搜索资源列表
Network-penetration-technology
- 网络渗透技术教程 基础知识 缓冲区溢出利用技术 shellcode技术 堆溢出利用技术 格式化串漏洞利用技术 内核溢出利用技术 其它利用技术 漏洞发掘分析 CGI渗透测试技术 SQL注入利用技术 (内附c语言源码))-Network penetration technology tutorial The basics of buffer overflow technology shellcode heap overflow use of the technology format str
Network-Modeling-and-Simulation-
- 介绍计算机通信网络建模及模拟,对网络仿真器设计,以及对各网络层的特性模拟进行分析-An Introduction to Network Modeling and Simulation for the Practicing Engineer
Unix-Network
- UNIX网络编程影印版 UNIX网络编程的经典之作。附录中给出了测量各种IPC形式性能的方法。 本书内容详尽且具权威性,几乎每章都提供精选的习题,并提供了部分习题的答案,是网络研究和开发人员理想的参考书。-Network programming in UNIX Second Edition UNIX network programming classic. The appendix gives measurements of various IPC form of the pe
UNIX-Network-Programming
- UNIX环境高级编程_第二版中文,本文介绍全面。-UNIX Network Programming _ the second edition of the Chinese, this article describes comprehensive.
network-link-state
- 此系统实现网络流量监测功能,可以实习远端监测,并能分析出是tcp或者是udp-This system network traffic monitoring function, can practice distal monitoring, and analysis of the TCP or udp is out
Practice-of-network-security-a
- 本书的特色是网络安全理论知识与实例代码完美的结合,使读者不仅可以从理论深度上对网络安全有宏观的认识,而且可以根据实例代码对网络安全措施有更直观的把握。(一)-The book features network security theory of knowledge and example code is a perfect combination, so that readers not only from the theoretical depth network security macr
Practice-of-network-security
- 本书的特色是网络安全理论知识与实例代码完美的结合,使读者不仅可以从理论深度上对网络安全有宏观的认识,而且可以根据实例代码对网络安全措施有更直观的把握。-The book features network security theory of knowledge and example code is a perfect combination, so that readers not only from the theoretical depth network security macro,
QT-based-network-programming
- 基于windows下QT的网络编程 ,包含sever-client,经过测试可用。-QT under windows-based network programming, including sever-client, and has been tested and available.
network-security
- Presentation on network security and cryptography
network
- 网络编程 主机端发送串口数据到客户端 客户端发送网络数据到主机端 控制qt上的蝴蝶飞行 自己 写得一个小东西-Network programming host controller sends serial data to the client the client sends network data to the host to control the butterfly on the qt flying their own written a small thing
Secure-Network-Coding
- 基于稀疏矩阵的低复杂度安全网络编码算法 :针对安全网络编码复杂度较大的问题,提出一种基于稀疏矩阵的安全网络编码算法。利用稀疏矩阵占用较少的存储空间和运算速 度快的优点,在信源处将信源信息与稀疏矩阵进行矩阵变换操作,使得随机网络编码能以较高的概率达到信息论安全的要求。仿真结果表 明,该算法能提高编解码速率,降低复杂度,减少存储空间。-Low-complexi Secure Network Coding Algorithm Based 0n Sparse M atrix
2005---A-Survey-of-Mobile-Ad-Hoc-network-Routing-
- 2005 - A Survey of Mobile Ad Hoc Network Routing Protocols
socket-based-network-programming
- 基于TCP和UDP协议的套接字网络编程。客服端采用套接字向服务器端请求连接,服务器端采用多路复用机制,等待客服端的请求-TCP and UDP socket-based network programming. Customer service end using socket connection request to the server-side and server-side multiplexing mechanism, waiting for the request of the c
network
- 用visualstate画的模型,然后编写的,实现network的多级菜单,以及IP地址的输入,上下键选择数字-Model with visualstate painting, and then written to achieve a network of multi-level menus, as well as the IP address of the input, the up and down keys to select digital
SOM-neural-network-in-embedded-ARM
- SOM神经网络在嵌入式ARM上的移植,实现了SOM神经网络的分类功能-SOM neural network in embedded ARM transplant
Bandwidth-Recycling-in-IEEE-802.16-Network
- Bandwidth Recycling in IEEE 802.16 Network
The-Tao-of-Network-Security
- Very good book about network security. Must read for any system administrator or anyone working in IT.
network-flows
- 线性规划与网络流-北京大学 曹钦翔 网络流 network flows网络流的理论和应用在不断发展,出现了具有增益的流、多终端流、多商品流以及网络流的分解与合成等新课题。网络流的应用已遍及通讯、运输、电力、工程规划、任务分派、设备更新以及计算机辅助设计等众多领域。-Linear programming and network flow- Peking Cao Qin Xiang network flow network flows network flow theory and applic
network
- 网络设计 校园网规划设计 设计图表 课程设计说明-school network
Cisco---Designing-Network-Security-(2)
- Throughout this book, authentication, authorization, and access control are incorporated into the concept of identity. Although these concepts are distinct, they all pertain to each individual user of the network---be it a person or device.