资源列表
ImageEncryptionDecryption_1_8
- image encryption and decryption, also work for text encryption or other file format and sensible data
OWASP_Top_10_2007_-_French
- The OWASP Top 10 is primarily intended to educate developers, designers, architects and companies on the impact of security vulnerabilities most common web applications.
slides__security_apps_java_web
- Web Application Security training Goal of this training – Share with you our knowledge about application security – Security risks and solutions (Hacking demos ) – best practices
SECURITY_WEB_TRAINING_JAVA_SOURCE_CODE
- Web application JAVA J2EE, STRUTS, JSP, HIBERNATE, Mysql OR HSQLDB, this application show the top 10 OWASP attaks. This application contain two applications : security-training-start (application with security flaw) And security-training-cor
encryption-decryption
- java project for encryption and decryption using AES algorithme and RSA algorithme, text encryption or images, text file or others formats.
A-Gaussian-Process-Guided-
- 高斯滤波,3D重建,人体姿态识别.最近比较高端的顶级论文,TIP的文章-A Gaussian Process Guided Particle Filter for 3D human pose
surf-xiangjie
- SURF是SIFT算法的改进算,速度快,这里是详解请看。-SURF is improved SIFT algorithm, fast speed, this is, please see.
sql-public
- 数据库规范文档,用于数据库发布时的规范-sql public
cPP-04-Dynamic-Memory
- c++ secure programming memory allocation dynamic memory management
EIA-267-C
- EIA-267 Standard on machine axes naming convention
NIST-RS274NGC-Interpreter
- NIST RS274 NC GCODE INTERPRETER TOKENS FUNCTIONS AND INTERPOLATION
oracle
- Oracle学习笔记 包含安装,建表等操作,适合初学者-Oracle study notes
