- 博客(0)
- 资源 (3)
- 收藏
- 关注
NES模拟器开发简介
怎样写模拟器
简介
阶段
读入
运行
获得 ROM 的操作码
执行操作码
执行中断
读写内存
做循环任务
视频模拟
声音模拟
优化
课程收获
我的模拟器
参考文献
2011-05-04
Mac Hackers Handbook
Is this perception of security justifi ed, or has Mac OS X simply benefi ted from its
low profi le up to this point? This book offers you a chance to answer this question
for yourself. It provides the tools and techniques necessary to analyze thoroughly
the security of computers running the Mac OS X operating system. It details exactly
what Apple has done right in the design and implementation of its code, as well as
points out defi ciencies and weaknesses. It teaches how attackers look at Mac OS X
technologies, probe for weaknesses, and succeed in compromising the system. This
book is not intended as a blueprint for malicious attackers, but rather as an instrument
so the good guys can learn what the bad guys already know. Penetration
testers and other security analysts can and should use this information to identify
risks and secure the Macs in their environments.
Keeping security fl aws secret does not help anybody. It is important to understand
these fl aws and point them out so future versions of Mac OS X will be
more secure. It is also vital to understand the security strengths and weaknesses
of the operating system if we are to defend properly against attack, both now
and in the future. Information is power, and this book empowers its readers by
providing the most up-to-date and cutting-edge Mac OS X security research.
2011-03-25
空空如也
TA创建的收藏夹 TA关注的收藏夹
TA关注的人