当前位置:网站首页>Reading notes
Reading notes
2022-04-23 07:56:00 【Fish in Siyuan Lake】
Catalog
Preface
Here are some reading notes , Urge yourself to read and study
Python Black hat : Hacking and penetration testing programming
- 《Python Black hat : Hacking and penetration testing programming 》 Reading notes ( One ): Network foundation
- 《Python Black hat : Hacking and penetration testing programming 》 Reading notes ( Two ): Raw socket and traffic sniffing
- 《Python Black hat : Hacking and penetration testing programming 》 Reading notes ( 3、 ... and ):scapy—— The master of the Internet
- 《Python Black hat : Hacking and penetration testing programming 》 Reading notes ( Four ):web attack
- 《Python Black hat : Hacking and penetration testing programming 》 Reading notes ( 5、 ... and ): Expand burp agent
- 《Python Black hat : Hacking and penetration testing programming 》 Reading notes ( 6、 ... and ): be based on github Of Trojans
- 《Python Black hat : Hacking and penetration testing programming 》 Reading notes ( 7、 ... and ):Windows Trojan horse under the common functions
- 《Python Black hat : Hacking and penetration testing programming 》 Reading notes ( 8、 ... and ):Windows Raise the right
- 《Python Black hat : Hacking and penetration testing programming 》 Reading notes ( Nine ): Automated attack forensics
improve python programmatic 91 A suggestion
- 《 improve python programmatic 91 A suggestion 》 Reading notes ( One ) Introduction
- 《 improve python programmatic 91 A suggestion 》 Reading notes ( Two ) Programming idioms
- 《 improve python programmatic 91 A suggestion 》 Reading notes ( 3、 ... and ) Basic grammar
- 《 improve python programmatic 91 A suggestion 》 Reading notes ( Four ) library
- 《 improve python programmatic 91 A suggestion 》 Reading notes ( 5、 ... and ) Design patterns
- 《 improve python programmatic 91 A suggestion 》 Reading notes ( 6、 ... and ) Internal mechanism
- 《 improve python programmatic 91 A suggestion 》 Reading notes ( 7、 ... and ) Using tools to assist project development
- 《 improve python programmatic 91 A suggestion 》 Reading notes ( 8、 ... and ) Performance analysis and optimization
CTF Special training camp
- 《CTF Special training camp 》web Some reading notes ( One )SQL Inject
- 《CTF Special training camp 》web Some reading notes ( Two ) Cross-site scripting attacks (XSS)
- 《CTF Special training camp 》web Some reading notes ( 3、 ... and ) Server request forgery (SSRF)
- 《CTF Special training camp 》web Some reading notes ( Four ) Use features to attack (php and win System )
- 《CTF Special training camp 》web Some reading notes ( 5、 ... and ) Code audit
- 《CTF Special training camp 》web Some reading notes ( 6、 ... and ) Conditional competition
How does the program run
- 《 How does the program run 》 Reading notes ( One )CPU What is it?
- 《 How does the program run 》 Reading notes ( Two ) Data is represented in binary
- 《 How does the program run 》 Reading notes ( 3、 ... and ) The reason why the computer makes an error in decimal operation
- 《 How does the program run 》 Reading notes ( Four ) Skilled use of angular memory
- 《 How does the program run 》 Reading notes ( 5、 ... and ) The intimate relationship between memory and disk
- 《 How does the program run 》 Reading notes ( 6、 ... and ) Try to compress the data
- 《 How does the program run 》 Reading notes ( 7、 ... and ) Program running environment
- 《 How does the program run 》 Reading notes ( 8、 ... and ) From source file to executable file
- 《 How does the program run 》 Reading notes ( Nine ) The relationship between operating system and Application
- 《 How does the program run 》 Reading notes ( Ten ) Understand the actual composition of the program through assembly language
Deep understanding of computer systems
- 《 Deep understanding of computer systems 》 Reading notes ( One ) Computer system roaming ( The introduction )
- 《 Deep understanding of computer systems 》 Reading notes ( Two ) Presentation and processing of information
- 《 Deep understanding of computer systems 》 Reading notes ( 3、 ... and ) The machine level representation of a program
- 《 Deep understanding of computer systems 》 Reading notes ( Four ) Processor architecture
- 《 Deep understanding of computer systems 》 Reading notes ( 5、 ... and ) Optimize program performance
- 《 Deep understanding of computer systems 》 Reading notes ( 6、 ... and ) Memory hierarchy
- 《 Deep understanding of computer systems 》 Reading notes ( 7、 ... and ) link
- 《 Deep understanding of computer systems 》 Reading notes ( 8、 ... and ) Abnormal control flow
- 《 Deep understanding of computer systems 》 Reading notes ( Nine ) Virtual memory
- 《 Deep understanding of computer systems 》 Reading notes ( Ten ) The system level I/O
- 《 Deep understanding of computer systems 》 Reading notes ( 11、 ... and ) Network programming
Top down method of computer network
- 《 Top down method of computer network 》 Reading notes ( One ): Computer networks and the Internet
- 《 Top down method of computer network 》 Reading notes ( Two ): application layer
- 《 Top down method of computer network 》 Reading notes ( 3、 ... and ): Transport layer
- 《 Top down method of computer network 》 Reading notes ( Four ): The network layer
- 《 Top down method of computer network 》 Reading notes ( 5、 ... and ): Link layer and lan
- 《 Top down method of computer network 》 Reading notes ( 6、 ... and ): Wireless networks and mobile networks
- 《 Top down method of computer network 》 Reading notes ( 7、 ... and ): Security in computer networks
Conclusion
Some reading notes , Continuous updating
版权声明
本文为[Fish in Siyuan Lake]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204230628264840.html
边栏推荐
- VBA appelle SAP RFC pour réaliser la lecture et l'écriture des données
- Houdini terrain and fluid solution (simulated debris flow)
- Dropping Pixels for Adversarial Robustness
- Apache Hudi 如何加速传统的批处理模式?
- SAP GUI安全性
- SQL sorts string numbers
- Index locked data cannot be written to es problem handling
- 踩坑日记:Unable to process Jar entry [module-info.class]
- Understanding the Role of Individual Units in a Deep Neural Networks(了解各个卷积核在神经网络中的作用)
- TA notes of Zhuang understand (zero) < bedding and learning methods >
猜你喜欢

When using flash, the code ends automatically without an error, the connection cannot be maintained, and the URL cannot be accessed.

【NLP笔记】CRF原理初探

内网渗透系列:内网隧道之dnscat2

Towords Open World Object Detection

Rethink | open the girl heart mode of station B and explore the design and implementation of APP skin changing mechanism

Houdini地形与流体解算(模拟泥石流)

Towords Open World Object Detection

Série de pénétration Intranet: icmpsh du tunnel Intranet

关于U盘数据提示RAW,需要格式化,数据恢复笔记

ABAP ALV显示金额与导出金额不一致
随机推荐
unity 屏幕自适应
Unity C single case mode learning review notes
Event system (II) multicast events
读书笔记
SAP STO With Billing流程与配置
C operation registry full introduction
Post of experience in preparation for guarantee and research -- the 18th (2021) Central South planning department promoted the exemption to Zhejiang University Institute of Technology
三分钟教你用Houdini流体>>解算粒子流体水滴
One of event management
内网渗透系列:内网隧道之icmptunnel(jamesbarlow师傅的)
RGB color to hex and unit conversion
Quick sort
Using lambda expression to solve the problem of C file name sorting (whether it is 100 or 11)
Mongodb 启动警告信息处理
《内网安全攻防:渗透测试实战指南》读书笔记(五):域内横向移动分析及防御
《内网安全攻防:渗透测试实战指南》读书笔记(六):域控制器安全
Understanding the role of individual units in a deep neural networks
Protobuf use
Unity 获取一个资源被那些资源引用
Export all SVG files in the specified path into pictures in PNG format (thumbnail or original size)