资源列表
[文件格式] IEEE_latex会议论文模版
说明:IEEE 会议模板 latex参考文献模版(latex Reference Template)<wl_29> 在 2024-12-25 上传 | 大小:756kb | 下载:0
[文档资料] radmin3.5.2.1
说明:radmin3.5.2.1完美破解版,支持最新版,Radmin Server 破解完整版,radmin3.5.2.1完美破解版(支持win10),支持最新版win10(Radmin 3.5.2.1 perfect crack version, support the latest version, Radmin Server crack complete version, Radmin 3.5.2.1 perfect crack ver<白色幽灵> 在 2024-12-25 上传 | 大小:6.33mb | 下载:0
[软件工程] 有限元方法及其应用李开泰
说明:文档主要是对有限元方法的理论讲解,作者为李开泰(The document is mainly about the theoretical explanation of finite element method. The author is Kaitai Li.)<夕阳下的刀客> 在 2024-12-25 上传 | 大小:6.1mb | 下载:0
[软件工程] Cybersecurity Strategy Implementation5
说明:Once the attackers have successfully installed their tools on the victim's system, they can send commands to their tools or to the system itself.<iwc2007008> 在 2022-02-27 上传 | 大小:144.23kb | 下载:0
[软件工程] Cybersecurity Strategy Implementation6
说明:Knowing what the attacker's Intrusion Kill Chain looks like can help defenders make it much harder for attackers to be successful.<iwc2007008> 在 2022-02-27 上传 | 大小:146.32kb | 下载:0
[软件工程] Cybersecurity Strategy Implementation7
说明:One consideration before implementing this fr a mework is whether defenders should use the original Intrusion Kill Chain fr a mework or update it. There are several ways this fr a mework can be modernized. I'll give y<iwc2007008> 在 2022-02-27 上传 | 大小:149.29kb | 下载:0
[软件工程] Cybersecurity Strategy Implementation8
说明:Another modification to this approach worth considering is whether to update the phases and the actions in the Courses of Action Matrix. For example, the Reconnaissance phase of the Intrusion Kill Chain can be split i<iwc2007008> 在 2022-02-27 上传 | 大小:143.93kb | 下载:0
[软件工程] Cybersecurity Strategy Implementation9
说明:The Weaponization phase is too opaque for most organizations to realistically influence. Put another way, CISOs typically do not have very effective controls for protection and detection prior to the Delivery phase; p<iwc2007008> 在 2022-02-27 上传 | 大小:148.96kb | 下载:0
[软件工程] Cybersecurity Strategy Implementation10
说明:This mapping exercise can help expose optimistic assumptions about organizations' security capabilities. Some security professionals call this type of exercise cartography.<iwc2007008> 在 2022-02-27 上传 | 大小:143.37kb | 下载:0
[其它文档] 车身控制模块BCM设计与开发方法详解
说明:车身控制模块BCM设计与开发方法详解包含组成、功能和具体的实现电路等<noshape> 在 2022-02-27 上传 | 大小:1.82mb | 下载:0
[其它文档] 汽车电子常用接口电路
说明:汽车电子常用接口电路 包含输入输出电路,LIN,CAN等常用的电路,机具参考价值。<noshape> 在 2022-02-27 上传 | 大小:778.94kb | 下载:0