850K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0S2M7r3W2V1M7$3S2S2M7X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6X3K9h3I4W2M7#2)9J5c8U0b7^5z5e0t1K6x3U0M7I4i4K6u0r3b7h3c8V1K9i4y4G2L8W2)9J5k6g2N6W2M7$3I4W2P5g2)9#2k6W2)9J5k6g2y4G2k6Y4c8%4j5i4u0W2i4K6u0W2f1$3g2U0N6i4u0A6N6s2W2Q4x3X3g2n7N6h3W2D9k6r3W2F1k6#2)9J5k6g2y4W2j5%4g2J5K9i4c8&6i4K6u0W2d9h3&6Q4x3X3g2Q4y4h3j5J5x3o6l9$3i4K6g2X3i4K6u0W2b7V1u0x3i4K6u0W2j5$3S2E0
2008-8-16 15:03
0
雪    币: 200
活跃值: (11)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
3
Malicious Mobile Code Virus Protection for Windows
0f0K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0S2M7r3W2V1M7$3S2S2M7X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6X3K9h3I4W2M7#2)9J5c8U0b7%4x3o6V1#2z5o6b7K6i4K6u0r3e0#2u0W2K9h3I4D9P5g2)9J5k6p5#2S2L8r3W2U0K9h3!0#2M7#2)9J5k6f1#2G2j5X3W2D9k6g2)9J5k6f1y4G2k6r3g2Q4x3X3g2h3K9i4u0#2M7#2)9J5k6g2m8J5L8%4c8W2j5%4c8A6L8$3&6Q4x3X3g2X3L8%4u0Q4x3X3g2i4K9h3&6V1L8%4N6K6i4K6u0W2M7X3q4J5
2008-8-16 15:06
0
雪    币: 106728
活跃值: (202444)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
4
Thanks for share.
2008-8-17 00:35
0
游客
登录 | 注册 方可回帖
返回