Embracing an Adversarial Mindset for Cpp Security
CLFS_LOG_ID cidLog; ULONGLONG rgClientSymTbl[CLIENT_SYMTBL_SIZE]; ULONGLONG rgContainerSymTbl[CONTAINER_SYMTBL_SIZE]; ULONGLONG rgSecuritySymTbl[SHARED_SECURITY_SYMTBL_SIZE]; ULONG cNextContainer; gets treated as a real one. _CLFS_CONTAINER_CONTEXT stored in base log files and contains a field for storing a kernel pointer. typedef struct _CLFS_CONTAINER_CONTEXT { CLFS_NODE_ID cidNode; CLFS_CONTAINER_ID cidContainer; CLFS_CONTAINER_ID cidQueue; union { CClfsContainer* pContainer; ULONGLONG ullAlignment; }; CLFS_USN usnCurrent; CLFS_CONTAINER_STATE0 码力 | 92 页 | 3.67 MB | 5 月前3Conan 2.10 Documentation
more: creating and hosting your own Conan Center binaries This can also protect against transient network issues, and issues caused by transfer of binary data from external sources. These recommendations library as an example, which provides several components such as algorithms, ai, rendering, and network. Both ai and rendering depend on the algorithms component. Please, first clone the sources to recreate conanfile.py include ai.h algorithms.h network.h rendering.h src (continues on next page) 191 Conan Documentation, Release 2.10.1 algorithms ai rendering network Fig. 1: components of the game-engine0 码力 | 803 页 | 5.02 MB | 10 月前3Conan 2.3 Documentation
more: creating and hosting your own Conan Center binaries This can also protect against transient network issues, and issues caused by transfer of binary data from external sources. These recommendations library as an example, which provides several components such as algorithms, ai, rendering, and network. Both ai and rendering depend on the algorithms component. Please, first clone the sources to recreate conanfile.py include ai.h algorithms.h network.h rendering.h src (continues on next page) 183 Conan Documentation, Release 2.3.2 algorithms ai rendering network Fig. 1: components of the game-engine0 码力 | 748 页 | 4.65 MB | 1 年前3Conan 2.5 Documentation
more: creating and hosting your own Conan Center binaries This can also protect against transient network issues, and issues caused by transfer of binary data from external sources. These recommendations library as an example, which provides several components such as algorithms, ai, rendering, and network. Both ai and rendering depend on the algorithms component. Please, first clone the sources to recreate conanfile.py include ai.h algorithms.h network.h rendering.h src (continues on next page) 185 Conan Documentation, Release 2.5.0 algorithms ai rendering network Fig. 1: components of the game-engine0 码力 | 769 页 | 4.70 MB | 1 年前3Conan 2.4 Documentation
more: creating and hosting your own Conan Center binaries This can also protect against transient network issues, and issues caused by transfer of binary data from external sources. These recommendations library as an example, which provides several components such as algorithms, ai, rendering, and network. Both ai and rendering depend on the algorithms component. Please, first clone the sources to recreate conanfile.py include ai.h algorithms.h network.h rendering.h src (continues on next page) 185 Conan Documentation, Release 2.4.1 algorithms ai rendering network Fig. 1: components of the game-engine0 码力 | 769 页 | 4.69 MB | 1 年前3Conan 2.6 Documentation
more: creating and hosting your own Conan Center binaries This can also protect against transient network issues, and issues caused by transfer of binary data from external sources. These recommendations library as an example, which provides several components such as algorithms, ai, rendering, and network. Both ai and rendering depend on the algorithms component. Please, first clone the sources to recreate conanfile.py include ai.h algorithms.h network.h rendering.h src (continues on next page) 185 Conan Documentation, Release 2.6.0 algorithms ai rendering network Fig. 1: components of the game-engine0 码力 | 777 页 | 4.91 MB | 10 月前3Conan 2.9 Documentation
more: creating and hosting your own Conan Center binaries This can also protect against transient network issues, and issues caused by transfer of binary data from external sources. These recommendations library as an example, which provides several components such as algorithms, ai, rendering, and network. Both ai and rendering depend on the algorithms component. Please, first clone the sources to recreate conanfile.py include ai.h algorithms.h network.h rendering.h src (continues on next page) 191 Conan Documentation, Release 2.9.3 algorithms ai rendering network Fig. 1: components of the game-engine0 码力 | 795 页 | 4.99 MB | 10 月前3Conan 2.7 Documentation
more: creating and hosting your own Conan Center binaries This can also protect against transient network issues, and issues caused by transfer of binary data from external sources. These recommendations library as an example, which provides several components such as algorithms, ai, rendering, and network. Both ai and rendering depend on the algorithms component. Please, first clone the sources to recreate conanfile.py include ai.h algorithms.h network.h rendering.h src (continues on next page) 185 Conan Documentation, Release 2.7.1 algorithms ai rendering network Fig. 1: components of the game-engine0 码力 | 779 页 | 4.93 MB | 10 月前3Conan 2.8 Documentation
more: creating and hosting your own Conan Center binaries This can also protect against transient network issues, and issues caused by transfer of binary data from external sources. These recommendations library as an example, which provides several components such as algorithms, ai, rendering, and network. Both ai and rendering depend on the algorithms component. Please, first clone the sources to recreate conanfile.py include ai.h algorithms.h network.h rendering.h src (continues on next page) 185 Conan Documentation, Release 2.8.1 algorithms ai rendering network Fig. 1: components of the game-engine0 码力 | 785 页 | 4.95 MB | 10 月前3Tracy: A Profiler You Don't Want to Miss
https://github.com/KDAB/hotspot heaptrack https://github.com/KDE/heaptrack spall https://handmade.network/p/333/spall/ geiger https://github.com/david-grs/geiger Intel IACA https://www.intel.com/conte com/wolfpld/tracy/releases or build it yourself! 1. simply #includewhenever needed network (socket) message queues 16 waits for a connection (UDP port 8086) 2. compile TracyClient.cpp TracyLockable memcpy(), malloc() et al. shader compilation sorting, searching, container manipulations, … file, network, logging, … interrupts, user input activity, spurious wake-ups, … 46 Instrument 0 码力 | 84 页 | 8.70 MB | 5 月前3
共 199 条
- 1
- 2
- 3
- 4
- 5
- 6
- 20