您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. romfs.2.0.x.gz

  2. uClinux in the GDB/ARMulator Here are some patches to GDB to allow the existing gdb ARM emulator to run uClinux targets. It can run both little-endian and big-endian code, as well as apcs-32/26 code and Thumb. I have tested little/big endian kernels
  3. 所属分类:硬件开发

    • 发布日期:2009-05-07
    • 文件大小:254976
    • 提供者:ycg198
  1. tsp问题模拟退火法实现

  2. tilizing it solving TSP problem by simulating stealing algorithm
  3. 所属分类:C/C++

    • 发布日期:2009-09-03
    • 文件大小:2048
    • 提供者:ly2009jy
  1. apress beginning blackberry development

  2. There has never been a better time to develop applications for BlackBerry devices than right now. Since Research In Motion (RIM) launched the first models almost a decade ago, the BlackBerry smartphone has gone from relative obscurity to near univer
  3. 所属分类:BlackBerry

    • 发布日期:2009-12-05
    • 文件大小:7340032
    • 提供者:leonhd
  1. Stealing the Network: How to Own a Continent

  2. Stealing the Network: How to Own a Continent 有问题,我的QQ:571669275
  3. 所属分类:专业指导

    • 发布日期:2010-01-22
    • 文件大小:2097152
    • 提供者:aaf812000
  1. Asterisk Hacking(syngress安全图书)

  2. Asterisk Hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the
  3. 所属分类:其它

    • 发布日期:2010-02-12
    • 文件大小:11534336
    • 提供者:sunxianbin
  1. Stealing The Network - How To Own A Shadow (2007).pdf

  2. Stealing The Network - How To Own A Shadow (2007)是一本网络精点书籍,有需要的下了。
  3. 所属分类:网络基础

    • 发布日期:2010-04-17
    • 文件大小:9437184
    • 提供者:S2006081780
  1. Artificial.Intelligence.for.Games

  2. Two memories stand out in my career writing game AI. The first takes place in a dingy computer lab on the top floor of the computer science building at Birmingham University in the UK. Although I am half-way through the first year of my Artificial I
  3. 所属分类:Web开发

  1. Windows Token Stealing

  2. Windows Token Stealing
  3. 所属分类:C/C++

    • 发布日期:2010-10-11
    • 文件大小:220160
    • 提供者:acns
  1. cryptopp crypto++ DES RSA SHA

  2. Crypto++® Library 5.6.1 www.weidai.com 涵盖了几乎所有常用的加解密算法,如: authenticated encryption schemes GCM, CCM, EAX high speed stream ciphers Panama, Sosemanuk, Salsa20, XSalsa20 AES and AES candidates AES (Rijndael), RC6, MARS, Twofish, Serpent, CAST-256 othe
  3. 所属分类:其它

    • 发布日期:2011-01-14
    • 文件大小:1048576
    • 提供者:toyjoy
  1. Hackers Heroes of the Computer Revolution

  2. 黑客:计算机革命的英雄(25周年纪念版) 英文原版 内容简介 This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took r
  3. 所属分类:网络攻防

    • 发布日期:2011-05-28
    • 文件大小:12582912
    • 提供者:ptslamdunk
  1. 远程桌面vncview vncview

  2.  vncviewer.exe is a process belonging to the TWD Industries remote administration tool. This process allows other users to control your PC via a local network or the Internet. If used maliciously this process can also permit users to access your PC,
  3. 所属分类:网管软件

    • 发布日期:2011-11-04
    • 文件大小:715776
    • 提供者:nihaosonus
  1. Stealing the Network: How to Own the Box

  2. Stealing the Network: How to Own the Box
  3. 所属分类:专业指导

    • 发布日期:2008-05-31
    • 文件大小:4194304
    • 提供者:funlxd
  1. 安全之美Beautiful_Security

  2. IF ONE BELIEVES THAT NEWS HEADLINES REVEAL TRENDS, THESE ARE INTERESTING times for computer security buffs. As Beautiful Security went to press, I read that a piece of software capable of turning on microphones and cameras and stealing data has been
  3. 所属分类:网络安全

    • 发布日期:2012-06-05
    • 文件大小:2097152
    • 提供者:gcs0000
  1. cryptopp 5.61

  2. Crypto++ Library is a free C++ class library of cryptographic schemes. Currently the library contains the following algorithms:algorithm type name authenticated encryption schemes GCM, CCM, EAX high speed stream ciphers Panama, Sosemanuk, Salsa20, X
  3. 所属分类:C++

    • 发布日期:2012-06-12
    • 文件大小:1048576
    • 提供者:hmlhmlb
  1. [四本网络盗窃合集版本].(Stealing.the.Network.The.Complete.Series.Collector

  2. [四本网络盗窃合集版本].(Stealing.the.Network.The.Complete.Series.Collector's.Edition)
  3. 所属分类:网络攻防

    • 发布日期:2013-01-08
    • 文件大小:10485760
    • 提供者:huzhouhzy
  1. 操作系统概念第七版答案

  2. solutions to the exercises Chapter 1 1.1 In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in various security problems. a. What are two such problems? b. Can we ensure the s
  3. 所属分类:C/C++

    • 发布日期:2013-04-02
    • 文件大小:613376
    • 提供者:hanbb66
  1. java7帮助文档

  2. Java Platform Standard Edition 7 Documentation What's New Documentation Release Notes Tutorials and Training The Java Tutorials Java Training More Information Java SE 7 Names and Versions Java SE White Papers Documentation Accessibility Specificatio
  3. 所属分类:Java

    • 发布日期:2013-07-01
    • 文件大小:57671680
    • 提供者:yg359547115
  1. Energy-efficient work-stealing language

  2. Energy-efficient work-stealing language runtimes 2014 asplos
  3. 所属分类:其它

    • 发布日期:2014-10-14
    • 文件大小:1048576
    • 提供者:xiaochaoyxc
  1. Syngress - Stealing the Network - How to Own the Box (2003).pdf

  2. Syngress - Stealing the Network - How to Own the Box (2003).pdf
  3. 所属分类:网络安全

    • 发布日期:2019-08-10
    • 文件大小:3145728
    • 提供者:drjiachen
  1. Kid-Stealing-Back:7DLR 2021-源码

  2. RAWIG RAWIG被计划为体系结构,可以随时进行修改和扩展。 它既不是教程材料,也不是完整的游戏。 目前,RAWIG处于开发的早期阶段。 先决条件 要使用RAWIG,您需要: 去编译器 C编译器 BearLib终端库 用法 RAWIG是独立的应用程序,不是库。 您可以通过在root用户中go build来修改文件和编译项目。 免责声明 请参阅“开发”分支-“主”仅适用于发行版。 路线图 RAWIG是一个很小的个人项目,没有适当,详细的路线图。 但是,将保留TODO列表。 v 0.1之前
  3. 所属分类:其它

    • 发布日期:2021-03-06
    • 文件大小:86016
    • 提供者:weixin_42097533
« 12 3 »