资源列表
(2006-Wiley)Elements-of-Information-Theory(2nd-Ed
- 1) A Probability Path by Sidney I. Resnick 2) Adventures in Stochastic Processes by Sidney I. Resnick 3) Probability and Measure by Patrick Billingsley 4) Probability, Statistics, and Random Processes for Engineers by Henry Stark and John W. Wo
joomla
- 扫描joomla漏洞差价,数据库基于exploit-db-scan the Joomla s plugins,the database is based on exploit-db
sfz_card
- 二代身份证识别例程,适用国腾身份证阅读器,可自动读取身份证信息。-Second-generation ID card identification routines for Guoteng card reader, can be automatically read ID information.
703N
- 703n的刷机固件,应用在wifi板子上面,很好用的,可以获得心功能-703n Brush firmware, application wifi above board, well used, you can get heart function
JavaCrawler
- 基于BFS的web网络爬虫,支持robot.txt-web crawlers, support robot.txt
mha_wh_traces.tar
- NS2 simulation trace files for Multi-Hop count analysis algorithm wormhole detection using False Positive flags and packet drops events
SQLscanning
- 简易web网站sql漏洞扫描,字符型,数字型,信息泄漏-Easy web site sql vulnerability scanning
Phising
- Phising of the facebook login page by saving input of user to a file
dynamips_gdbstub.patch
- Cisco Dynamips programm. Ready to hack cisco router
6aa.tcl.tar
- TCL scr ipt TO SIMULATE DROPTAIL
client_server
- c# code client server send recive
mono
- Substitution ciphers are probably the most common form of cipher. They work by replacing each letter of the plaintext (and sometimes puntuation marks and spaces) with another letter (or possibly even a random symbol). A monoalphabetic substituti
