募捐 9月15日2024 – 10月1日2024
关于筹款
书籍搜索
书
募捐:
20.4% 达到
登录
登录
访问更多功能
个人推荐
Telegram自动程序
下载历史
发送到电子邮件或 Kindle
管理书单
保存到收藏夹
个人的
书籍请求
探索
Z-Recommend
书单
最受欢迎
种类
贡献
捐款
上载
Litera Library
捐赠纸质书籍
添加纸质书籍
Search paper books
创建 LITERA Point
搜索关键词
Main
搜索关键词
search
1
Advanced Windows Memory Dump Analysis with Data Structures
OpenTask
Dmitry Vostokov
0y0
fffff980
fffff801
ffffe000
0x304
0x300
0x370
fffffa80
device
usertime
void
0xffffe000
_list_entry
symbols
ffffd000
fffff800
evaluate
blocked
0y1
_large_integer
0x6b4
deferred
driver
module
0x36c
0x00000000
stack
context
0xfffffa80
user32
0x0
win32kfull
0x000
_ex_push_lock
command
0x2dc
0x001
0xffffc000
event
dumps
unqualified
path
flags
windbg
0x002
0x003
system32
current
kiswapcontext
win32k
年:
2017
语言:
english
文件:
PDF, 9.54 MB
您的标签:
4.5
/
0
english, 2017
2
Advanced Windows Memory Dump Analysis with Data Structures, Fourth Edition, Revised
Dmitry Vostokov
ffffbe0c
fffff807
0y0
svchost.exe
00007ffe
0x460
0xffffbe0c
0x87c
0x464
win32kfull
imagefilename
0x5a8
blocked
ffffa28c
driver
stack
void
deferred
ntusergetmessage
fffff804
_list_entry
user32
ntkrnlmp
device
0x000
x64
usertime
0y1
kiswapcontext
dumps
ntdll
0x14
_ex_push_lock
0x76
0xffff800e
advwmda
kisystemservicecopyend
context
ptr64
kicommitthreadwait
ffffa784
kernel
kiswapthread
0x25
win32u
command
windbg
0x159
0x3a7
irp
年:
2022
语言:
english
文件:
PDF, 7.26 MB
您的标签:
0
/
5.0
english, 2022
3
Устройства управления роботами (файлы к книге)
Предко
interrupt
char
lcdstate
clock
endif
unsigned
reset
void
output
volatile
tmr0
lcd
msecs
define
rtc
lcdbyte
step
mainline
pwmduty
portb
nybble
oscillator
enable
datain
static
lcddlay
lcdnybble
fuses
interrupts
external
configuration
handler
error
pic16f627
selected
pwm
counter
pic.h
pic16f84
bit8
_cd
_work
byte
dataincount
bits
count
defined
motorstate
trisb
warning
年:
2004
语言:
russian
文件:
RAR, 22 KB
您的标签:
0
/
0
russian, 2004
4
Entendendo Injeção de SQL
k4m1k451
mysql
select
colunas
sql
ascii
aplicação
caractere
aspas
row
função
cads
obtendo
retorno
substring
vulnerável
www.vul.com
caracteres
index.php
funções
injeção
inserimos
importantes
parâmetros
query
tabela
tabelas
0x03
acontece
coluna
consulta
erro
exploração
false
limit
linha
obtemos
obter
php
retorna
verificando
0x001
0x002
0x003
ataque
explorando
pagina
passemos
quote
url
usuário
语言:
portuguese
文件:
PDF, 558 KB
您的标签:
0
/
4.5
portuguese
1
按照
此链接
或在 Telegram 上找到“@BotFather”机器人
2
发送 /newbot 命令
3
为您的聊天机器人指定一个名称
4
为机器人选择一个用户名
5
从 BotFather 复制完整的最后一条消息并将其粘贴到此处
×
×