资源列表

排序选择:

« 1 2 ... .41 .42 .43 .44 .45 267246.47 .48 .49 .50 .51 ... 267492 »

[C#编程c#画图

说明:c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图
<48411296@qq.com> 在 2022-02-24 上传 | 大小:16386 | 下载:0

[行业发展研究STVAR

说明:matlab code for STVAR model
<1002464393@qq.com> 在 2022-02-24 上传 | 大小:54071 | 下载:1

[其他游戏Tic Tac Toe terminal game

说明:This is game Tic Tac Toe, which can be played in terminal
<cbcgzwrxufkzofaygz> 在 2022-02-24 上传 | 大小:2488 | 下载:0

[其它程序transportation problem solver

说明:excel spreadsheet useful for transportation problems solving
<813350> 在 2022-02-25 上传 | 大小:8147 | 下载:0

[Linux驱动 DVP-7635HE Linux Driver

说明:Linux driver for DVP-7635HE source code. DVP-7635HE is a high-quality, high-performance capture device which is specially designed for high-definition video capture applications. It supports up to 4 channel of high-def
<nopmeister@gmail.com> 在 2022-02-25 上传 | 大小:20675127 | 下载:0

[CADparasolid

说明:三维几何建模造型内核的库文件。 Parasolid是世界上领先的、经过生产证明的三维几何建模组件软件。
<MonoKelvin> 在 2022-02-25 上传 | 大小:221057 | 下载:2

[网络编程qca-ossl-2.0.0

说明:qca的OPENSSL模块,支持SSL2、SSL3、TLS等协议,扩展qca的功能
<zhao_zz@139.com> 在 2022-02-26 上传 | 大小:55563 | 下载:0

[软件工程Cybersecurity Strategy Implementation1

说明:The Attack-Centric Strategy had the highest Cybersecurity Fundamentals Scoring System (CFSS) estimated total score. It earned nearly a perfect score with 95 points out of a possible 100.
<iwc2007008> 在 2022-02-27 上传 | 大小:163819 | 下载:0

[软件工程Cybersecurity Strategy Implementation2

说明:The Intrusion Kill Chain fr a mework is based on Lockheed Martin's paper Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains
<iwc2007008> 在 2022-02-27 上传 | 大小:166745 | 下载:0

[软件工程Cybersecurity Strategy Implementation3

说明:An Intrusion Kill Chain is the stages or phases that can be used in attacks by attackers.
<iwc2007008> 在 2022-02-27 上传 | 大小:147114 | 下载:0

[软件工程Cybersecurity Strategy Implementation4

说明:Once attackers have selected their target and have some understanding of where they are on the internet and the technologies they use, then they figure out how they are going to attack the victim. This phase is called
<iwc2007008> 在 2022-02-27 上传 | 大小:147037 | 下载:0

[软件工程Cybersecurity Strategy Implementation5

说明:Once the attackers have successfully installed their tools on the victim's system, they can send commands to their tools or to the system itself.
<iwc2007008> 在 2022-02-27 上传 | 大小:147692 | 下载:0
« 1 2 ... .41 .42 .43 .44 .45 267246.47 .48 .49 .50 .51 ... 267492 »

源码中国 www.ymcn.org