安娜的档案需要您的帮助! 许多人试图关停我们,但我们会奋起反击。
➡️ 如果您现在捐赠,您将获得 双倍 的快速下载次数。 有效期至本月底。 捐赠
✕

安娜的档案

📚 人类历史上最大的完全开放的图书馆。 📈 61,654,285 本图书、95,687,150 篇论文被永久保存。
AA 38TB
direct uploads
IA 304TB
scraped by AA
DuXiu 298TB
scraped by AA
Hathi 9TB
scraped by AA
Libgen.li 188TB
collab with AA
Z-Lib 77TB
collab with AA
Libgen.rs 82TB
mirrored by AA
Sci-Hub 90TB
mirrored by AA
⭐️ Our code and data are 100% open source. 了解更多……
✕ 近期下载:  
主页 主页 主页 主页
安娜的档案
主页
搜索
捐赠
🧬 SciDB
常问问题
账户
登录 / 注册
账户
公开资料
已下载文件
我的捐赠
Referrals
Explore
活动
代码浏览器
ISBN Visualization ↗
Community Projects ↗
Open data
数据集
种子
大语言模型数据
关注我们
联系邮箱
安娜的博客 ↗
Reddit ↗
Matrix ↗
Help out
改进元数据
志愿服务与悬赏
翻译 ↗
Development
安娜的软件 ↗
安全性
数字千年版权法(DCMA)/ 版权声明
镜像
annas-archive.li ↗
annas-archive.pm ↗
annas-archive.in ↗
SLUM [无关联] ↗
SLUM 2 [无关联] ↗
搜索搜索 捐赠 x2捐赠 x2
账户账户
搜索设置
排序
高级
增加特定搜索字段
内容
文件类型 open our viewer
更多……
访问方式
来源
语言
更多……
显示
Search settings
下载 期刊文章 数字借阅 元数据
结果集 1-50(总计 50)
upload/duxiu_main/x/pdf/10230922.pdf
中国逻辑史资料选 现代卷 上 周云之主编;中国逻辑史研究会资料编选组编 兰州:甘肃人民出版社, 1991, 1991
封面 1 书名 2 版权 3 前言 4 目录 5 1 9 2 10 3 11 4 12 5 13 6 14 7 15 8 16 9 17 10 18 11 19 12 20 13 21 14 22 15 23 16 24 17 25 18 26 19 27 20 28 21 29 22 30 23 31 24 32 25 33 26 34 27 35 28 36 29 37 30 38 31 39 32 40 33 41 34 42 35 43 36 44 37 45 38 46 39 47 40 48 41 49 42 50 43 51 44 52 45 53 46 54 47 55 48 56 49 57 50 58 51 59 52 60 53 61 54 62 55 63 56 64 57 65 58 66 59 67 60 68 61 69 62 70 63 71 64 72 65 73 66 74 67 75 68 76 69 77 70 78 71 79 72 80 73 81 74 82 75 83 76 84 77 85 78 86 79 87 80 88 81 89 82 90 83 91 84 92 85 93 86 94 87 95 88 96 89 97 90 98 91 99 92 100 93 101 94 102 95 103 96 104 97 105 98 106 99 107 100 108 101 109 102 110 103 111 104 112 105 113 106 114 107 115 108 116 109 117 110 118 111 119 112 120 113 121 114 122 115 123 116 124 117 125 118 126 119 127 120 128 121 129 122 130 123 131 124 132 125 133 126 134 127 135 128 136 129 137 130 138 131 139 132 140 133 141 134 142 135 143 136 144 137 145 138 146 139 147 140 148 141 149 142 150 143 151 144 152 145 153 146 154 147 155 148 156 149 157 150 158 151 159 152 160 153 161 154 162 155 163 156 164 157 165 158 166 159 167 160 168 161 169 162 170 163 171 164 172 165 173 166 174 167 175 168 176 169 177 170 178 171 179 172 180 173 181 174 182 175 183 176 184 177 185 178 186 179 187 180 188 181 189 182 190 183 191 184 192 185 193 186 194 187 195 188 196 189 197 190 198 191 199 192 200 193 201 194 202 195 203 196 204 197 205 198 206 199 207 200 208 201 209 202 210 203 211 204 212 205 213 206 214 207 215 208 216 209 217 210 218 211 219 212 220 213 221 214 222 215 223 216 224 217 225 218 226 219 227 220 228 221 229 222 230 223 231 224 232 225 233 226 234 227 235 228 236 229 237 230 238 231 239 232 240 233 241 234 242 235 243 236 244 237 245 238 246 239 247 240 248 241 249 242 250 243 251 244 252 245 253 246 254 247 255 248 256 249 257 250 258 251 259 252 260 253 261 254 262 255 263 256 264 257 265 258 266 259 267 260 268 261 269 262 270 263 271 264 272 265 273 266 274 267 275 268 276 269 277 270 278 271 279 272 280 273 281 274 282 275 283 276 284 277 285 278 286 279 287 280 288 281 289 282 290 283 291 284 292 285 293 286 294 287 295 288 296 289 297 290 298 291 299 292 300 293 301 294 302 295 303 296 304 297 305 298 306 299 307 300 308 301 309 302 310 303 311 304 312 305 313 306 314 307 315 308 316 309 317 310 318 311 319 312 320 313 321 314 322 315 323 316 324 317 325 318 326 319 327 320 328 321 329 322 330 323 331 324 332 325 333 326 334 327 335 328 336 329 337 330 338 331 339 332 340 333 341 334 342 335 343 336 344 337 345 338 346 339 347 340 348 341 349 342 350 343 351 344 352 345 353 346 354 347 355 348 356 349 357 350 358 351 359 352 360 353 361 354 362 355 363 356 364 357 365 358 366 359 367 360 368 361 369 362 370 363 371 364 372 365 373 366 374 367 375 368 376 369 377 370 378 371 379 372 380 373 381 374 382 375 383 376 384 377 385 378 386 379 387 380 388 381 389 382 390 383 391 384 392 385 393 386 394 387 395 388 396 389 397 390 398 391 399 392 400 393 401 394 402 395 403 396 404 397 405 398 406 399 407 400 408 401 409 402 410 403 411 404 412 405 413 406 414 407 415 408 416 409 417 410 418 411 419 412 420 413 421 414 422 415 423 416 424 417 425 418 426 419 427 420 428 421 429 422 430 423 431 424 432 425 433 426 434 427 435 428 436 429 437 430 438 431 439 432 440 433 441 434 442 435 443 436 444 437 445 438 446 439 447 440 448 441 449 442 450 443 451 444 452 445 453 446 454 447 455 448 456 449 457 450 458 451 459 452 460 453 461 454 462 455 463 456 464 457 465 458 466 459 467 460 468 461 469 462 470 463 471 464 472 465 473 466 474 467 475 468 476 469 477 470 478 471 479 472 480 473 481 474 482 475 483 476 484 477 485 478 486 479 487 480 488 481 489 482 490 483 491 484 492 485 493 486 494 487 495 488 496 489 497 490 498 491 499 492 500 493 501 494 502 495 503 496 504 497 505 498 506 499 507 500 508 501 509 502 510 503 511 504 512 505 513 506 514 507 515 508 516 509 517 510 518 511 519 512 520 513 521 514 522 515 523 516 524 517 525 518 526 519 527 520 528 521 529 522 530 523 531 524 532 525 533 526 534 527 535 528 536 529 537 530 538 531 539 532 540 533 541 534 542 535 543 536 544 537 545 538 546 539 547 540 548 541 549 542 550 543 551
更多信息……
中文 [zh] · PDF · 14.2MB · 1991 · 📗 未知类型的图书 · 🚀/duxiu/upload/zlibzh · Save
base score: 11060.0, final score: 167482.17
upload/shukui_net_cdl/105/37258164.pdf
中国逻辑史资料选 现代卷 上 周云之主编;中国逻辑史研究会资料编选组编 兰州:甘肃人民出版社, Di 1 ban, Lanzhou, ©1991
不详
更多信息……
中文 [zh] · PDF · 5.3MB · 1991 · 📗 未知类型的图书 · 🚀/duxiu/upload · Save
base score: 11060.0, final score: 167482.02
upload/duxiu_main/x/pdf/10230923.pdf
中国逻辑史资料选 现代卷 下 中国 逻辑史 研究会 资料 编 '\O'Q+!#!; 本卷 主编 周 云之; 周 云之; 中国 逻辑史 研究会 兰州:甘肃人民出版社, 1991, 1991
封面 1 书名 2 版权 3 前言 4 目录 13 1 19 2 20 3 21 4 22 5 23 6 24 7 25 8 26 9 27 10 28 11 29 12 30 13 31 14 32 15 33 16 34 17 35 18 36 19 37 20 38 21 39 22 40 23 41 24 42 25 43 26 44 27 45 28 46 29 47 30 48 31 49 32 50 33 51 34 52 35 53 36 54 37 55 38 56 39 57 40 58 41 59 42 60 43 61 44 62 45 63 46 64 47 65 48 66 49 67 50 68 51 69 52 70 53 71 54 72 55 73 56 74 57 75 58 76 59 77 60 78 61 79 62 80 63 81 64 82 65 83 66 84 67 85 68 86 69 87 70 88 71 89 72 90 73 91 74 92 75 93 76 94 77 95 78 96 79 97 80 98 81 99 82 100 83 101 84 102 85 103 86 104 87 105 88 106 89 107 90 108 91 109 92 110 93 111 94 112 95 113 96 114 97 115 98 116 99 117 100 118 101 119 102 120 103 121 104 122 105 123 106 124 107 125 108 126 109 127 110 128 111 129 112 130 113 131 114 132 115 133 116 134 117 135 118 136 119 137 120 138 121 139 122 140 123 141 124 142 125 143 126 144 127 145 128 146 129 147 130 148 131 149 132 150 133 151 134 152 135 153 136 154 137 155 138 156 139 157 140 158 141 159 142 160 143 161 144 162 145 163 146 164 147 165 148 166 149 167 150 168 151 169 152 170 153 171 154 172 155 173 156 174 157 175 158 176 159 177 160 178 161 179 162 180 163 181 164 182 165 183 166 184 167 185 168 186 169 187 170 188 171 189 172 190 173 191 174 192 175 193 176 194 177 195 178 196 179 197 180 198 181 199 182 200 183 201 184 202 185 203 186 204 187 205 188 206 189 207 190 208 191 209 192 210 193 211 194 212 195 213 196 214 197 215 198 216 199 217 200 218 201 219 202 220 203 221 204 222 205 223 206 224 207 225 208 226 209 227 210 228 211 229 212 230 213 231 214 232 215 233 216 234 217 235 218 236 219 237 220 238 221 239 222 240 223 241 224 242 225 243 226 244 227 245 228 246 229 247 230 248 231 249 232 250 233 251 234 252 235 253 236 254 237 255 238 256 239 257 240 258 241 259 242 260 243 261 244 262 245 263 246 264 247 265 248 266 249 267 250 268 251 269 252 270 253 271 254 272 255 273 256 274 257 275 258 276 259 277 260 278 261 279 262 280 263 281 264 282 265 283 266 284 267 285 268 286 269 287 270 288 271 289 272 290 273 291 274 292 275 293 276 294 277 295 278 296 279 297 280 298 281 299 282 300 283 301 284 302 285 303 286 304 287 305 288 306 289 307 290 308 291 309 292 310 293 311 294 312 295 313 296 314 297 315 298 316 299 317 300 318 301 319 302 320 303 321 304 322 305 323 306 324 307 325 308 326 309 327 310 328 311 329 312 330 313 331 314 332 315 333 316 334 317 335 318 336 319 337 320 338 321 339 322 340 323 341 324 342 325 343 326 344 327 345 328 346 329 347 330 348 331 349 332 350 333 351 334 352 335 353 336 354 337 355 338 356 339 357 340 358 341 359 342 360 343 361 344 362 345 363 346 364 347 365 348 366 349 367 350 368 351 369 352 370 353 371 354 372 355 373 356 374 357 375 358 376 359 377 360 378 361 379 362 380 363 381 364 382 365 383 366 384 367 385 368 386 369 387 370 388 371 389 372 390 373 391 374 392 375 393 376 394 377 395 378 396 379 397 380 398 381 399 382 400 383 401 384 402 385 403 386 404 387 405 388 406 389 407 390 408 391 409 392 410 393 411 394 412 395 413 396 414 397 415 398 416 399 417 400 418 401 419 402 420 403 421 404 422 405 423 406 424 407 425 408 426 409 427 410 428 411 429 412 430 413 431 414 432 415 433 416 434 417 435 418 436 419 437 420 438 421 439 422 440 423 441 424 442 425 443 426 444 427 445 428 446 429 447 430 448 431 449 432 450 433 451 434 452 435 453 436 454 437 455 438 456 439 457 440 458 441 459 442 460 443 461 444 462 445 463 446 464 447 465 448 466 449 467 450 468 451 469 452 470 453 471 454 472 455 473 456 474 457 475 458 476 459 477 460 478 461 479 462 480 463 481 464 482 465 483 466 484 467 485 468 486 469 487 470 488 471 489 472 490 473 491 474 492 475 493 476 494 477 495 478 496 479 497 480 498 481 499 482 500 483 501 484 502 485 503 486 504 487 505 488 506 489 507 490 508 491 509 492 510 493 511 494 512 495 513 496 514 497 515 498 516 499 517 500 518 501 519 502 520 503 521 504 522 505 523 506 524 507 525 508 526 509 527 510 528 511 529 512 530 513 531 514 532 515 533 516 534 517 535 518 536 519 537 520 538 521 539 522 540 523 541 524 542 525 543 526 544 527 545 528 546 529 547 530 548 531 549 532 550 533 551 534 552 535 553 536 554 537 555 538 556 539 557 540 558 541 559 542 560 543 561 544 562 545 563 546 564 547 565 548 566 549 567 550 568 551 569 552 570 553 571 554 572 555 573 556 574 557 575 558 576 559 577 560 578 561 579 562 580 563 581 564 582 565 583 566 584 567 585 568 586 569 587 570 588 571 589 572 590 573 591 574 592 575 593 576 594 577 595 578 596 579 597 580 598 581 599 582 600 583 601 584 602 585 603 586 604 587 605 588 606 589 607 590 608 591 609 592 610 593 611 594 612 595 613 596 614 597 615 598 616 599 617 600 618 601 619 602 620 603 621 604 622 605 623 606 624 607 625 608 626 609 627 610 628 611 629 612 630 613 631 614 632 615 633 616 634 617 635 618 636 619 637 620 638 621 639 622 640 623 641 624 642 625 643 626 644 627 645 628 646 629 647 630 648 631 649 632 650 633 651 634 652 635 653 636 654 637 655 638 656 639 657 640 658 641 659 642 660 643 661 644 662 645 663 646 664 647 665 648 666 649 667 650 668 651 669 652 670 653 671 654 672 655 673 656 674 657 675 658 676 659 677 660 678 661 679 662 680 663 681 664 682 665 683 666 684 667 685 668 686 669 687 670 688 671 689 672 690 673 691 674 692 675 693 676 694 677 695 678 696 679 697 680 698 681 699 682 700 683 701 684 702 685 703 686 704 687 705 688 706 689 707 690 708 691 709 692 710 693 711 694 712 695 713 696 714 697 715
更多信息……
中文 [zh] · PDF · 18.9MB · 1991 · 📗 未知类型的图书 · 🚀/duxiu/upload/zlibzh · Save
base score: 11060.0, final score: 167480.75
upload/duxiu_main/v/pdf/中国逻辑史资料选·因明卷_11352696.pdf
中国逻辑史资料选·因明卷 虞愚(主编);杨化群(主编);黄明信(主编) 兰州:甘肃人民出版社, 1991, 1991
1 (p0-1): 本卷前言1 (p0-2): 例言3 (p1): 汉传因明·3 (p1-2): 《因明入正理论》简介 虞愚8 (p1-3): 《因明入正理论疏》简介 吕徵13 (p1-4): 因明入正理论疏 杨百顺 崔清田 吴志雄 沈剑英 巫寿康 合注 刘培育 统稿15 (p1-5): 卷一42 (p1-6): 卷二60 (p1-7): 卷三88 (p1-8): 卷四117 (p1-9): 卷五159 (p1-10): 卷六201 (p1-11): 卷七228 (p1-12): 卷八257 (p1-13): 附:所引注释书目258 (p1-14): 后记261 (p2): 藏传因明261 (p2-2): 译序267 (p2-3): 《量理藏论》 罗炤 译 黄明信 校269 (p2-4): 第一品 观境品284 (p2-5): 第二品 观心品296 (p2-6): 第三品 观总与别品305 (p2-7): 第四品 观成立与遣他品329 (p2-8): 第五品 观所诠与能诠品340 (p2-9): 第六品 观相属品372 (p2-10): 第七品 观相违品381 (p2-11): 第八品 观性相品421 (p2-12): 《因明七论入门》 杨化群 译 黄明信校注423 (p2-13): 一、外境427 (p2-14): (一)能诠427 (p2-15): 二、具境429 (p2-16): (二)心识435 (p2-17): 三、对境之分析442 (p2-18): 四、比度442 (p2-19): (一)自利比度443 (p2-20): 真因448 (p2-21): 似因452 (p2-22): 喻454 (p2-23): 因喻之过失455 (p2-24): (二)利地比度459 (p2-25): 礼赞偈460 (p2-26): 校者注463 (p2-27): 《因明学启蒙》 杨化群译465 (p2-28): 《因明学启蒙》汉译本读者一助 黄明信475 (p2-29): 译本前言478 (p2-30): 卷一478 (p2-31): 乙一、红白颜色480 (p2-32): 甲一、小理路482 (p2-33): 乙二、成事487 (p2-34): 乙三、认识体493 (p2-35): 乙四、否定是否定非496 (p2-36): 乙五、小因果502 (p2-37): 乙六、总与别506 (p2-38): 乙七、质与体510 (p2-39): 卷二510 (p2-40): 甲二、中理路510 (p2-41): 乙一、相违与相属517 (p2-42): 乙二、有与无520 (p2-43): 乙三、性相与所表527 (p2-44): 乙四、大因果540 (p2-45): 乙五、随因后遍及遣遍——兼略述破与立547 (p2-46): 甲三、大理路547 (p2-47): 乙一、应成论式等547 (p2-48): 丙一、小应成论式547 (p2-49): 卷三556 (p2-50): 丙二、大应成论式571 (p2-51): 丙三、排他、遮止、成立587 (p2-52): 丙四、建立排入、立入592 (p2-53): 乙二、论述建立境、具境、心理592 (p2-54): 丙一、驳他宗592 (p2-55): 卷四595 (p2-56): 丙二、立自宗627 (p2-57): 卷五627 (p2-58): 乙三、因理627 (p2-59): 丙一、因之性?628 (p2-60): 丙二、因之分类656 (p2-61): 附:必须之引申义656 (p2-62): 一、能立语657 (p2-63): 二、其余引申义659 (p2-64): 三、附述建立论式之性相与所相结合规律662 (p2-65): 校者后记
更多信息……
中文 [zh] · PDF · 9.4MB · 1991 · 📗 未知类型的图书 · 🚀/duxiu/upload/zlibzh · Save
base score: 11060.0, final score: 167479.8
duxiu/initial_release/11533104.zip
中国逻辑史资料选 近代卷 中国逻辑史研究会资料编选组编 李匡武本卷主编 兰州:甘肃人民出版社, Di 1 ban, Lanzhou, 1985-1991
中文 [zh] · PDF · 9.2MB · 1991 · 📗 未知类型的图书 · 🚀/duxiu · Save
base score: 11057.0, final score: 167478.53
upload/duxiu_main/v/pdf/中国逻辑史资料选 近代卷_11533104.pdf
中国逻辑史资料选 近代卷 中国逻辑史研究会资料编选组编 李匡武本卷主编 兰州:甘肃人民出版社, 1991, 1991
1 (p0-1): 李之藻 15 (p0-2): 傅山 43 (p0-3): 黄宗羲 50 (p0-4): 方以智 62 (p0-5): 顾炎武 78 (p0-6): 王夫之 93 (p0-7): 唐甄 102 (p0-8): 颜元 117 (p0-9): 戴震 124 (p0-10): 毕沅 140 (p0-11): 章学诚 152 (p0-12): 汪中 157 (p0-13): 王念孙 173 (p0-14): 焦循 180 (p0-15): 王引之 196 (p0-16): 张惠言 201 (p0-17): 陈澧 213 (p0-18): 俞樾 229 (p0-19): 王先谦 240 (p0-20): 孙诒让 254 (p0-21): 严复 276 (p0-22): 章炳麟 296 (p0-23): 梁启超 316 (p0-24): 王国维 318 (p0-25): 刘光汉 326 (p0-26): 胡适
更多信息……
中文 [zh] · PDF · 11.1MB · 1991 · 📗 未知类型的图书 · 🚀/duxiu/upload/zlibzh · Save
base score: 11060.0, final score: 167477.52
duxiu/initial_release/中国逻辑史资料选 现代卷(下)_10230923.zip
中国逻辑史资料选 现代卷 下 周云之主编;中国逻辑史研究会资料编选组编, 周云之主编 , 中国逻辑史研究会资料编选组编, 周云之, 中国逻辑史研究会资料编选组, 中国逻辑史研究会资料编选组 , 本卷主编周云之, 周云之, 中国逻辑史研究会, 中国逻辑史研究会资料编选组 , 周云之主编, 周云之, 中国逻辑史研究会, 中国逻辑史研究会资料编选组, 杨芾荪, 李匡武, 中国逻辑史研究会 兰州:甘肃人民出版社, 1991, 1991
3 (p1): (中国古代)名辩逻辑资料 3 (p1-1): 著作部分 3 (p1-1-1): 《墨子学案》(梁启超) 21 (p1-1-2): 《墨子 释义》(张之锐) 27 (p1-1-3): 《墨学分科》(张纯一) 31 (p1-1-4): 《名学稽古》(章行严 胡适 陈启天) 48 (p1-1-5): 《诸子通谊》(陈钟凡) 55 (p1-1-6): 《名学通论》(陈显文) 69 (p1-1-7): 《墨子综释》(支伟成) 79 (p1-1-8): 《经子解题》(吕恩勉) 83 (p1-1-9): 《荀子哲学》(陈登元) 86 (p1-1-10): 《公孙龙子释》(金受申) 95 (p1-1-11): 《公孙龙子悬解》(王琯) 109 (p1-1-12): 《惠施公孙龙》(钱穆) 121 (p1-1-13): 《论理学大全》(王章焕) 145 (p1-1-14): 《荀子研究》(杨筠如) 150 (p1-1-15): 《墨子集解》(张纯一) 159 (p1-1-16): 《先秦辩学史》(郭湛波) 182 (p1-1-17): 《中国哲学史》(冯友兰) 196 (p1-1-18): 《墨学源流》(方授楚) 202 (p1-1-19): 《墨经易解》(谭戒甫) 220 (p1-1-20): 《墨辩新注》(鲁大东) 232 (p1-1-21): 《论理学纲要》(林仲达) 240 (p1-1-22): 《墨子辩经讲疏》(顾惕生) 251 (p1-1-23): 《荀子柬释》(梁启雄) 258 (p1-1-24): 《公孙龙子集解》(陈柱) 267 (p1-1-25): 《公孙龙子?解》(张怀民) 273 (p1-1-26): 《形名发微》(谭戒甫) 278 (p1-1-27): 《公孙龙子通诂》(顾惕生) 283 (p1-1-28): 《中国名学》(虞愚) 306 (p1-1-29): 《逻辑指要》(章士钊) 329 (p1-1-30): 《墨子校注》(吴毓江) 341 (p1-1-31): 《名辩思潮的批判》(郭沫若) 353 (p1-1-32): 《中国思想通史》(侯外庐 赵纪彬 杜国庠) 371 (p1-1-33): 《论理学》(先秦逻辑部分)(常守义) 375 (p1-1-34): 《中国哲学思想》(赵纪彬) 390 (p1-1-35): 《中国古名家言》(伍非百) 425 (p1-2): 论文部分 425 (p1-2-1): 《墨子·小取》篇新诂(胡适) 429 (p1-2-2): 《 篇解》(胡国钰) 434 (p1-2-3): 《墨子的名学》(吴熙) 440 (p1-2-4): 《 轨范》(谭戒甫) 451 (p1-2-5): 《论晚周形名家》(谭戒甫) 456 (p1-2-6): 《墨子哲学研究》(蒋维乔) 463 (p1-2-7): 《 第四章校释》(谭戒甫) 467 (p1-2-8): 《墨家论理学的新体系》(虞愚) 477 (p1-2-9): 《 篇校释》(谭戒甫) 481 (p1-2-10): 《荀子之论理学》(刁道宗) 486 (p1-2-11): 《关于 的若干考察》(杜国庠) 491 (p1-2-12): 《荀子逻辑学说》(梁嘉) 497 (p1-2-13): 《离坚白学派的诡辩逻辑》(纪玄冰) 507 (p1-2-14): 《论 》(杜守素) 511 (p1-2-15): 《论理学中的附性法之扩充》(陈道升) 520 (p1-2-16): 《名家学说的新认识》(张铁君) 523 (p1-2-17): 《中国哲学之名与辩》(张岱年) 525 (p1-2-18): 《惠施公孙龙名理阐微》(景昌极) 531 (p2): 因明资料 531 (p2-1): 著作部分 531 (p2-1-1): 《因明概论》(太虚) 536 (p2-1-2): 《因明大疏删注》(熊十力) 543 (p2-1-3): 《因明纲要》(吕澂) 556 (p2-1-4): 《因明学》(陈望道)...
更多信息……
中文 [zh] · PDF · 15.5MB · 1991 · 📗 未知类型的图书 · 🚀/duxiu/zlibzh · Save
base score: 11060.0, final score: 167467.5
duxiu/initial_release/12533348.zip
中国逻辑史资料选 汉至明卷 周文英主编, 中国逻辑史研究会资料编选组 , 周文英主编, 周文英, 中国逻辑史研究会, 中国逻辑史研究会资料编选组, 杨芾荪, 李匡武, 中国逻辑史研究会 兰州:甘肃人民出版社, 1991, 1991
1 (p1): 《淮南子》26 (p2): 董仲舒40 (p3): 司马迁42 (p4): 班固46 (p5): 刘向50 (p6): 扬雄68 (p7): 王充107 (p8): 王符113 (p9): 荀悦115 (p10): 徐幹120 (p11): 刘廙122 (p12): 何晏125 (p13): 《孔丛子》135 (p14): 刘邵150 (p15): 嵇康160 (p16): 王弼170 (p17): 欧阳建174 (p18): 郭象181 (p19): 鲁胜183 (p20): 僧肇188 (p21): 《世说新语》200 (p22): 范缜204 (p23): 《文心雕龙》217 (p24): 《刘子新论》224 (p25): 《连珠体》246 (p26): 《旧唐书》、《新唐书》253 (p27): 吕才265 (p28): 刘知几280 (p29): 法藏287 (p30): 慧能289 (p31): 邵雍299 (p32): 张载307 (p33): 程颢、程颐327 (p34): 朱熹341 (p35): 陆九渊、王阳明351 (p36): 陈亮359 (p37): 叶适366 (p38): 罗钦顺374 (p39): 王廷相381 (p40): 李贽
更多信息……
中文 [zh] · PDF · 9.0MB · 1991 · 📗 未知类型的图书 · 🚀/duxiu/zlibzh · Save
base score: 11060.0, final score: 167467.4
duxiu/initial_release/13247919.zip
蒋介石传 王俯民著, 李匡武主编 , 中国逻辑史研究会资料编选组编, 李匡武, 中国逻辑史研究会资料编选组, 中国逻辑史研究会资料编选组 , 本卷主编李匡武, 李匡武, 中国逻辑史研究会, 中国逻辑史研究会资料编选组, 杨芾荪, 李匡武, 中国逻辑史研究会 兰州:甘肃人民出版社, 2004, 2004
1 (p1): 第一章 追随孙文 1 (p1-1): 家乡和身世 5 (p1-2): 少年时代 11 (p1-3): 登轮东渡 15 (p1-4): 参加革命 18 (p1-5): 参加中华革命党 24 (p1-6): 上书干政 26 (p1-7): 赴苏考察 28 (p1-8): 黄埔上任 30 (p1-9): 反对个人崇拜 31 (p1-10): 反对孙中山北伐大计 33 (p1-11): 第一次东征与国民政府成立 35 (p2): 第二章 北伐与反共 35 (p2-1): 第二次东征 42 (p2-2): 跃升中央常委 45 (p2-3): 准备北伐 47 (p2-4): 出师北伐 49 (p2-5): 进军武昌、南昌 54 (p2-6): 准备反共 58 (p2-7): 宁汉对立 64 (p2-8): 第一次下野 66 (p2-9): 与宋美龄结婚 69 (p2-10): 复职北伐 71 (p2-11): 南京训政 76 (p2-12): 围攻红军 77 (p2-13): “九·一八事变” 80 (p2-14): 第二次下野 82 (p2-15): 特务政治 84 (p2-16): “华北事变” 89 (p2-17): 西安事变 98 (p2-18): 战前的建设 100 (p3): 第三章 对日抗战 100 (p3-1): “七·七事变” 106 (p3-2): 全面抗战开始 110 (p3-3): 美、英作壁上观 114 (p3-4): 日寇速决战失败 116 (p3-5): 台儿庄大捷 118 (p3-6): 武汉防卫战 120 (p3-7): 德、意拉拢蒋介石 121 (p3-8): 汪精卫叛国 123 (p3-9): 蒋对未来国际形势的估计 124 (p3-10): 1939年至1941年的战况 128 (p3-11): 太平洋战争 131 (p3-12): 荣任中国战区最高统帅 133 (p3-13): 蒋介石和史迪威 137 (p3-14): 蒋介石的政治、经济思想 139 (p3-15): 史迪威咄咄逼蒋 143 (p3-16): 1943~1945年各战役 146 (p3-17): 雅尔塔会议 148 (p3-18): 《荒漠甘泉》 149 (p3-19): 日寇无条件投降 152 (p3-20): 抗战时期的日常工作和生活 153 (p3-21): 抗战中中国的损失 154 (p4): 第四章 发动全面内战 154 (p4-1): 誓雪“新耻” 154 (p4-2): 收编伪军 157 (p4-3): 国共谈判 169 (p4-4): 蒋介石和毛泽东 172 (p4-5): 国民党六届二中全会 176 (p4-6): 边谈边打 186 (p4-7): 内战爆发 188 (p4-8): 伪国民大会 190 (p4-9): 内战公开化 192 (p4-10): 1946年战况 195 (p5): 第五章 大厦将倾 195 (p5-1): 全面进攻 197 (p5-2): 重点进攻的失败 200 (p5-3): 刘邓大军南下 202 (p5-4): 中共其他各战场的反攻 204 (p5-5): 李宗仁竞选副总统 211 (p5-6): 三大战役 218 (p5-7): 对党政军方面施策的检讨 222 (p5-8): 恶性通货膨胀 224 (p5-9): 金圆券危机 227 (p5-10): 蒋经国打虎败阵 230 (p5-11): 农村经济破产 233 (p5-12): 工商业衰退和工人失业 236 (p5-13): 工农和学生运动 237 (p6): 第六章 兵败逃台 237 (p6-1): 第三次下野 245 (p6-2): 李宗仁和谈 257 (p6-3): 蒋介石转移台北 266 (p6-4): 李宗仁出走 275 (p6-5): 检讨大陆失败原因 277 (p6-6): 蒋对大陆经济的破坏 280 (p7): 第七章 惊魂初定...
更多信息……
中文 [zh] · PDF · 71.6MB · 2004 · 📗 未知类型的图书 · 🚀/duxiu/zlibzh · Save
base score: 11060.0, final score: 167467.39
duxiu/initial_release/10230922.zip
中国逻辑史资料选 现代卷 上 周云之, 周云之主编 , 中国逻辑史研究会资料编选组编, 周云之, 中国逻辑史研究会资料编选组, 中国逻辑史研究会资料编选组 , 本卷主编周云之, 周云之, 中国逻辑史研究会, 中国逻辑史研究会资料编选组 , 周云之主编, 周云之, 中国逻辑史研究会, 中国逻辑史研究会资料编选组, 杨芾荪, 李匡武, 中国逻辑史研究会 兰州:甘肃人民出版社, 1991, 1991
不详
更多信息……
中文 [zh] · PDF · 11.6MB · 1991 · 📗 未知类型的图书 · 🚀/duxiu/zlibzh · Save
base score: 11060.0, final score: 167467.31
duxiu/initial_release/中国逻辑史资料选·因明卷_11352696.zip
中国逻辑史资料选·因明卷 中国逻辑史研究会资料编选组, 中国逻辑史研究会资料编选组 , 本卷主编虞愚, 杨化群, 黄明信, 虞愚, 杨化群, 黄明信, 中国逻辑史研究会, 中國邏輯史硏究會資料編選組 , 本卷主編虞愚, 楊化群, 黃明信, 虞愚, 楊化群, 黃明信, 中國邏輯史硏究會, 虞愚等主编 , 中国逻辑史研究会资料编选组编, 虞愚, 中国逻辑史研究会资料编选组, 中国逻辑史研究会资料编选组, 杨芾荪, 李匡武, 中国逻辑史研究会 兰州:甘肃人民出版社, 1991, 1991
1 (p0-1): 本卷前言 1 (p0-2): 例言 3 (p1): 汉传因明· 3 (p1-2): 《因明入正理论》简介 虞愚 8 (p1-3): 《因明入正理论疏》简介 吕徵 13 (p1-4): 因明入正理论疏 杨百顺 崔清田 吴志雄 沈剑英 巫寿康 合注 刘培育 统稿 15 (p1-5): 卷一 42 (p1-6): 卷二 60 (p1-7): 卷三 88 (p1-8): 卷四 117 (p1-9): 卷五 159 (p1-10): 卷六 201 (p1-11): 卷七 228 (p1-12): 卷八 257 (p1-13): 附:所引注释书目 258 (p1-14): 后记 261 (p2): 藏传因明 261 (p2-2): 译序 267 (p2-3): 《量理藏论》 罗炤 译 黄明信 校 269 (p2-4): 第一品 观境品 284 (p2-5): 第二品 观心品 296 (p2-6): 第三品 观总与别品 305 (p2-7): 第四品 观成立与遣他品 329 (p2-8): 第五品 观所诠与能诠品 340 (p2-9): 第六品 观相属品 372 (p2-10): 第七品 观相违品 381 (p2-11): 第八品 观性相品 421 (p2-12): 《因明七论入门》 杨化群 译 黄明信校注 423 (p2-13): 一、外境 427 (p2-14): (一)能诠 427 (p2-15): 二、具境 429 (p2-16): (二)心识 435 (p2-17): 三、对境之分析 442 (p2-18): 四、比度 442 (p2-19): (一)自利比度 443 (p2-20): 真因 448 (p2-21): 似因 452 (p2-22): 喻 454 (p2-23): 因喻之过失 455 (p2-24): (二)利地比度 459 (p2-25): 礼赞偈 460 (p2-26): 校者注 463 (p2-27): 《因明学启蒙》 杨化群译 465 (p2-28): 《因明学启蒙》汉译本读者一助 黄明信 475 (p2-29): 译本前言 478 (p2-30): 卷一 478 (p2-31): 乙一、红白颜色 480 (p2-32): 甲一、小理路 482 (p2-33): 乙二、成事 487 (p2-34): 乙三、认识体 493 (p2-35): 乙四、否定是否定非 496 (p2-36): 乙五、小因果 502 (p2-37): 乙六、总与别 506 (p2-38): 乙七、质与体 510 (p2-39): 卷二 510 (p2-40): 甲二、中理路 510 (p2-41): 乙一、相违与相属 517 (p2-42): 乙二、有与无 520 (p2-43): 乙三、性相与所表 527 (p2-44): 乙四、大因果 540 (p2-45): 乙五、随因后遍及遣遍——兼略述破与立 547 (p2-46): 甲三、大理路 547 (p2-47): 乙一、应成论式等 547 (p2-48): 丙一、小应成论式 547 (p2-49): 卷三 556 (p2-50): 丙二、大应成论式 571 (p2-51): 丙三、排他、遮止、成立 587 (p2-52): 丙四、建立排入、立入 592 (p2-53): 乙二、论述建立境、具境、心理 592 (p2-54): 丙一、驳他宗 592 (p2-55): 卷四 595 (p2-56): 丙二、立自宗 627 (p2-57): 卷五 627 (p2-58): 乙三、因理 627 (p2-59): 丙一、因之性? 628 (p2-60): 丙二、因之分类 656 (p2-61): 附:必须之引申义 656 (p2-62): 一、能立语 657 (p2-63): 二、其余引申义 659 (p2-64): 三、附述建立论式之性相与所相结合规律 662 (p2-65): 校者后记
更多信息……
中文 [zh] · PDF · 19.6MB · 1991 · 📗 未知类型的图书 · 🚀/duxiu/zlibzh · Save
base score: 11060.0, final score: 167467.23
duxiu/initial_release/12533349.zip
中国逻辑史资料选 先秦卷 中国逻辑史研究会资料编选组编, 中国逻辑史研究会资料编选组 , 李匡武, 杨芾荪, 李匡武, 杨芾荪, 中国逻辑史研究会 兰州:甘肃人民出版社, 1991, 1991
1 (p1): 邓析 10 (p2): 尹文 21 (p3): 老子 32 (p4): 商鞅 37 (p5): 孔子 51 (p6): 子思 57 (p7): 惠施 72 (p8): 公孙龙 106 (p9): 墨家 226 (p10): 庄子 240 (p11): 孟轲 255 (p12): 荀子 303 (p13): 韩非 329 (p14): 管子 346 (p15): 纵横家 386 (p16): 吕不韦
更多信息……
中文 [zh] · PDF · 47.7MB · 1991 · 📗 未知类型的图书 · 🚀/duxiu/zlibzh · Save
base score: 11060.0, final score: 167467.23
ia/nineteenwaysoflo0000wein.pdf
Nineteen ways of looking at Wang Wei : how a Chinese poem is translated exhibit & commentary by Eliot Weinberger; further comments by Octavio Paz Moyer Bell Limited, 1st ed., Mount Kisco, N.Y, New York State, 1987
The difficulty (and necessity) of translation is concisely described in Nineteen Ways of Looking at Wang Wei, a close reading of different translations of a single poem from the Tang Dynastyfrom a transliteration to Kenneth Rexroths loose interpretation. As Octavio Paz writes in the afterword, Eliot Weinbergers commentary on the successive translations of Wang Weis little poem illustrates, with succinct clarity, not only the evolution of the art of translation in the modern period but at the same time the changes in poetic sensibility.
更多信息……
英语 [en] · 中文 [zh] · 法语 [fr] · PDF · 1.7MB · 1987 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 167466.47
ia/liang.nineteenwaysoflo0000wein_d5d4.pdf
Nineteen ways of looking at Wang Wei : how a Chinese poem is translated exhibit & commentary by Eliot Weinberger; further comments by Octavio Paz Moyer Bell ; [Distributed by Consortium, Ruskin abridged version, Mount Kisco, N.Y., [Place of publication not identified, 1989, ©1981
The difficulty (and necessity) of translation is concisely described in Nineteen Ways of Looking at Wang Wei, a close reading of different translations of a single poem from the Tang Dynastyfrom a transliteration to Kenneth Rexroths loose interpretation. As Octavio Paz writes in the afterword, Eliot Weinbergers commentary on the successive translations of Wang Weis little poem illustrates, with succinct clarity, not only the evolution of the art of translation in the modern period but at the same time the changes in poetic sensibility.
更多信息……
英语 [en] · 中文 [zh] · 法语 [fr] · PDF · 2.7MB · 1989 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 167465.67
upload/newsarch_ebooks/2019/05/15/0071832386.epub
Gray Hat Hacking The Ethical Hacker’s Handbook, Fourth Edition Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims, Linda Martinez, Michael Baucom McGraw-Hill School Education Group, 4, 2015
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, __Gray Hat Hacking: The Ethical Hacker's Handbook__, Fourth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. * Build and launch spoofing exploits with Ettercap and Evilgrade * Induce error conditions and crash software using fuzzers * Hack Cisco routers, switches, and network hardware * Use advanced reverse engineering to exploit Windows and Linux software * Bypass Windows Access Control and memory protection schemes * Scan for flaws in Web applications using Fiddler and the x5 plugin * Learn the use-after-free technique used in recent zero days * Bypass Web authentication via MySQL type conversion and MD5 injection attacks * Inject your shellcode into a browser's memory using the latest Heap Spray techniques * Hijack Web browsers with Metasploit and the BeEF Injection Framework * Neutralize ransomware before it takes control of your desktop * Dissect Android malware with JEB and DAD decompilers * Find one-day vulnerabilities with binary diffing
更多信息……
英语 [en] · EPUB · 16.8MB · 2015 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11065.0, final score: 17491.977
nexusstc/Gray Hat Hacking: The Ethical Hacker’s Handbook/13434be0d2b011ef12daf6c47f85b1a1.pdf
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims, Linda Martinez, Michael Baucom McGraw-Hill Osborne Media, 4, 2015
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook , Fourth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. Build and launch spoofing exploits with Ettercap and Evilgrade Induce error conditions and crash software using fuzzers Hack Cisco routers, switches, and network hardware Use advanced reverse engineering to exploit Windows and Linux software Bypass Windows Access Control and memory protection schemes Scan for flaws in Web applications using Fiddler and the x5 plugin Learn the use-after-free technique used in recent zero days Bypass Web authentication via MySQL type conversion and MD5 injection attacks Inject your shellcode into a browser's memory using the latest Heap Spray techniques Hijack Web browsers with Metasploit and the BeEF Injection Framework Neutralize ransomware before it takes control of your desktop Dissect Android malware with JEB and DAD decompilers Find one-day vulnerabilities with binary diffing
更多信息……
英语 [en] · PDF · 20.1MB · 2015 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17491.148
nexusstc/Gray Hat Hacking: The Ethical Hacker’s Handbook/3aa53a9d103456190f3b70a2006138ce.epub
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims, Linda Martinez, Michael Baucom McGraw-Hill Osborne Media, 4, 2015
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook , Fourth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. Build and launch spoofing exploits with Ettercap and Evilgrade Induce error conditions and crash software using fuzzers Hack Cisco routers, switches, and network hardware Use advanced reverse engineering to exploit Windows and Linux software Bypass Windows Access Control and memory protection schemes Scan for flaws in Web applications using Fiddler and the x5 plugin Learn the use-after-free technique used in recent zero days Bypass Web authentication via MySQL type conversion and MD5 injection attacks Inject your shellcode into a browser's memory using the latest Heap Spray techniques Hijack Web browsers with Metasploit and the BeEF Injection Framework Neutralize ransomware before it takes control of your desktop Dissect Android malware with JEB and DAD decompilers Find one-day vulnerabilities with binary diffing
更多信息……
英语 [en] · EPUB · 16.8MB · 2015 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17491.148
ia/forloveofgarlicc0000reno.pdf
For the love of-- garlic : the complete guide to garlic cuisine Renoux, Victoria Garden City Park, NY: Square One Publishers, Garden City Park, NY, New York State, 2005
<p>if You Have A Passion For The Robust Flavor And Pungent Aroma Of Garlic, Here Is A Book Guaranteed To Both Delight And Satisfy. If You Are Simply Interested In Learning More About This Amazingly Popular Plant, This Book Will Fascinate You With The Secrets Of Garlic's Centuries-old Magic. <i>for The Love Of Garlic</i> Is A Celebration Of An Astonishingly Versatile Food. It Explores Garlic's Past And Present, And Provides A Wide Variety Of Delicious Kitchen-tested Garlic Recipes Designed To Tempt Not Only Garlic Aficionados, But All Lovers Of Great Cuisine Part One Begins By Looking At The History, Lore, And Many Uses Of This Culinary Treasure. It Examines How Garlic's Active Compounds Have Been Proven To Heal Illness And Maintain Radiant Health. Also Included Is A Section On Growing And Buying This Gourmet Marvel. Part Two Indulges In The Tastes And Pleasures Of Garlic. The Author First Discusses Cooking Techniques And Special Utensils That Can Enhance The Use Of This Ingredient. She Then Offers Eighty-five Tempting Dishes That Will Allow You To Indulge All Your Garlic Fantasies. <p> Whether Given As A Gift Or Used As A Personal Reference, This Beautifully Designed And Illustrated Work Will Prove Itself To Be A Useful And Informative Guide Time And Time Again.</p> <h3>library Journal</h3> <p>does The Mention Of 40-clove Garlic Chicken Make Your Mouth Water? Are You Interested In Learning About The History And Healing Powers Of Garlic? Perhaps You'd Like To Know How To Throw A Garlic-tasting Party? If The Answer To These Questions Is Yes, Then Natural Foods Author Renoux (the Arrowhead Mills Cookbook) Has Written The Book For You. Much More Than A Cookbook, This Covers The History, Varieties, And Properties Of One Of The Most Popular Kitchen Ingredients. In Fact, Only About One Quarter Of The Text Is Recipes, So Those Looking Strictly For New Ways To Use The Pungent Herb Might Be Disappointed. The Recipes Included Are Mostly Easy-to-prepare Standards, Although Often With A Twist From A Unique Ingredient Or Two. An Example Of This Would Be Tabbouleh Made With Quinoa Rather Than The Usual Bulgur Wheat. All Recipes Emphasize Healthful, Fresh Ingredients And, Of Course, Lots Of Garlic. Overall, An Interesting Treatise On An Item Most Of Us Use But Probably Know Little About; Purchase For Larger Cookery Collections Or Where There Is Interest.-susan Hurst, Miami Univ. Of Ohio Libs., Oxford Copyright 2005 Reed Business Information.</p>
更多信息……
英语 [en] · PDF · 9.8MB · 2005 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17484.371
ia/museumsofcracow00stol.pdf
Museums of Cracow (Great Museums of the World) (English and Polish Edition) [introduction by Tadeusz Chruścicki; commentary texts by Franciszek Stolot; translation by Edward Rothert] Newsweek Books, Great museums of the world, Great museums of the world (Newsweek), New York, N.Y, New York State, 1982
A Pictorial Survey Of Selected Representative Works Of Art In The Collections Of The Various Museums Of Cracow. [introduction By Tadeusz Chruścicki ; Commentary Texts By Franciszek Stolot ; Translation By Edward Rothert]. Translation Of: Muzea Krakowa. Includes Indexes. Bibliography: P. 168.
更多信息……
英语 [en] · 波兰语 [pl] · PDF · 26.7MB · 1982 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17483.008
ia/museumsofcracow0000unse.pdf
Museums of Cracow (Great Museums of the World) (English and Polish Edition) [introduction by Tadeusz Chruścicki; commentary texts by Franciszek Stolot; translation by Edward Rothert] Newsweek Books, Great museums of the world, Great museums of the world (Newsweek), New York, N.Y, New York State, 1982
A Pictorial Survey Of Selected Representative Works Of Art In The Collections Of The Various Museums Of Cracow. [introduction By Tadeusz Chruścicki ; Commentary Texts By Franciszek Stolot ; Translation By Edward Rothert]. Translation Of: Muzea Krakowa. Includes Indexes. Bibliography: P. 168.
更多信息……
英语 [en] · 波兰语 [pl] · PDF · 26.0MB · 1982 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17482.957
upload/newsarch_ebooks_2025_10/2023/11/03/extracted__Ford_Bronco_The_Original_SUV.zip/Ford Bronco The Original SUV/Ford Bronco The Original SUV.epub
Ford Bronco : The Original SUV Pete Evanow, Shelby Hall Quarto Publishing Group USA, Quarto Publishing Group, [N.p.], 2023
From the first drawings in the early 1960s to today's uber-popular new Bronco, get the full story of Ford's legendary SUV in this stunningly illustrated volume. When Ford introduced the Bronco for the 1966 model year , its intent was to get a slice of the off-road and outdoor enthusiast utility market then owned by the popular Jeep CJ and International Harvester Scout. What Ford couldn't know at the time was that it was creating a legend—a rugged, square-shouldered vehicle that would exist in its original form through 1977 and in various guises for a further 20 years, wrapping up its first life in 1996. Since the Bronco's retirement, the SUV/crossover sector has become the dominant segment of the automotive market . Nearly all manufacturers—even exotics like Lamborghini and Bentley—offer SUVs in their line-ups. In fact, Ford has largely discontinued passenger vehicles (except the Mustang) in favor of trucks and SUVs. Simultaneously, the collector market has turned its eye to vintage SUVs and trucks , the former growing significantly over the past 5 years. Classic Broncos have doubled in value over that period, regularly selling at prices ranging from $40K to $100K. The story picks up in 2017 when Ford announced plans to revive one of its most hallowed nameplates: Bronco . Brilliantly styled to pick up the beloved, boxy cues of the original, customers began dropping deposits as soon as the order books opened. Ford still struggles to meet demand with speculators flipping new Broncos on the secondary market for thousands over invoice. Beautifully produced and expertly written, Ford Bronco is a must-have book for all Bronco and SUV enthusiasts .
更多信息……
英语 [en] · EPUB · 25.3MB · 2023 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload · Save
base score: 11065.0, final score: 17482.607
ia/identityconflict0000unse_e3r7.pdf
Identity, conflict, and cooperation : Central Europeans in Cleveland, 1850-1930 edited by David C. Hammack, Diane L. Grabowski, and John J. Grabowski Western Reserve Historical Society; Western Reserve Historical, 1st Edition, First Edition, PS, 2002
This book studies six groups of immigrants - from Croatia, the Czechlands, Hungary, Poland, Slovakia and Slovenia - in Cleveland, OH during the period 1870-1920. Based on research in many previously unexamined sources in many languages these studies provide the most detailed discussions yet written of these ethnic communities in Cleveland.
更多信息……
英语 [en] · PDF · 23.2MB · 2002 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17482.316
ia/roleoflawinpopul0000hamm.pdf
The role of law in population planning : working paper and proceedings of the Sixteenth Hammarskjöld Forum Donald H. Berman, author of the working paper. Donald T. Fox, editor Dobbs Ferry, N.Y., Published for the Association of the Bar of the City of New York by Oceana Publications, Hammarskjöld forums, 16, Dobbs Ferry, N.Y, 1972
The Working Paper : A Lawyer's View Of The Population Crisis -- The Forum Proceedings. Donald H. Berman, Author Of The Working Paper. Donald T. Fox, Editor. Bibliography: P. 69-85.
更多信息……
英语 [en] · PDF · 6.4MB · 1972 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17482.06
upload/newsarch_ebooks/2018/10/11/0761960171_The.pdf
The politics of English : a Marxist view of language Marnie Holborow; ProQuest (Firm) SAGE Publications Ltd, 1, 1999
`A very welcome and much-needed broadening of current theoretical perspectives' - **__Professor Norman Fairclough__** This book offers a major reappraisal of the role of language in the social world. Focusing on three main areas - the global spread of English; Standard English; and language and sexism - **The Politics of English**: examines World English in relation to international capitalism and colonialism; analyzes the ideological underpinnings of the debate about Standard English; and locates sexism in language as arising from social relations. Locating itself in the classical Marxist tradition, this book shows how language is both shaped by, and contributes to social life.
更多信息……
英语 [en] · PDF · 14.1MB · 1999 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11065.0, final score: 17481.518
upload/newsarch_ebooks_2025_10/2023/05/03/076196018X_The.pdf
The politics of English : a Marxist view of language Marnie Holborow; ProQuest (Firm) SAGE Publications Ltd, 1, PT, 1999
`A very welcome and much-needed broadening of current theoretical perspectives′ - Professor Norman Fairclough, University of Lancaster This book offers a major reappraisal of the role of language in the social world. Focusing on three main areas - the global spread of English; Standard English; and language and sexism - The Politics of English: examines World English in relation to international capitalism and colonialism; analyzes the ideological underpinnings of the debate about Standard English; and locates sexism in language as arising from social relations. Locating itself in the classical Marxist tradition, this book shows how language is both shaped by, and contributes to social life.
更多信息……
英语 [en] · PDF · 14.1MB · 1999 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11065.0, final score: 17481.518
lgli/K:/!genesis/!repository8/8/farway/Gray Hat Hacking The Ethical Hacker’s Handbook Fourth Edition 978-0-07-183238-0.pdf
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims, Linda Martinez, Michael Baucom McGraw Hill, 4, 2015
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, andcyber law are thoroughly covered in this state-of-the-art resource. Build and launch spoofing exploits with Ettercap and Evilgrade Induce error conditions and crash software using fuzzers Hack Cisco routers, switches, and network hardware Use advanced reverse engineering to exploit Windows and Linux software Bypass Windows Access Control and memory protection schemes Scan for flaws in Web applications using Fiddler and the x5 plugin Learn the use-after-free technique used in recent zero days Bypass Web authentication via MySQL type conversion and MD5 injection attacks Inject your shellcode into a browser's memory using the latest Heap Spray techniques Hijack Web browsers with Metasploit and the BeEF Injection Framework Neutralize ransomware before it takes control of your desktop Dissect Android malware with JEB and DAD decompilers Find one-day vulnerabilities with binary diffing
更多信息……
英语 [en] · PDF · 16.9MB · 2015 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17479.041
upload/bibliotik/0_Other/2/2015 Daniel Regalado etal - Gray Hat Hacking the Ethical Hackers Handbook[4thED]_Rsbl.epub
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition Shon Harris; Allen Harper; Chris Eagle; Jonathan Ness; Branko Spasojevic; Daniel Regalado; Michael Baucom; Ryan Linn McGraw-Hill School Education Group, 4 Edition, 2015
The latest strategies for vulnerability discovery and exploitation, mobile security, malware analysis, and reverse engineering Fully updated throughout and featuring 13 entirely new chapters, "Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition" reveals how to thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Hacking-related law and ethics are discussed in detail. You'll learn how to defend against the latest vulnerabilities in browsers, mobile devices, routers, web apps, and Linux and Windows operating systems. The book explains how to automate Metasploit to speed up the penetration testing process and how to dissect malicious Android apps, rootkits, 64-bit binaries, and botnets. Features 13 all-new chapters New topics covered include intelligent fuzzing, spoofing-based attacks, exploiting Cisco routers, mobile devices and web apps, advanced client-side exploitation, Android malware dissection, and kernel-mode rootkit dissection Explains the most advanced hacking techniques such as fuzzing, Java and Adobe Sandbox bypassing, IE use-after-free exploitation, and DEP/ASLR/SEHOP bypassing Covers emerging trends in malware such as Stuxnet, Android, Botnets, and 64-bit malicious binaries Based on courses taught by the authors and professional experience gained through real-world engagements
更多信息……
英语 [en] · EPUB · 143.6MB · 2015 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11065.0, final score: 17478.293
lgli/Daniel Regalado & Shon Harris & Ryan Linn [Regalado, Daniel & Harris, Shon & Linn, Ryan] - Gray Hat Hacking the Ethical Hacker's Handbook, Fourth Edition (2015, McGraw-Hill Education).pdf
Gray Hat Hacking the Ethical Hacker's Handbook, Fourth Edition Daniel Regalado & Shon Harris & Ryan Linn [Regalado, Daniel & Harris, Shon & Linn, Ryan] McGraw-Hill School Education Group, McGraw Hill LLC Professional Division, [N.p.], 2015
Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource.Build and launch spoofing exploits with Ettercap and EvilgradeInduce error conditions and crash software using fuzzersHack Cisco routers, switches, and network hardwareUse advanced reverse engineering to exploit Windows and Linux softwareBypass Windows Access Control and memory protection schemesScan for flaws in Web applications using Fiddler and the x5 pluginLearn the use-after-free technique used in recent zero daysBypass Web authentication via MySQL type conversion and MD5 injection attacksInject your shellcode into a browser's memory using the latest Heap Spray techniquesHijack Web browsers with Metasploit and the BeEF Injection FrameworkNeutralize ransomware before it takes control of your desktopDissect Android malware with JEB and DAD decompilersFind one-day vulnerabilities with binary diffing**About the AuthorDaniel Regalado, aka Danux, CISSP®, OSCP, OSCE, CREA, is a senior malware and vulnerability researcher at FireEye.Shon Harris, CISSP, was the CEO and founder of Logical Security.Allen Harper, CISSP, PCI QSA, is the executive vice president of Tangible Security.Chris Eagle is a senior lecturer in the Computer Science Department at the Naval Postgraduate School.Jonathan Ness, CHFITM, is a lead software security engineer in Microsoft’s Security Response Center.Branko Spasojevic is a security engineer at Google.Ryan Linn, CISSP, CSSLP®, OSCE, is a managing consultant working on network penetration testing.Stephen Sims is a senior instructor and course author with the SANS Institute.
更多信息……
英语 [en] · PDF · 33.8MB · 2015 · 📘 非小说类图书 · 🚀/lgli/zlib · Save
base score: 11068.0, final score: 17477.717
lgli/Daniel Regalado & Shon Harris & Allen Harper & Chris Eagle & Jonathan Ness & Branko Spasojevic & Ryan Linn & Stephen Sims [Regalado, Daniel] - Gray Hat Hacking The Ethical Hacker\'s Handbook - PDFDrive.com (2015, McGraw-Hill Education).pdf
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition Daniel Regalado & Shon Harris & Allen Harper & Chris Eagle & Jonathan Ness & Branko Spasojevic & Ryan Linn & Stephen Sims [Regalado, Daniel] McGraw-Hill School Education Group, McGraw Hill LLC Professional Division, [N.p.], 2015
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook , Fourth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. Build and launch spoofing exploits with Ettercap and Evilgrade Induce error conditions and crash software using fuzzers Hack Cisco routers, switches, and network hardware Use advanced reverse engineering to exploit Windows and Linux software Bypass Windows Access Control and memory protection schemes Scan for flaws in Web applications using Fiddler and the x5 plugin Learn the use-after-free technique used in recent zero days Bypass Web authentication via MySQL type conversion and MD5 injection attacks Inject your shellcode into a browser's memory using the latest Heap Spray techniques Hijack Web browsers with Metasploit and the BeEF Injection Framework Neutralize ransomware before it takes control of your desktop Dissect Android malware with JEB and DAD decompilers Find one-day vulnerabilities with binary diffing
更多信息……
英语 [en] · PDF · 34.2MB · 2015 · 📘 非小说类图书 · 🚀/lgli/zlib · Save
base score: 11068.0, final score: 17477.62
upload/bibliotik/0_Other/2/2015 Daniel Regalado etal - Gray Hat Hacking the Ethical Hackers Handbook[4thED]_Rsbl.pdf
Gray Hat Hacking: The Ethical Hacker’s Handbook: Fourth Edition Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims, Linda Martinez, Michael Baucom McGraw-Hill Osborne Media, Fourth edition, New York, New York, 2015
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook , Fourth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. Build and launch spoofing exploits with Ettercap and Evilgrade Induce error conditions and crash software using fuzzers Hack Cisco routers, switches, and network hardware Use advanced reverse engineering to exploit Windows and Linux software Bypass Windows Access Control and memory protection schemes Scan for flaws in Web applications using Fiddler and the x5 plugin Learn the use-after-free technique used in recent zero days Bypass Web authentication via MySQL type conversion and MD5 injection attacks Inject your shellcode into a browser's memory using the latest Heap Spray techniques Hijack Web browsers with Metasploit and the BeEF Injection Framework Neutralize ransomware before it takes control of your desktop Dissect Android malware with JEB and DAD decompilers Find one-day vulnerabilities with binary diffing
更多信息……
英语 [en] · PDF · 18.1MB · 2015 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11065.0, final score: 17476.795
nexusstc/Организация, нормирование и оплата труда в строительстве. Методические указания к курсовой работе/e401633c8e81ed9a67ed94900ee7db6c.pdf
Организация, нормирование и оплата труда в строительстве. Методические указания к курсовой работе Коллектив авторов АйПиЭр, 2017
Sandplay is a growing field of interest for Jungian and other psychotherapists. This volume provides an introduction to sandplay as well as material for those already using this form of therapy. Based on the authors' clinical work, it includes in-depth sandplay case history material from a wide range of adults and children, detailed notes on interpretation of sand trays and examination of symbols and concepts used in sandplay. The text also provides historical background for understanding sandplay as well as discussion of how it works in a clinical context
更多信息……
俄语 [ru] · 英语 [en] · PDF · 2.3MB · 2017 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17476.771
nexusstc/Gray Hat Hacking: The Ethical Hacker's Handbook 4th Edition/62356275a5d7c35bda36319c1ca47349.pdf
Gray Hat Hacking: The Ethical Hacker's Handbook 4th Edition Shon Harris, Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle, Jonathan Ness McGraw-Hill Osborne Media, 4, 2015
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. Build and launch spoofing exploits with Ettercap and Evilgrade Induce error conditions and crash software using fuzzers Hack Cisco routers, switches, and network hardware Use advanced reverse engineering to exploit Windows and Linux software Bypass Windows Access Control and memory protection schemes Scan for flaws in Web applications using Fiddler and the x5 plugin Learn the use-after-free technique used in recent zero days Bypass Web authentication via MySQL type conversion and MD5 injection attacks Inject your shellcode into a browser's memory using the latest Heap Spray techniques Hijack Web browsers with Metasploit and the BeEF Injection Framework Neutralize ransomware before it takes control of your desktop Dissect Android malware with JEB and DAD decompilers Find one-day vulnerabilities with binary diffing 1 online resource (1 volume) : This fourth edition explains the enemy's current weapons, skills, and tactics, and offers field-tested remedies, case studies, and ready-to-deploy testing labs. You will learn how to build and launch spoofing exploits with Ettercap and Evilgrade; induce error conditions and crash software using fuzzers; hack Cisco routers, switches, and network hardware; use advanced reverse engineering to exploit Windows and Linux software; bypass Windows Access Control and memory protection schemes; scan for flaws in Web applications; utilize use-after-free technique used in recent zero days; bypass Web authentication; inject your shellcode into a browser's memory using the latest Heap Spray techniques; hijack Web browsers with Metasploit and the BeEF Injection Framework; neutralize ransomware before it takes control of your desktop; dissect Android malware with JEB and DAD decompilers; and find one-day vulnerabilities with binary diffing. -- Description based on print version record Includes bibliographical references and index Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Acknowledgments -- Introduction -- Part I Crash Course: Preparing for the War -- Chapter 1 Ethical Hacking and the Legal System -- Why You Need to Understand Your Enemy's Tactics -- Recognizing Trouble When It Happens -- The Ethical Hacking Process -- The Penetration Testing Process -- What Would an Unethical Hacker Do Differently? -- The Rise of Cyberlaw -- Understanding Individual Cyberlaws -- The Controversy of "Hacking" Tools -- Vulnerability Disclosure -- Different Teams and Points of View How Did We Get Here? -- CERT's Current Process -- Organization for Internet Safety -- Conflicts Will Still Exist -- "No More Free Bugs" -- Bug Bounty Programs -- Summary -- References -- For Further Reading -- Chapter 2 Programming Survival Skills -- C Programming Language -- Basic C Language Constructs -- Sample Program -- Compiling with gcc -- Computer Memory -- Random Access Memory (RAM) -- Endian -- Segmentation of Memory -- Programs in Memory -- Buffers -- Strings in Memory -- Pointers -- Putting the Pieces of Memory Together -- Intel Processors -- Registers -- Assembly Language Basics Machine vs. Assembly vs. C -- AT&T vs. NASM -- Addressing Modes -- Assembly File Structure -- Assembling -- Debugging with gdb -- gdb Basics -- Disassembly with gdb -- Python Survival Skills -- Getting Python -- Hello World in Python -- Python Objects -- Strings -- Numbers -- Lists -- Dictionaries -- Files with Python -- Sockets with Python -- Summary -- References -- For Further Reading -- Chapter 3 Static Analysis -- Ethical Reverse Engineering -- Why Bother with Reverse Engineering? -- Reverse Engineering Considerations -- Source Code Analysis -- Source Code Auditing Tools The Utility of Source Code Auditing Tools -- Manual Source Code Auditing -- Automated Source Code Analysis -- Binary Analysis -- Manual Auditing of Binary Code -- Automated Binary Analysis Tools -- Summary -- For Further Reading -- Chapter 4 Advanced Analysis with IDA Pro -- Static Analysis Challenges -- Stripped Binaries -- Statically Linked Programs and FLAIR -- Data Structure Analysis -- Quirks of Compiled C++ Code -- Extending IDA Pro -- Scripting in IDAPython -- Example 4-1: Decrypting Strings in Place -- Executing Python Code -- Summary -- For Further Reading -- Chapter 5 World of Fuzzing Introduction to Fuzzing -- Choosing a Target -- Input Types -- Ease of Automation -- Complexity -- Types of Fuzzers -- Mutation Fuzzers -- Generation Fuzzers -- Getting Started -- Finding the Fuzzing Templates -- Lab 5-1: Collecting Samples from the Internet Archive -- Choosing the Optimal Template Set with Code Coverage -- Lab 5-2: Selecting the Best Samples for Fuzzing -- Peach Fuzzing Framework -- Peach Fuzzing Strategies -- Speed Does Matter -- Crash Analysis -- Lab 5-3: Mutation Fuzzing with Peach -- Other Mutation Fuzzers -- Generation Fuzzers -- Summary -- For Further Reading”
更多信息……
英语 [en] · PDF · 38.7MB · 2015 · 📘 非小说类图书 · 🚀/ia/lgli/lgrs/nexusstc · Save
base score: 11068.0, final score: 17476.377
upload/trantor/en/Regalado, Daniel/Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition.epub
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims, Linda Martinez, Michael Baucom McGraw-Hill School Education Group, 4th edition, 2015
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook , Fourth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. Build and launch spoofing exploits with Ettercap and Evilgrade Induce error conditions and crash software using fuzzers Hack Cisco routers, switches, and network hardware Use advanced reverse engineering to exploit Windows and Linux software Bypass Windows Access Control and memory protection schemes Scan for flaws in Web applications using Fiddler and the x5 plugin Learn the use-after-free technique used in recent zero days Bypass Web authentication via MySQL type conversion and MD5 injection attacks Inject your shellcode into a browser's memory using the latest Heap Spray techniques Hijack Web browsers with Metasploit and the BeEF Injection Framework Neutralize ransomware before it takes control of your desktop Dissect Android malware with JEB and DAD decompilers Find one-day vulnerabilities with binary diffing. Read more... Abstract: Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook , Fourth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. Build and launch spoofing exploits with Ettercap and Evilgrade Induce error conditions and crash software using fuzzers Hack Cisco routers, switches, and network hardware Use advanced reverse engineering to exploit Windows and Linux software Bypass Windows Access Control and memory protection schemes Scan for flaws in Web applications using Fiddler and the x5 plugin Learn the use-after-free technique used in recent zero days Bypass Web authentication via MySQL type conversion and MD5 injection attacks Inject your shellcode into a browser's memory using the latest Heap Spray techniques Hijack Web browsers with Metasploit and the BeEF Injection Framework Neutralize ransomware before it takes control of your desktop Dissect Android malware with JEB and DAD decompilers Find one-day vulnerabilities with binary diffing
更多信息……
英语 [en] · EPUB · 16.8MB · 2015 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11065.0, final score: 17475.979
upload/bibliotik/0_Other/2/2015 Daniel Regalado etal - Gray Hat Hacking the Ethical Hackers Handbook[4thED]_Rsbl.azw3
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition Regalado, Daniel, Harris, Shon, Harper, Allen, Eagle, Chris, Ness, Jonathan, Spasojevic, Branko, Linn, Ryan, Sims, Stephen McGraw-Hill School Education Group, 4th edition, 2015
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook , Fourth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. Build and launch spoofing exploits with Ettercap and Evilgrade Induce error conditions and crash software using fuzzers Hack Cisco routers, switches, and network hardware Use advanced reverse engineering to exploit Windows and Linux software Bypass Windows Access Control and memory protection schemes Scan for flaws in Web applications using Fiddler and the x5 plugin Learn the use-after-free technique used in recent zero days Bypass Web authentication via MySQL type conversion and MD5 injection attacks Inject your shellcode into a browser's memory using the latest Heap Spray techniques Hijack Web browsers with Metasploit and the BeEF Injection Framework Neutralize ransomware before it takes control of your desktop Dissect Android malware with JEB and DAD decompilers Find one-day vulnerabilities with binary diffing
更多信息……
英语 [en] · AZW3 · 58.0MB · 2015 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
base score: 11055.0, final score: 17475.504
lgli/D:\!genesis\library.nu\bd\_153079.bd2edd38f067f4c02490f0a4aca2a5bb.pdf
Privatization and Regulation of Transport Infrastructure Privatizacion de Infraestructuras de transporte: Guidelines for Policymakers Regulators Una Guia Para Reguladores (Spanish Edition) Antonio Estache; Ginés de Rus Mendoza World Bank Publications, Independent Publishers Group, Bogotá, Colombia, 2003
'Economía internacional'--P. [i].
更多信息……
西班牙语 [es] · PDF · 0.8MB · 2003 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11055.0, final score: 17474.678
lgli/Cs_Computer science/CsLn_Lecture notes/F/Formal Methods Foundations and Applications, 13 conf., SBFM 2010 (LNCS6527, Springer, 2011)(ISBN 9783642198281)(O)(299s)_CsLn_.pdf
Formal methods: foundations and applications : 13th Brazilian Symposium on Formal Methods, SBMF 2010, Natal, Brazil, November 8-11, 2010 : revised selected papers Michael Leuschel, Jens Bendisposto (auth.), Jim Davies, Leila Silva, Adenilso Simao (eds.) Springer-Verlag Berlin Heidelberg, Lecture Notes in Computer Science, Lecture Notes in Computer Science 6527 : Programming and Software Engineering, 1, 2011
This book constitutes the thoroughly refereed post-conference proceedings of the 13th Brazilian Symposium on Formal Methods, SBMF 2010, held in Natal, Brazil, in November 2010. The 18 revised full papers were carefully reviewed and selected from 55 submissions. The papers presented cover a broad range of foundational and methodological issues in formal methods for the design and analysis of software and hardware systems as well as applications in various domains. Erscheinungsdatum: 23.03.2011
更多信息……
英语 [en] · PDF · 4.6MB · 2011 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/scihub/zlib · Save
base score: 11065.0, final score: 17473.426
nexusstc/Formal Methods: Foundations and Applications: 13th Brazilian Symposium on Formal Methods, SBMF 2010, Natal, Brazil, November 8-11, 2010, Revised Selected Papers/792bdf51c610277b65f1c8c41abeeecc.pdf
Formal methods: foundations and applications : 13th Brazilian Symposium on Formal Methods, SBMF 2010, Natal, Brazil, November 8-11, 2010 : revised selected papers Michael Leuschel, Jens Bendisposto (auth.), Jim Davies, Leila Silva, Adenilso Simao (eds.) Springer-Verlag Berlin Heidelberg, Lecture Notes in Computer Science, Lecture Notes in Computer Science 6527 : Programming and Software Engineering, 1, 2011
This book constitutes the thoroughly refereed post-conference proceedings of the 13th Brazilian Symposium on Formal Methods, SBMF 2010, held in Natal, Brazil, in November 2010. The 18 revised full papers were carefully reviewed and selected from 55 submissions. The papers presented cover a broad range of foundational and methodological issues in formal methods for the design and analysis of software and hardware systems as well as applications in various domains. Erscheinungsdatum: 23.03.2011
更多信息……
英语 [en] · PDF · 4.9MB · 2011 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/scihub/zlib · Save
base score: 11065.0, final score: 17473.354
upload/newsarch_ebooks_2025_10/2023/09/26/3642198287_Formal.pdf
Formal methods: foundations and applications : 13th Brazilian Symposium on Formal Methods, SBMF 2010, Natal, Brazil, November 8-11, 2010 : revised selected papers Michael Leuschel, Jens Bendisposto (auth.), Jim Davies, Leila Silva, Adenilso Simao (eds.) Springer-Verlag Berlin Heidelberg, Lecture Notes in Computer Science, Lecture Notes in Computer Science 6527 : Programming and Software Engineering, 1, 2011
This book constitutes the thoroughly refereed post-conference proceedings of the 13th Brazilian Symposium on Formal Methods, SBMF 2010, held in Natal, Brazil, in November 2010. The 18 revised full papers were carefully reviewed and selected from 55 submissions. The papers presented cover a broad range of foundational and methodological issues in formal methods for the design and analysis of software and hardware systems as well as applications in various domains. Erscheinungsdatum: 23.03.2011
更多信息……
英语 [en] · PDF · 5.7MB · 2011 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/scihub/upload/zlib · Save
base score: 11065.0, final score: 17473.121
nexusstc/Nothing but Prairie and Sky: Life on the Dakota Range in the Early Days (Western Frontier Library)/fea96db0d9d0265f20c6c16fbef82cdd.epub
Nothing but Prairie and Sky: Life on the Dakota Range in the Early Days (The Western frontier library ; v. 45) recorded by Walker D. Wyman from the original notes of Bruce Siberts; foreword by Gilbert C. Fite University of Oklahoma Press, The Western frontier library ;, v. 45, Western frontier library ;, 45., Norman, Oklahoma, 1988
Includes index.
更多信息……
英语 [en] · EPUB · 1.5MB · 1988 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17471.096
ia/politicsofenglis0000holb.pdf
The politics of English : a Marxist view of language Marnie Holborow; ProQuest (Firm) SAGE Publications Ltd, Sage Publications, Ltd., London, 1999
`A very welcome and much-needed broadening of current theoretical perspectives′ - Professor Norman Fairclough, University of Lancaster This book offers a major reappraisal of the role of language in the social world. Focusing on three main areas - the global spread of English; Standard English; and language and sexism - The Politics of English: examines World English in relation to international capitalism and colonialism; analyzes the ideological underpinnings of the debate about Standard English; and locates sexism in language as arising from social relations. Locating itself in the classical Marxist tradition, this book shows how language is both shaped by, and contributes to social life.
更多信息……
英语 [en] · PDF · 13.5MB · 1999 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17468.014
nexusstc/19 Ways of Looking at Wang Wei/f65edfe78a87b2bbf9c09f1e024bcf96.pdf
19 Ways of Looking at Wang Wei: How a Chinese Poem is Translated exhibit & commentary by Eliot Weinberger; further comments by Octavio Paz Asphodel Press, 1st, First Edition, US, 1995
<p>Nineteen different translations of a single poem with comments on each version by Eliot Weinberger and introduction contributed by Octavio Paz.</p>
更多信息……
英语 [en] · PDF · 2.8MB · 1995 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 17465.158
upload/motw_shc_2025_10/shc/The Poetics of Digital Media - Paul Frosh.pdf
The Poetics of Digital Media Paul Frosh Polity Press, John Wiley & Sons, Inc., Cambridge, UK, 2019
Media are poetic forces. They produce and reveal worlds, representing them to our senses and connecting them to our lives. While the poetic powers of media are perceptual, symbolic, social and technical, they are also profoundly moral and existential. They matter for how we reflect upon and act in a shared, everyday world of finite human existence. The Poetics of Digital Media  explores the poetic work of media in digital culture. Developing an argument through close readings of overlooked or denigrated media objects – screenshots, tagging, selfies and more – the book reveals how media shape the taken-for-granted structures of our lives, and how they disclose our world through sudden moments of visibility and tangibility. Bringing us face to face with the conditions of our existence, it investigates how the ‘given’ world we inhabit is given through media. This book is important reading for students and scholars of media theory, philosophy of media, visual culture and media aesthetics. ** Review ‘ The Poetics of Digital Media  is a ground-breaking contribution to the study of digital media as a technological, social and symbolic environment. It will be a key point of reference in the study of digital culture for years to come.' Lilie Chouliaraki , London School of Economics and Political Science ‘When I find myself puzzled by some weird thing in digital visual culture, Paul Frosh is my go-to thinker. This book counters the wide suspicion that poetics is formalist or frivolous and shows how the deepest questions of justice, ethics and the public world are poetic ones. It is a guide for the perplexed in these digital times.’ John Durham Peters , Yale University About the Author Paul Frosh  is Professor of Communication at the Hebrew University of Jerusalem.
更多信息……
英语 [en] · PDF · 4.5MB · 2019 · 📗 未知类型的图书 · 🚀/upload · Save
base score: 10968.0, final score: 17416.28
hathi/osu/pairtree_root/32/43/50/29/35/64/58/32435029356458/32435029356458.zip
dos Kapital : ḳriṭiḳ fun der poliṭisher eḳonomie / fun Ḳarl Marks ; ibergezetsṭ fun Y.A. Merison. Marx, Karl, 1818-1883. Ḳropoṭḳin Liṭeraṭur Gezelshafṭ, 1917-1918., New York State, 1918
意第绪语 [yi] · ZIP · 0.5MB · 1918 · 📗 未知类型的图书 · 🚀/hathi · Save
base score: 10932.0, final score: 17415.738
hathi/mdp/pairtree_root/39/01/50/21/27/90/40/39015021279040/39015021279040.zip
dos Kapital : ḳriṭiḳ fun der poliṭisher eḳonomie / fun Ḳarl Marks ; ibergezetsṭ fun Y.A. Merison. Marx, Karl, 1818-1883. Ḳropoṭḳin Liṭeraṭur Gezelshafṭ, 1917-1918., New York State, 1918
意第绪语 [yi] · ZIP · 0.6MB · 1918 · 📗 未知类型的图书 · 🚀/hathi · Save
base score: 10932.0, final score: 17414.117
upload/motw_shc_2025_10/shc/The Poetics of Digital Media - Paul Frosh.epub
The Poetics of Digital Media Paul Frosh; Polity Press, John Wiley & Sons, Inc., Cambridge, UK, 2019
Media are poetic forces. They produce and reveal worlds, representing them to our senses and connecting them to our lives. While the poetic powers of media are perceptual, symbolic, social and technical, they are also profoundly moral and existential. They matter for how we reflect upon and act in a shared, everyday world of finite human existence. The Poetics of Digital Media  explores the poetic work of media in digital culture. Developing an argument through close readings of overlooked or denigrated media objects – screenshots, tagging, selfies and more – the book reveals how media shape the taken-for-granted structures of our lives, and how they disclose our world through sudden moments of visibility and tangibility. Bringing us face to face with the conditions of our existence, it investigates how the ‘given’ world we inhabit is given through media. This book is important reading for students and scholars of media theory, philosophy of media, visual culture and media aesthetics. ** Review ‘ The Poetics of Digital Media  is a ground-breaking contribution to the study of digital media as a technological, social and symbolic environment. It will be a key point of reference in the study of digital culture for years to come.' Lilie Chouliaraki , London School of Economics and Political Science ‘When I find myself puzzled by some weird thing in digital visual culture, Paul Frosh is my go-to thinker. This book counters the wide suspicion that poetics is formalist or frivolous and shows how the deepest questions of justice, ethics and the public world are poetic ones. It is a guide for the perplexed in these digital times.’ John Durham Peters , Yale University About the Author Paul Frosh  is Professor of Communication at the Hebrew University of Jerusalem.
更多信息……
英语 [en] · EPUB · 0.9MB · 2019 · 📗 未知类型的图书 · 🚀/upload · Save
base score: 10963.0, final score: 17412.295
hathi/uc1/pairtree_root/b4/51/77/70/b4517770/b4517770.zip
Die ausbreitungspolitik der Vereinigten Staaten von Amerika,von E. Kimpen. Kimpen, E. Deutsche verlags-anstalt, 1923., Germany, 1923
德语 [de] · ZIP · 0.7MB · 1923 · 📗 未知类型的图书 · 🚀/hathi · Save
base score: 10932.0, final score: 17407.418
hathi/msu/pairtree_root/31/29/31/02/10/58/67/31293102105867/31293102105867.zip
Notes on the Bedouins and Wahábys / collected during his travels in the East by John Lewis Burckhardt. Burckhardt, John Lewis, 1784-1817. Johnson Reprint, 1967., New York State, 1967
英语 [en] · ZIP · 0.6MB · 1967 · 📗 未知类型的图书 · 🚀/hathi · Save
base score: 10937.0, final score: 17406.248
hathi/mdp/pairtree_root/39/01/50/21/27/88/69/39015021278869/39015021278869.zip
dos Kapital : ḳriṭiḳ fun der poliṭisher eḳonomie / fun Ḳarl Marks ; ibergezetsṭ fun Y.A. Merison. Marx, Karl, 1818-1883. Ḳropoṭḳin Liṭeraṭur Gezelshafṭ, 1917-1918., New York State, 1918
意第绪语 [yi] · ZIP · 0.5MB · 1918 · 📗 未知类型的图书 · 🚀/hathi · Save
base score: 10932.0, final score: 17399.527
hathi/osu/pairtree_root/32/43/50/29/35/64/66/32435029356466/32435029356466.zip
dos Kapital : ḳriṭiḳ fun der poliṭisher eḳonomie / fun Ḳarl Marks ; ibergezetsṭ fun Y.A. Merison. Marx, Karl, 1818-1883. Ḳropoṭḳin Liṭeraṭur Gezelshafṭ, 1917-1918., New York State, 1918
意第绪语 [yi] · ZIP · 0.5MB · 1918 · 📗 未知类型的图书 · 🚀/hathi · Save
base score: 10932.0, final score: 17399.47
hathi/mdp/pairtree_root/39/01/50/49/57/64/01/39015049576401/39015049576401.zip
dos Kapital : ḳriṭiḳ fun der poliṭisher eḳonomie / fun Ḳarl Marks ; ibergezetsṭ fun Y.A. Merison. Marx, Karl, 1818-1883. Ḳropoṭḳin Liṭeraṭur Gezelshafṭ, 1917-1918., New York State, 1918
意第绪语 [yi] · ZIP · 0.5MB · 1918 · 📗 未知类型的图书 · 🚀/hathi · Save
base score: 10932.0, final score: 17399.27
上一页 1 下一页
上一页 1 下一页
安娜的档案
主页
搜索
捐赠
🧬 SciDB
常问问题
账户
登录 / 注册
账户
公开资料
已下载文件
我的捐赠
Referrals
Explore
活动
代码浏览器
ISBN Visualization ↗
Community Projects ↗
Open data
数据集
种子
大语言模型数据
关注我们
联系邮箱
安娜的博客 ↗
Reddit ↗
Matrix ↗
Help out
改进元数据
志愿服务与悬赏
翻译 ↗
Development
安娜的软件 ↗
安全性
数字千年版权法(DCMA)/ 版权声明
镜像
annas-archive.li ↗
annas-archive.pm ↗
annas-archive.in ↗
SLUM [无关联] ↗
SLUM 2 [无关联] ↗