Reference Library
26.5K subscribers
1K photos
122 videos
343K files
10.3K links
کتابخانه مرجع
مرجع تخصصی کتاب

لینک چنل آرشیو کتب:
@BOOKzMA
Download Telegram
پودمان_دوم_صورت_های_مالی_استان_اصفهان.pdf
1.5 MB
#سوال
#پودمان٢
#صورتهاي_مالي

کاری از :خانم محمدي
استان اصفهان
کانال رسمی گام به گام فنی🔧
1_4943160972878545053.rar
1.3 MB
گام به گام یازدهم حسابداری اموال و انبار📚

کانال رسمی گام به گام فنی
@gambegam_darsi.pdf
17.1 MB
#گام_به_گام حسابداری حقوق و دستمزد
#یازدهم_حسابداری
از ابتدا تا انتهای کتاب

کانال رسمی گام به گام فنی🛠

🆔
4_5987805746362845068.pdf
20.2 MB
گام به گام حقوق و دستمزد
یازدهم حسابداری
4_5902214654540646231.pdf
17.1 MB
گام به گام حقوق و دستمزد
یازدهم حسابداری
وجوه نقد پودمان 5.pdf
388.8 KB
📚📚📚
#نمونه_سوال
#وجوه_نقد
#پودمان۵

کانال رسمی گام به گام فنی🔧
فرمول های دهم.pdf
1.1 MB
کل فرمول های فیزیک دهم تجربی📖🔍

#نکات_فیزیک #فیزیک_دهم #فرمول_فیزیک

برا دوستاتم بفرس📲
UbSym.pdf
978.5 KB
"A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes", 2022.

Memory corruption vulnerabilities are prevalent and detrimental software weaknesses, which potentially occur when programming with low-level languages (usually C and C++).

]-> Tool: https://github.com/SoftwareSecurityLab/UbSym

📚 t.iss.one/Library_Sec
D2T1_Smart_Speaker_Shenanigans_Making_the_SONOS_One_Sing_Its_Secrets.pdf
19.2 MB
SMART SPEAKER SHENANIGANS:
MAKING THE SONOS ONE SING ITS SECRETS

📚 t.iss.one/Library_Sec
L2Fuzz.pdf
3.3 MB
#Fuzzing
"L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing", 2022.

Bluetooth is a wireless communication technology that al￾lows users to exchange various data in a short range, including Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) and
Bluetooth Low Energy (BLE). Owing to their convenience, billions of devices have adopted Bluetooth technologies .

]-> A stateful fuzzer to detect vulnerabilities in Bluetooth BR/EDR LLC/L2CAP:
https://github.com/haramel/l2fuzz

📚
LibDB.pdf
1 MB
#Sec_code_review
"LibDB: An Effective and Efficient Framework for Detecting Third-Party Libraries in Binaries", 2022.

Third-party libraries (TPLs) are important components of modern
software systems. They are reused frequently during software de velopment . Open-source repository platforms and package management systems are the major sources of third-party libraries.
However, security issues of the third-party code continue to arise.
Vulnerabilities in well-known third-party libraries, such as the
Heartbleed bug, could bring security threats to millions of devices. In addition, non-compliant reuse, which is a violation of legal software licenses, could lead to costly commercial disputes. Unfortunately, many developers do not pay sufficient attention to the code that is imported from third-party libraries.


]-> Datasets and source code:
https://github.com/DeepSoftwareAnalytics/LibDB

📚
Exploits_GitHub.pdf
978 KB
"How security professionals are being attacked: A study of malicious CVE proof of concept exploits in GitHub", 2022.

CVE, which stands for Common Vulnerabilities and Expo￾sures1, is a list of publicly disclosed security flaws in software or systems, which have been assigned individual CVE IDs.

]-> Tool: https://github.com/SoftwareSecurityLab/UbSym

📚