自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+
  • 博客(3)
  • 资源 (15)
  • 收藏
  • 关注

转载 C++与C语言细节差异分析

C和C++是很流行的语言,目前大学程序设计基础课大部分用的是C或者C++,但是由于种种原因,使用者对这两种语言的了解不够,本文指出,C++虽然是从C发展过来的,但是除了一些明显的不同,他们存在着细节上的差异。本文通过简要分析这些差异来说明这个观点。 C+

2007-11-10 10:08:00 2093

转载 手机软件测试

  手机作为专用的消费类电子产品需要进行以下测试:可靠性测试(对于硬件则是RQT;对于软件则是field trial);标准符合性测试(FTA);互操作性测试(IOT);安全性测试(安规测试);强度测试等。    其中,有些种类的测试,例如FTA,有严格的标准(GSM、3GPP等)来明确被测的功能点,测试人员所要做的是在测试用例的编写中体现出这些功能点,并且尽量营造这些测试用例所需的运行环

2007-11-08 21:43:00 1239

原创 什么是手机软件测试

手机测试是一个很大的题目,涉及到硬件测试和软件测试,还有结构的测试,比如抗压,抗摔,抗疲劳,抗低温高温等,结构上的设计不合理,会造成应力集中,使得本身外壳变形,对于翻盖手机,盖子失效,还有其他严重问题。硬件测试一般都有严格的物理电气指标,也有专门的仪器,这里的仪器,不在多说,一般如果是专业的测试人员,不会对词陌生吧。 手机测试,一般是指软件测试,这个一方面也说明了软件在手机上的重要行。一方面也说明

2007-11-08 21:20:00 1706

探索性测试时间之路

探索性测试的文档,介绍了理论,以及方法和相关工具。可以作为入门读物对探索性测试建立初步的印象。 探索性测试的文档,介绍了理论,以及方法和相关工具。可以作为入门读物对探索性测试建立初步的印象。

2017-09-14

Deep Learning with Keras(书签版)

Deep Learning with Keras 清晰,书签版

2017-06-28

[源码] Android sms备份至Gmail

将sms备份至Gmail 源码 高级选项可进行备份定制

2011-10-24

Android ADT 14.0.0

最新ADT,帮助大家升级到Android4.0

2011-10-19

Unlocking Android 2009

You’ve heard about Android. You’ve read about Android. Now it is time to Unlock Android. Android is the software platform from Google and the Open Handset Alliance that has the potential to revolutionize the global cell phone market. This chapter introduces Android – what it is, and importantly, what it is not. After reading this chapter you will have an understanding of how Android is constructed, how it compares with other offerings in the market, Android’s foundational technologies, and a preview of Android application architecture. The chapter concludes with a simple Android application to get things started quickly. This introductory chapter answers some of the basic questions about what Android is and where it fits. While there are code examples in this chapter, they are not very in-depth – just enough to get a taste for Android application development and to convey the key concepts introduced. Aside from some context-setting discussion in the introductory chapter, this book is about unlocking Android’s capabilities and will hopefully inspire you to join the effort to unlock the latent potential in the cell phone of the very near future.

2010-05-02

professional_android_application_development 第一版

android开发进阶 This book is for anyone interested in creating applications for the Android mobile phone platform. It includes information that will be valuable, whether you’re an experienced mobile developer or making your fi rst foray, via Android, into writing mobile applications. It will help if readers have used mobile phones (particularly phones running Android), but it’s not nec- essary, nor is prior experience in mobile phone development. It’s expected that you’ll have some experi- ence in software development and be familiar with basic development practices. While knowledge of Java is helpful, it’s not a necessity. Chapters 1 and 2 introduce mobile development and contain instructions to get you started in Android. Beyond that, there’s no requirement to read the chapters in order, although a good understanding of the core components described in Chapters 3 through 6 is important before you venture into the remaining chapters. Chapters 7 through 11 cover a variety of optional and advanced functionality and can be read in whatever order interest or need dictates.

2010-03-23

McGraw.Hill - Hacking.Linux.exposed

内含阅读器 很详细的内容 物有所值 Today's world of computing and networking is filled with security- related threats. Although it is always wise to be skeptical about statis- tics, reasonable evidence exists that over 300 million people worldwide now use the Internet. Although most Internet users are scrupulous when they access the Internet, a small percentage is not. Unfortunately, this small percentage has made an extremely disproportionate impact. Unscrupulous users have opened Pandora's box, causing privacy violations, disruption and denial of service, modification of data and systems, and even extortion and hoaxes. Perhaps most tragically, they have undermined many users' enjoyment and confidence as they engage in computing activity.

2010-01-07

McGraw.Hill - Hacking.Exposed.Windows.3rd.Edition.Dec.2007

Security is a broad topic that is only becoming broader as we become more reliant on computers for everything we do, from work to home to leisure, and our computers become more and more interconnected. Most of our computing experiences now require, or are enriched by, Internet connections, which means our systems are constantly exposed to foreign data of unknown or uncertain integrity. When you click search links, download applications, or configure Internet-facing servers, every line of code through which the data flows is potentially subject to a storm of probing for vulnerable configuration, flawed programming logic, and buggy implementation—even within the confines of a corporate network. Your data and computing resources are worth money in the Web 2.0 economy, and where there’s money, there are people who want to steal it. As the Web has evolved, we’ve also seen the criminals evolve. Ten years ago, the threat was an e-mail-borne macro virus that deleted your data. Five years ago, it was automatically propagating worms that used buffer overflows to enlist computers into distributed denial of service attack networks. Three years ago, the prevalent threat became malware that spreads to your computer when you visit infected websites and that subsequently delivers popup ads and upsells you rogue anti-malware. More recently, malware uses all these propagation techniques to spread into a stealthy distributed network of general-purpose “bots” that serve up your data, perform denial of service, or spew spam. The future is one of targeted malware that is deliberately low-volume and customized for classes of users, specific corporations, or even a single individual. We’ve also seen computer security evolve. Antivirus is everywhere, from the routers on the edge to servers, clients, and soon, mobile devices. Firewalls are equally ubiquitous and lock down unused entry and exit pathways. Operating systems and applications are written with security in mind and are hardened with defense-in-depth measures such as no-execute and address layout randomization. Users can’t access corporate networks without passing health assessments. One thing is clear: there’s no declaration of victory possible in this battle. It’s a constant struggle where winning means keeping the criminals at bay another day. And there’s also no clear cut strategy for success. Security in practice requires risk assessment, and successful risk assessment requires a deep understanding of both the threats and the defensive technologies.

2010-01-07

Hacking: The Art of Exploitation, 2nd Edition 2008

Overview Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. ...

2010-01-07

Professional Rootkits 2007

Providing step-by-step instructions and examples required to produce full-featured, robust rootkits, this book walks you through all of the capabilities of rootkits, the technology they use, and the detection methods to impede their distribution.

2010-01-07

Metasploit

Overview: Why Is Metasploit Here? Metasploit came about primarily to provide a framework for penetration testers to develop exploits.The typical life cycle of a vulnerability and its exploitation is as follows: 1. Discovery A security researcher or the vendor discovers a critical security vulner- ability in the software. 2. Disclosure The security researcher either adheres to a responsible disclosure policy and informs the vendor, or discloses it on a public mailing list. Either way, the vendor needs to come up with a patch for the vulnerability. 3. Analysis The researcher or others across the world begin analyzing the vulnera- bility to determine its exploitability. Can it be exploited? Remotely? Would the exploitation result in remote code execution, or would it simply crash the remote service? What is the length of the exploit code that can be injected? This phase also involves debugging the vulnerable application as malicious input is injected to the vulnerable piece of code. 4. Exploit Development Once the answers to the key questions are determined, the process of developing the exploit begins.This has usually been considered a bit of a black art, requiring an in-depth understanding of the processor’s registers, assembly code, offsets, and payloads.

2010-01-07

Rootkits: Subverting the Windows Kernel

Rootkits will be of interest to any Windows security researcher or security programmer

2010-01-07

Hacker Disassembling Uncovered

This text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more.

2010-01-07

Hacker Linux Uncovered

Detailed and thorough, this guide demonstrates how to install Linux for the highest security and best performance, how to scan the network and encrypt the traffic, and how to monitor and log the system to detect security problems.

2010-01-07

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除