资源列表
Assignment6
- 一个用四方法加密解密的程序,算是我们的一次作业吧,大家一起参考下-A four-way encryption and decryption using the procedure, be it one of our operations, we refer to the following together
C_Programming_classic_encryption_algorithm_code.ra
- C编程设计的经典加密算法代码C Programming classic encryption algorithm code-C Programming classic encryption algorithm code
sqlite-amalgamation-3.6.21.tar
- svn安装程序的数据库,方便以后的迁移,编译时候一定要加参数。-svn installer database, to facilitate future migration, compile time parameters must be added.
busybox-1.2.1.tar
- busybox1.2最新版做嵌入式的利器 -busybox1.2 latest version of the weapon so Embedded
Enkripsi-a-Dekripsi-wake-method
- cryp and decryp with wake method
8643
- 不仅如此,世博会还是人类的聚会,人们从世界各地汇聚申城,那么作为东道主的你又是否准备好迎接海外游客、展现城市风貌呢? 领略世界技术文化也好,接待国外来宾来客也好,外语都是必不可少哒!你还不赶快趁机好好学习学习? 在【沪江世博英语学习专题】中,汇集了沪江小编精选的世博英语学习文章。 不仅有即时的新闻动态,还有名人访谈、世博专用口语和词汇栏目,更有独具特色的上海旅行潮人指南! 希望在世博之后,不仅上海的城市形象有提升,你的英语水平也跟着突飞猛进哦!-上海
interrupt
- 这是linux操作系统这门课程中,有关中断的课件-This is the linux operating system in this course, the interruption of the courseware
15
- 此文件为我网络安全方面的理论知识,有兴许的朋友可以-This file for my network security aspects of the theory of knowledge, there is perhaps a friend can look at the
ciifafenxi
- 词法分析器 可分析简单词法、数字和符号等 编译原理实验-Simple lexical analyzer can analyze lexical, numbers and symbols such as compiler theory test
网络攻击Python语言编写
- 本书籍是面向Python语言的编程朋友,主要是运用Python语言编写网络攻击,阅读此书可以更加清楚明白网络攻击原理,知己知彼。(This book is the Python language programming friends, mainly the use of Python language network attacks, reading this book can understand more clearly the principle of network attack, t
gj_Bash_jbbczn
- 高级Bash脚本编程指南(for linux)-Advanced Bash scr ipting Guide!!!
2511.tar
- 科大仿真2D校内赛的球队,由WrightEagle现主力队员制作,基于UVA底层-USTC Simulation 2D school race team, and now the main players from WrightEagle production-based UVA underlying
