自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+

匆匆往站

向往与过往交织,一切在匆匆流逝

  • 博客(1)
  • 资源 (79)
  • 收藏
  • 关注

原创 [笔记] 配置Grub.img自动安装系统

grub-mkrescue —modules=“multiboot sh fat scsi ext2 elf pxe echo ntfs chain cat blacklist memdisk ls linux boot reboot biosdisk acpi loopback tar usb iso9660 search search_fs_uuid” —output=grub2.img so

2014-06-14 17:37:56 1362

Proteus自学教程

包括 Proteus自学教程(上,中,下) Proteus教程(A1——A12) Keil与proteus完美结合教程

2010-02-25

人工神经网络导论(蒋宗礼)

人工神经网络导论/蒋宗礼编著. —北京:高等教育出版社, 2001.8

2010-02-25

计算机专业英语教程(樊晋宁,李莉主编)

计算机专业英语教程/樊晋宁,李莉主编. —北京: 北京大学出版社, 2005.8

2010-02-25

论系统工程(修订版)

[论系统工程(修订版)].钱学森.扫描版.pdf 湖南科学技术出版社 1988.10第二版

2010-02-25

Java反编译器 JAD(JAvaDecompiler)

免费的轻量级Java反编译器——JAD(JAvaDecompiler) 包里有两个JAD,一个是windows版,一个是linux版本

2010-01-27

SoftwareEngineering_AnIdeaWhoseTimeHasCmeAndGone

SoftwareEngineering :AnIdeaWhoseTimeHasCmeAndGone 作者是Tom DeMarco 提出软件工程在过时……

2009-08-04

控制论 线性系统理论

数学丛书.-.[控制论].[线性系统理论].pdf 线性系统理论/段广仁编著,哈尔滨:哈尔滨工业大学出版社,1996.11

2009-07-30

IntelCPU资料集

用户手册 Intel64andIA32 I Intel64andIA32 II A Intel64andIA32 II B Intel64andIA32 III A Intel64andIA32 III B Intel® 64 and IA-32 Architectures Optimization Reference Manual Intel® 64 and IA-32 Architectures Application Note Intel® 64 and IA-32 Architectures Software Developer's Manual Intel® 64 Architecture x2APIC Specification

2009-07-30

[总线资料汇编].pci

Pci22 Pci_BIOS PCI_Bridge

2009-07-30

差错控制编码(原书第2版) 4

差错控制编码(原书第2版) rar压缩,共四部分,这是第四部分

2009-07-30

差错控制编码(原书第2版) 3

差错控制编码(原书第2版) rar压缩,共四部分,这是第三部分

2009-07-30

差错控制编码(原书第2版) 2

差错控制编码(原书第2版)/(美)林舒,科斯特洛著 晏坚等译,北京:机械工业出版社,2007.6 rar压缩,共四部分,这个是第二部分 文件pdf,共91MB……

2009-07-30

差错控制编码(原书第2版) 1

差错控制编码(原书第2版)/(美)林舒,科斯特洛著 晏坚等译,北京:机械工业出版社,2007.6 rar压缩,共四部分,这个是第一部分 文件pdf,共91MB……

2009-07-29

具体数学:计算机科学基础

具体数学:计算机科学基础 (美)R.L. Graham, D.E. Knuth, Oren Patashnik著,庄心谷译,西安:西安电子科技出版社,1992.1 中文版序言 本书介绍我在过去30年间研究计算机科学时经常用到的一些数学技巧。我为该书这样快地译成中文而感到高兴和荣幸。我希望中国的计算机科学的学生也像我一样喜爱钻研这些引人入胜的数学模型。 D.E. Knuth 1991.1

2009-07-29

DataCompression (数据压缩)

(Written by)David Salomon Data Compression: The complete reference 3rd edition Contents Preface to the Third Edition vii Preface to the Second Edition xi Preface to the First Edition xv Introduction 1 1 Basic Techniques 15 1.1 Intuitive Compression 15 1.2 Run-Length Encoding 20 1.3 RLE Text Compression 21 1.4 RLE Image Compression 25 1.5 Move-to-Front Coding 35 1.6 Scalar Quantization 39 2 Statistical Methods 43 2.1 Information Theory Concepts 44 2.2 Variable-Size Codes 50 2.3 Prefix Codes 51 2.4 The Golomb Code 57 2.5 The Kraft-MacMillan Inequality 65 2.6 The Counting Argument 66 2.7 Shannon-Fano Coding 66 2.8 Huffman Coding 68 2.9 Adaptive Huffman Coding 84 2.10 MNP5 90 2.11 MNP7 95 2.12 Reliability 96 2.13 Facsimile Compression 99 2.14 Arithmetic Coding 106 2.15 Adaptive Arithmetic Coding 120 2.16 The QM Coder 124 2.17 Text Compression 133 2.18 PPM 134 2.19 Context-Tree Weighting 156 3 Dictionary Methods 165 .......... 4 Image Compression 251 .......... 5 Wavelet Methods 513 6 Video Compression 637 7 Audio Compression 691 8 Other Methods 755 Bibliography 835 Glossary 855 Joining the Data Compression Community 877 Index 879

2009-07-28

Ruby套装书籍 第二包

本包共4本英文书: Ruby.for.Rails.Ruby.Techniques.for.Rails.Developers.(2006) Ruby On Rails Book (Save Ink Version) RubyCourse_1.0-1 rubyonrails

2009-07-28

Syngress - Sniffer Pro - Network Optimization And Troubleshooting Handbook

Syngress - Sniffer Pro - Network Optimization And Troubleshooting Handbook

2009-07-28

科学出版社《知识工程》PDF

本书系统地阐述了知识工程这一领域内的基本概念、原理与方法。 知识工程/童* 沈一栋编著 ——北京:科学出版社,1992.7

2009-07-27

遗传算法——理论、应用与软件实现

遗传算法是一种借鉴生物界自然选择和进化机制发展起来的高度并行、随机、自适应搜索算法 遗传 算法 理论 应用 软件实现/王小平,曹立明著 ——西安:西安交通大学出版社,2002.1

2009-07-27

Syngress - C# for Java Programmers (VBL)

Syngress - C# for Java Programmers (VBL) C#:写给Java程序员

2009-07-27

Beautiful Visualization 可视化之美

Beautiful Visualization 可视化之美 和数据之美,架构之美,测试之美,团队之美等是系列书籍。

2011-11-08

《SATA存储技术:串行ATA》(SATA.Storage.Technology.Serial.ATA)

《SATA存储技术:串行ATA》(SATA.Storage.Technology.Serial.ATA) English version

2011-06-04

Pro Android Media

[android.开发书籍].Apress.Pro.Android.Media.Dec.2010.pdf Developing Graphics, Music, Video and Rich Media Apps for Smartphones and Tablets

2011-06-04

Beautiful Data 数据之美

Beautiful Data Edited by Toby Segaran and Jeff Hammerbacher CONTENTS PREFACE xi 1 SEEING YOUR LIFE IN DATA 2 THE BEAUTIFUL PEOPLE: KEEPING USERS IN MIND WHEN DESIGNING DATA COLLECTION METHODS 3 EMBEDDED IMAGE DATA PROCESSING ON MARS 4 CLOUD STORAGE DESIGN IN A PNUTSHELL 5 INFORMATION PLATFORMS AND THE RISE OF THE DATA SCIENTIST 6 THE GEOGRAPHIC BEAUTY OF A PHOTOGRAPHIC ARCHIVE 7 DATA FINDS DATA 8 PORTABLE DATA IN REAL TIME 9 SURFACING THE DEEP WEB 10 BUILDING RADIOHEAD’S HOUSE OF CARDS 11 VISUALIZING URBAN DATA 12 THE DESIGN OF SENSE.US 13 WHAT DATA DOESN’T DO 14 NATURAL LANGUAGE CORPUS DATA 15 LIFE IN DATA: THE STORY OF DNA 16 BEAUTIFYING DATA IN THE REAL WORLD 17 SUPERFICIAL DATA ANALYSIS: EXPLORING MILLIONS OF SOCIAL STEREOTYPES 18 BAY AREA BLUES: THE EFFECT OF THE HOUSING CRISIS 19 BEAUTIFUL POLITICAL DATA 20 CONNECTING DATA

2010-12-18

高级操作系统与核心应用工艺与技术

Advanced Operating Systems and Kernel Applications: Techniques and Technologies Yair Wiseman Bar-Ilan University, Israel Song Jiang Wayne State University, USA Hershey • New York InformatIon Contents Chapter 1 Kernel Stack Overflows Elimina Chapter 2 Device Driver Reliability Chapter 3 Identifying Systemic Threats to Kernel Data: Attacks and Defense Techniques Chapter 4 The Last Line of Defense: A Comparison of Windows and Linux Authentication and Authorization Features Chapter 5 Swap Token: Rethink the Application of the LRU Principle on Paging to Remove System Thrashing Chapter 6 Application of both Temporal and Spatial Localities in the Management of Kernel Buffer Cache Chapter 7 Alleviating the Thrashing by Adding Medium-Term Scheduler Chapter 8 The Exokernel Operating System and Active Networks Chapter 9 Dynamic Analysis and Profiling of Multithreaded Systems Chapter 10 Exploiting Disk Layout and Block Access History for I/O Prefetch Chapter 11 Sequential File Prefetching in Linux Chapter 12 Peer-Based Collaborative Caching and Prefetching in Mobile Broadcast Chapter 13 Adaptive Replacement Algorithm Templates and EELRU Chapter 14 Enhancing the Efficiency of Memory Management in a Super-Paging Environment by AMSQM

2010-12-10

无线通信研究中的新方向

New Directions in Wireless Communications Research Vahid Tarokh Contents 1 Measurement and Modeling of Wireless Channels 2 OFDM: Principles and Challenges 3 Recent Advances in Low-Correlation Sequences 4 Resource Allocation inWireless Systems 5 Iterative Receivers and Their Graphical Models 6 Fundamentals of Multi-user MIMO Communications 7 Collaborative Beamforming 8 Cooperative Wireless Networks 9 Interference Rejection and Management 10 Cognitive Radio: From Theory to Practical Network Engineering 11 Coded Bidirectional Relaying inWireless Networks 12 Minimum Cost Subgraph Algorithms for Static and Dynamic Multicasts with Network Coding 13 Ultra Mobile Broadband (UMB) 14 Mobile WiMAX 15 An Overview of 3GPP Long-Term Evolution Radio Access Network

2010-12-10

机器学习应用与趋势研究手册算法,方法与技术

Handbook of Research on Machine Learning Applications and Trends: Algorithms, Methods, and Techniques Emilio Soria Olivas University of Valencia, Spain José David Martín Guerrero University of Valencia, Spain Marcelino Martinez Sober University of Valencia, Spain Jose Rafael Magdalena Benedito University of Valencia, Spain Antonio José Serrano López University of Valencia, Spain Contents Chapter 1 Exploring the Unknown Nature of Data: Cluster Analysis and Applications Chapter 2 Principal Graphs and Manifolds Chapter 3 Learning Algorithms for RBF Functions and Subspace Based Functions Chapter 4 Nature Inspired Methods for Multi-Objective Optimization Chapter 5 Artificial Immune Systems for Anomaly Detection Chapter 6 Calibration of Machine Learning Models Chapter 7 Classification with Incomplete Data Chapter 8 Clustering and Visualization of Multivariate Time Series Chapter 9 Locally Recurrent Neural Networks and Their Applications Chapter 10 Nonstationary Signal Analysis with Kernel Machines Chapter 11 Transfer Learning Chapter 12 Machine Learning in Personalized Anemia Treatment Chapter 13 Deterministic Pattern Mining On Genetic Sequences Chapter 14 Machine Learning in Natural Language Processing Chapter 15 Machine Learning Applications in Mega-Text Processing Chapter 16 FOL Learning for Knowledge Discovery in Documents Chapter 17 Machine Learning and Financial Investing Chapter 18 Applications of Evolutionary Neural Networks for Sales Forecasting of Fashionable Products Chapter 19 Support Vector Machine based Hybrid Classifiers and Rule Extraction thereof: Application to Bankruptcy Prediction in Banks Chapter 20 Data Mining Experiences in Steel Industry Chapter 21 Application of Neural Networks in Animal Science Chapter 22 Statistical Machine Learning Approaches for Sports Video Mining Using Hidden Markov Models Chapter 23 A Survey of Bayesian Techniques in Computer Vision Chapter 24 Software Cost Estimation using Soft Computing Approaches Chapter 25 Counting the Hidden Defects in Software Documents Chapter 26 Machine Learning for Biometrics Chapter 27 Neural Networks for Modeling the Contact Foot-Shoe Upper Chapter 28 Evolutionary Multi-Objective Optimization of Autonomous Mobile Robots in Neural-Based Cognition for Behavioural Robustness Chapter 29 Improving Automated Planning with Machine Learning

2010-12-10

不断发展的数据仓库与挖掘应用领域趋势与对策

Evolving Application Domains of Data Warehousing and Mining: Trends and Solutions Pedro Nuno San-Bento Furtado University of Coimbra, Portugal English version Contents Chapter 1 Data Warehouse Architectures: Practices and Trends Chapter 2 Improving Expressive Power in Modeling Data Warehouse and OLAP Applications Chapter 3 From Conventional to Multiversion Data Warehouse: Practical Issue Chapter 4 Compression Schemes of High Dimensional Data for MOLAP Chapter 5 View Management Techniques and Their Application to Data Stream Management Chapter 6 A Framework for Data Warehousing and Mining in Sensor Stream Application Domains Chapter 7 A Data Warehousing Approach for Genomics Data Meta-Analysis Chapter 8 A Multidimensional Model for Correct Aggregation of Geographic Measures Chapter 9 Novel Trends in Clustering Chapter 10 Recent Advances of Exception Mining in Stock Market Chapter 11 Analysis of Content Popularity in Social Bookmarking Systems Chapter 12 Using Data Mining Techniques to Probe the Role of Hydrophobic Residues in Protein Folding and Unfolding Simulations Chapter 13 A Geostatistically Based Probabilistic Risk Assessment Approach

2010-12-10

CRC.press.-.Microcontroller.Programming.-.The.Microchip.PIC

Total page: 821 © 2007 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business Contents Chapter 1 - Basic Electronics Chapter 2 - Number Systems Chapter 3 - Data Types and Data Storage Chapter 4 - Digital Logic, Arithmetic, and Conversions Chapter 5 - Circuits and Logic Gates Chapter 6 - Circuit Components Chapter 7 - The Microchip PIC Chapter 8 - Mid-range PIC Architecture Chapter 9 - PIC Programming: Tools and Techniques Chapter 10 - Programming Essentials: Input and Output Chapter 11 - Interrupts Chapter 12 - Timers and Counters Chapter 13 - LCD Interfacing and Programming Chapter 14 - Communications Chapter 15 - Data EEPROM Programming Chapter 16 - Analog to Digital and Realtime Clocks

2010-12-05

[天线圣经].Antenna.Theory.Analysis.and.Design(3rd.Edition)

Copyright 2005 by John Wiley & Sons, Inc. All rights reserved. Contents 1 Antennas 2 Fundamental Parameters of Antennas 3 Radiation Integrals and Auxiliary Potential Functions 4 Linear Wire Antennas 5 Loop Antennas 6 Arrays: Linear, Planar, and Circular 7 Antenna Synthesis and Continuous Sources 8 Integral Equations, Moment Method, and Self and Mutual Impedances 9 Broadband Dipoles and MatchingT echniques 10 TravelingW ave and Broadband Antennas 11 Frequency Independent Antennas, Antenna Miniaturization, and Fractal Antennas 12 Aperture Antennas 13 Horn Antennas 14 Microstrip Antennas 15 Reflector Antennas 16 Smart Antennas 17 Antenna Measurements

2010-12-05

[算法分析与设计].(美国)Michael.T.Goodrich.清晰版

内容简介 《算法分析与设计:图灵计算机科学丛书》系统地阐述了算法设计的方法、技术和应用实例。全书内容包括基础算法、基本数据结构、基本算法设计技术、图算法、网络流和匹配、文本处理算法、数论算法、网络算法、NP完全性、近似算法、回溯法和分枝限界法、外存算法、并行算法和在线算法。Java实现示例覆盖了软件设计方法、面向对象实现问题和算法的实验性分析。这些典型问题的Java应用示例分布在不同的章节中。此外,书中以大量图例说明算法的工作过程,使算法更加易于理解和掌握。

2010-07-24

HDL设计资料(vhdl,verilog,....)

包含: hdladvance.rar Xilinx_Design_Reuse_Methodology.pdf vhdl_intr.PDF Vhdl Golden Reference Guide.pdf verilog_slides.pdf verilog_intr.PDF verilog golden reference guide.pdf Top-Down for VHDL.pdf CummingsSNUG2001SJ_AsyncClk_rev1_1.pdf CST_EDIT.PDF actel_HDL_coding_style_guide.pdf

2010-04-07

CAN 总线规范说明书

包含: CAN2Spec.pdf CAN20A.pdf CAN20B.pdf

2010-04-07

专家系统导论(黄可鸣)

专家系统导论[M]. 黄可鸣. -南京: 东南大学出版社. 1988,12.

2010-03-20

统计学原理(全美经典学习指导系列)

[统计学原理(上册)-描述性统计学与概率(全美经典学习指导系列)].(美)伯恩斯坦&伯恩斯坦. [统计学原理(下册)-推断性统计学(全美经典学习指导系列)].(美)伯恩斯坦&伯恩斯坦.

2010-03-20

控制论.信号流图和系统

信号流图和系统[M]. 赵永昌. -北京: 科学出版社.1988,6.

2010-03-20

人工神经网络实用教程

人工神经网络实用教程/杨建刚编著. -杭州:浙江大学出版社, 2001.01

2010-03-04

智能控制导论(罗公亮,秦世引)

智能控制导论/罗公亮,秦世引. -浙江:浙江科学技术出版社. 1997.12

2010-03-04

基于网络环境的智能控制

基于网络环境的智能控制/周祖德编著. -北京:国防工业出版社. 2004.01

2010-03-04

[IDA.pro.学习资料].The.IDA.Pro.Book.2009

[IDA.pro.学习资料].The.IDA.Pro.Book.2009 目录: Copyright Dedication FOREWORD ACKNOWLEDGMENTS INTRODUCTION Part I: INTRODUCTION TO IDA Chapter 1. INTRODUCTION TO DISASSEMBLY Section 1.1. Disassembly Theory Section 1.2. The What of Disassembly Section 1.3. The Why of Disassembly Section 1.4. The How of Disassembly Section 1.5. Summary Chapter 2. REVERSING AND DISASSEMBLY TOOLS Section 2.1. Classification Tools Section 2.2. Summary Tools Section 2.3. Deep Inspection Tools Section 2.4. Summary Chapter 3. IDA PRO BACKGROUND Section 3.1. Hex-Rays' Stance on Piracy Section 3.2. Obtaining IDA Pro Section 3.3. IDA Support Resources Section 3.4. Your IDA Installation Section 3.5. Thoughts on IDA's User Interface Section 3.6. Summary Part II: BASIC IDA USAGE Chapter 4. GETTING STARTED WITH IDA Section 4.1. Launching IDA Section 4.2. IDA Database Files Section 4.3. Introduction to the IDA Desktop Section 4.4. Desktop Behavior During Initial Analysis Section 4.5. IDA Desktop Tips and Tricks Section 4.6. Reporting Bugs Section 4.7. Summary Chapter 5. IDA DATA DISPLAYS Section 5.1. The Principal IDA Displays Section 5.2. Secondary IDA Displays Section 5.3. Tertiary IDA Displays Section 5.4. Summary Chapter 6. DISASSEMBLY NAVIGATION Section 6.1. Basic IDA Navigation Section 6.2. Stack Frames Section 6.3. Searching the Database Section 6.4. Summary Chapter 7. DISASSEMBLY MANIPULATION Section 7.1. Names and Naming Section 7.2. Commenting in IDA Section 7.3. Basic Code Transformations Section 7.4. Basic Data Transformations Section 7.5. Summary Chapter 8. DATATYPES AND DATA STRUCTURES Section 8.1. Recognizing Data Structure Use Section 8.2. Creating IDA Structures Section 8.3. Using Structure Templates Section 8.4. Importing New Structures Section 8.5. Using Standard Structures Section 8.6. IDA TIL Files Section 8.7. C++ Reversing Primer Section 8.8. Summary Chapter 9. CROSS-REFERENCES AND GRAPHING Section 9.1. Cross-References Section 9.2. IDA Graphing Section 9.3. Summary Chapter 10. THE MANY FACES OF IDA Section 10.1. Console Mode IDA Section 10.2. Using IDA's Batch Mode Section 10.3. GUI IDA on Non-Windows Platforms Section 10.4. Summary Part III: ADVANCED IDA USAGE Chapter 11. CUSTOMIZING IDA Section 11.1. Configuration Files Section 11.2. Additional IDA Configuration Options Section 11.3. Summary Chapter 12. Library Recognition Using FLIRT Signatures Section 12.1. Fast Library Identification and Recognition Technology Section 12.2. Applying FLIRT Signatures Section 12.3. Creating FLIRT Signature Files Section 12.4. Summary Chapter 13. Extending IDA's Knowledge Section 13.1. Augmenting Function Information Section 13.2. Augmenting Predefined Comments with loadint Section 13.3. Summary Chapter 14. PATCHING BINARIES AND OTHER IDA LIMITATIONS Section 14.1. The Infamous Patch Program Menu Section 14.2. IDA Output Files and Patch Generation Section 14.3. Summary Part IV: EXTENDING IDA'S CAPABILITIES Chapter 15. SCRIPTING WITH IDC Section 15.1. Basic Script Execution Section 15.2. The IDC Language Section 15.3. Associating IDC Scripts with Hotkeys Section 15.4. Useful IDC Functions Section 15.5. IDC Scripting Examples Section 15.6. Summary Chapter 16. THE IDA SOFTWARE DEVELOPMENT KIT Section 16.1. SDK Introduction Section 16.2. The IDA Application Programming Interface Section 16.3. Summary Chapter 17. THE IDA PLUG-IN ARCHITECTURE Section 17.1. Writing a Plug-in Section 17.2. Building Your Plug-ins Section 17.3. Plug-in Installation Section 17.4. Plug-in Configuration Section 17.5. Extending IDC Section 17.6. Plug-in User Interface Options Section 17.7. Summary Chapter 18. BINARY FILES AND IDA LOADER MODULES Section 18.1. Unknown File Analysis Section 18.2. Manually Loading a Windows PE File Section 18.3. IDA Loader Modules Section 18.4. Writing an IDA Loader Section 18.5. Alternative Loader Strategies Section 18.6. Summary Chapter 19. IDA PROCESSOR MODULES Section 19.1. Python Byte Code Section 19.2. The Python Interpreter Section 19.3. Writing a Processor Module Section 19.4. Building Processor Modules Section 19.5. Customizing Existing Processors Section 19.6. Processor Module Architecture Section 19.7. Summary Part V: REAL-WORLD APPLICATIONS Chapter 20. COMPILER VARIATIONS Section 20.1. Jump Tables and Switch Statements Section 20.2. RTTI Implementations Section 20.3. Locating main Section 20.4. Debug vs. Release Binaries Section 20.5. Alternative Calling Conventions Section 20.6. Summary Chapter 21. OBFUSCATED CODE ANALYSIS Section 21.1. Anti–Static Analysis Techniques Section 21.2. Anti–Dynamic Analysis Techniques Section 21.3. Static De-obfuscation of Binaries Using IDA Section 21.4. Summary Chapter 22. VULNERABILITY ANALYSIS Section 22.1. Discovering New Vulnerabilities with IDA Section 22.2. After-the-Fact Vulnerability Discovery with IDA Section 22.3. IDA and the Exploit-Development Process Section 22.4. Analyzing Shellcode Section 22.5. Summary Chapter 23. REAL-WORLD IDA PLUG-INS Section 23.1. Hex-Rays Section 23.2. IDAPython Section 23.3. IDARub Section 23.4. IDA Sync Section 23.5. collabREate Section 23.6. ida-x86emu Section 23.7. mIDA Section 23.8. Summary Part VI: THE IDA DEBUGGER Chapter 24. THE IDA DEBUGGER Section 24.1. Launching the Debugger Section 24.2. Basic Debugger Displays Section 24.3. Process Control Section 24.4. Automating Debugger Tasks Section 24.5. Summary Chapter 25. DISASSEMBLER/DEBUGGER INTEGRATION Section 25.1. Background Section 25.2. IDA Databases and the IDA Debugger Section 25.3. Debugging Obfuscated Code Section 25.4. Summary Chapter 26. LINUX, OS X, AND REMOTE DEBUGGING WITH IDA Section 26.1. Console-Mode Debugging Section 26.2. Remote Debugging with IDA Section 26.3. Summary Appendix A. USING IDA FREEWARE 4.9 Section A.1. Restrictions on IDA Freeware Section A.2. Using IDA Freeware Appendix B. IDC/SDK CROSS-REFERENCE Appendix C. WHAT'S NEW IN IDA 5.3 Section C.1. Redesigned Debugger Section C.2. Type Library Support Section C.3. New IDC Functions Section C.4. New API/SDK Functionality Section C.5. Summary COLOPHON Index

2010-02-27

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除