您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. 数据恢复软件,绝对好用

  2. Power Data Recovery数据恢复 Copyright(c) 2006-2009 MT Solution Ltd., All rights reserved. END-USER LICENSE AGREEMENT IMPORTANT-READ CAREFULLY: This End-User License Agreement ("EULA") is a legal agreement between you (either an individual or a single en
  3. 所属分类:C

    • 发布日期:2010-07-26
    • 文件大小:1048576
    • 提供者:jiehao860603889
  1. SD卡 物理层协议

  2. 1. General Descr iption............................................................................................................1 2. System Features .................................................................................................
  3. 所属分类:Java

    • 发布日期:2010-08-03
    • 文件大小:1048576
    • 提供者:paomadi
  1. 逆变器程序源程序文件

  2. 纯正正弦波源程序// spwm信号调制 //------------------------------------------------------------ #include #include //系统配置 __CONFIG(HS&PWRTEN&BOREN&PROTECT&WDTEN); //打开看门狗,选择高速晶振,上电延时复位,掉电复位使能,代码保护 //------------------------------------------------------------ //指
  3. 所属分类:其它

    • 发布日期:2010-08-16
    • 文件大小:96256
    • 提供者:lag365
  1. operating system security

  2. Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build “secure” operating systems — operating systems whose mechanisms protect the system against
  3. 所属分类:其它

    • 发布日期:2010-08-19
    • 文件大小:2097152
    • 提供者:voipstunt
  1. Embedded.Linux.System.Design.and.Development

  2. Embedded.Linux.System.Design.and.Development1 Introduction ............................................................................................. 11.1 History of Embedded Linux....................................................21.1.1 Year 19
  3. 所属分类:Linux

    • 发布日期:2008-02-19
    • 文件大小:6291456
    • 提供者:osoon
  1. Excel_VBA的常用命令举例

  2. 本示例为设置密码窗口 (1) If Application.InputBox("请输入密码:") = 1234 Then [A1] = 1 '密码正确时执行 Else: MsgBox "密码错误,即将退出!" '此行与第2行共同设置密码 End If 本示例为设置密码窗口 (1) X = MsgBox("是否真的要结帐?", vbYesNo) If X = vbYes Then Close 本示例为设置工作表密码 ActiveSheet.Protect Password:=641112 ' 保
  3. 所属分类:VB

    • 发布日期:2010-08-26
    • 文件大小:91136
    • 提供者:panlegen
  1. MySQL - Essential Skills

  2. This book will provide you with the basic knowledge to install and set up, plan and design, and protect and administer your MySQL database.
  3. 所属分类:其它

    • 发布日期:2010-08-28
    • 文件大小:14680064
    • 提供者:joewang12
  1. WinHex 15.7以及使用手册Jul 29, 2010

  2. WinHex is in its core a universal hexadecimal editor, particularly helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security. An advanced tool for everyday and emergency use: inspect and edit all kinds of
  3. 所属分类:Access

    • 发布日期:2010-08-31
    • 文件大小:2097152
    • 提供者:chungqq
  1. Developer

  2. Microsoft Press, 2010 少有的介绍 Enterprise Library的书。 Welcome to the era of software reuse! Microsoft Enterprise Library helps accelerate development by providing reusable components and guidance on proven practices. If you build applications that run o
  3. 所属分类:C#

    • 发布日期:2010-09-06
    • 文件大小:3145728
    • 提供者:NightCloud
  1. Red Hat Linux Security And Optimization 2002

  2. Product Descr iption Red Hat Linux Security and Optimization is a reference for power-users and administrators covering all security issues, including Filesystems Security, Securing root accounts and Firewalls. Other Security books talk about how to
  3. 所属分类:Linux

    • 发布日期:2010-09-09
    • 文件大小:5242880
    • 提供者:shaoguangleo
  1. java混淆器jocky

  2. java混淆器,能够对jar、private、public、protect等混淆,防止java的class文件被盗用
  3. 所属分类:Java

    • 发布日期:2010-09-15
    • 文件大小:644096
    • 提供者:victordemo
  1. Unix Backup And Recovery 1999

  2. TABLE OF CONTENTS Preface xiii I. Introduction 1 1. Preparing for the Worst 3 My Dad Was Right 3 Developing a Disaster Recovery Plan 4 Step 1: Define (Un)acceptable Loss 5 Step 2: Back Up Everything 7 Step 3: Organize Everything 10 Step 4: Protect A
  3. 所属分类:Informix

    • 发布日期:2010-09-26
    • 文件大小:2097152
    • 提供者:shaoguangleo
  1. Private Exe Protector Version 3.2.2 (demo)

  2. Version 3.2.2 (08/09/2010) * New: o New feature in keygen - extract user field from license file o New UI of keygen, user now can define [user-bitset names] o UI: new menu option [Save project as] o Add special feature [Hide file from Antivirus] - a
  3. 所属分类:C++

    • 发布日期:2010-09-27
    • 文件大小:1048576
    • 提供者:tiantian123445
  1. AT24C02芯片资料

  2. Low-voltage and Standard-voltage Operation – 2.7 (VCC = 2.7V to 5.5V) – 1.8 (VCC = 1.8V to 5.5V) • Internally Organized 128 x 8 (1K), 256 x 8 (2K), 512 x 8 (4K), 1024 x 8 (8K) or 2048 x 8 (16K) • Two-wire Serial Interface • Schmitt Trigger, Filtered
  3. 所属分类:C++

    • 发布日期:2010-09-28
    • 文件大小:455680
    • 提供者:carven209
  1. Essential Computer Security Everyone’s Guide to Email, Internet, and Wireless Security

  2. Product Descr iption Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselve
  3. 所属分类:微软认证

    • 发布日期:2010-10-02
    • 文件大小:7340032
    • 提供者:sunxianbin
  1. Google Hacking for Penetration Testers

  2. Product Descr iption A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those que
  3. 所属分类:Web开发

    • 发布日期:2010-10-02
    • 文件大小:13631488
    • 提供者:sunxianbin
  1. gcc手册的使用 使用使用使用

  2. This is Info file gcc.info, produced by Makeinfo-1.55 from the input file gcc.texi. This file documents the use and the internals of the GNU compiler. Published by the Free Software Foundation 59 Temple Place - Suite 330 Boston, MA 02111-1307 USA Copyr
  3. 所属分类:C

    • 发布日期:2010-10-25
    • 文件大小:113664
    • 提供者:lybirdaaa
  1. Quantum Computation and Quantum Information

  2. Review "Quantum Computation and Quantum Information is a challenging text that offers a thorough discussion of the relevant physics and a reference book that guides readers to the original literature...Perhaps the best way to use the book, though, i
  3. 所属分类:专业指导

    • 发布日期:2010-11-07
    • 文件大小:7340032
    • 提供者:hupo001
  1. Doswf_Unpack_DV

  2. 演示DoABCScaner的功能使用,以及DoSWF加密后的局部研究
  3. 所属分类:其它

    • 发布日期:2010-11-11
    • 文件大小:5242880
    • 提供者:samchow
  1. An Introduction To Cryptography

  2. An Introduction To CryptographyChapter 1. The Basics of Cryptography . . . . . . . . . . . . . . . . . . . . . . . . .11Encryption and decryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11What is cr
  3. 所属分类:Java

    • 发布日期:2008-03-16
    • 文件大小:842752
    • 提供者:osoon
« 1 2 3 4 5 6 78 9 10 11 12 ... 35 »