{"blog_title":"yasunori \u306e\u65e5\u8a18","provider_url":"https://hatena.blog","published":"2005-03-17 00:00:01","author_url":"https://blog.hatena.ne.jp/vmax/","description":"\u8aad\u3082\u3046\u3068\u601d\u3063\u3066\u3044\u308b\u3051\u3069\u3001\u307e\u3060\u8aad\u3093\u3067\u306a\u3044\u672c\u304c\u8caf\u307e\u3063\u3066\u304d\u305f\u306e\u3067\u3001\u5099\u5fd8\u9332\u3068\u3057\u3066\u66f8\u3044\u3066\u304a\u3053\u3046\u3002\u30fbC/C++ \u30bb\u30ad\u30e5\u30a2\u30d7\u30ed\u30b0\u30e9\u30df\u30f3\u30b0\u30af\u30c3\u30af\u30d6\u30c3\u30af Volume1 (O'REILLY) ISBN4-87311-200-1 \u30fb\u30bb\u30ad\u30e5\u30a2\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2 Exploiting Software (\u65e5\u7d4cBP) ISBN4-8222-8210-4\u65b0\u5e79\u7dda\u306e\u5f80\u5fa9\u4e2d\u306b\u306a\u3093\u3068\u304b1\u518a\u306f\u8aad\u3093\u3067\u304a\u304d\u305f\u3044\u306a\u3041\u3002","provider_name":"Hatena Blog","blog_url":"https://vmax.hatenadiary.org/","author_name":"vmax","version":"1.0","url":"https://vmax.hatenadiary.org/entry/20050317/p2","height":"190","type":"rich","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fvmax.hatenadiary.org%2Fentry%2F20050317%2Fp2\" title=\" - yasunori \u306e\u65e5\u8a18\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","width":"100%","title":"","categories":["\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf"],"image_url":null}