资源列表

« 1 2 ... .74 .75 .76 .77 .78 8579.80 .81 .82 .83 .84 ... 8590 »

[软件工程i.MX 8DualX

说明:i.MX 8DualX Automotive and Infotainment Applications Processors
<ggc_gcc> 在 2019-09-12 上传 | 大小:2.35mb | 下载:0

[软件工程i.MX 8M Dual / 8M

说明:i.MX 8M Dual / 8M QuadLite / 8M Quad Applications Processors Data Sheet for Consumer Products
<ggc_gcc> 在 2019-08-17 上传 | 大小:881.13kb | 下载:0

[软件工程i.MX 8QuadXPlus

说明:i.MX 8QuadXPlus and 8DualXPlus Automotive and Infotainment Applications Processors
<ggc_gcc> 在 2019-08-17 上传 | 大小:2.41mb | 下载:0

[软件工程i.MX 8X Family of Applications Processors

说明:i.MX 8X Family of Applications Processors Built with a high-level integration to support graphics, video, image processing, audio, and voice functions, the i.MX 8X processor family is ideal for safety-certifiable and e
<ggc_gcc> 在 2019-08-17 上传 | 大小:214.64kb | 下载:0

[软件工程MLPR MATLAB

说明:training course MATLAB
<bajopaj@simplemail.top> 在 2019-08-28 上传 | 大小:28.45mb | 下载:0

[软件工程MS-DOS Programmer's Reference

说明:Contain lot of info for programming in MSDOS: System Calls/Old System Calls Memory Management Process Management Interrupts Device Drivers Control Blocks and Work Areas .Exe File Structure and Loading Symbol Defi
<SergeXY1> 在 2021-06-02 上传 | 大小:144.08kb | 下载:0

[软件工程Linux file format description

说明:Linux file format descr iption on russian
<SergeXY1> 在 2021-06-02 上传 | 大小:426.25kb | 下载:0

[软件工程Cybersecurity Strategy Implementation1

说明:The Attack-Centric Strategy had the highest Cybersecurity Fundamentals Scoring System (CFSS) estimated total score. It earned nearly a perfect score with 95 points out of a possible 100.
<iwc2007008> 在 2022-02-27 上传 | 大小:159.98kb | 下载:0

[软件工程Cybersecurity Strategy Implementation2

说明:The Intrusion Kill Chain fr a mework is based on Lockheed Martin's paper Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains
<iwc2007008> 在 2022-02-27 上传 | 大小:162.84kb | 下载:0

[软件工程Cybersecurity Strategy Implementation3

说明:An Intrusion Kill Chain is the stages or phases that can be used in attacks by attackers.
<iwc2007008> 在 2022-02-27 上传 | 大小:143.67kb | 下载:0

[软件工程Cybersecurity Strategy Implementation4

说明:Once attackers have selected their target and have some understanding of where they are on the internet and the technologies they use, then they figure out how they are going to attack the victim. This phase is called
<iwc2007008> 在 2022-02-27 上传 | 大小:143.59kb | 下载:0

[软件工程Cybersecurity Strategy Implementation5

说明:Once the attackers have successfully installed their tools on the victim's system, they can send commands to their tools or to the system itself.
<iwc2007008> 在 2022-02-27 上传 | 大小:144.23kb | 下载:0
« 1 2 ... .74 .75 .76 .77 .78 8579.80 .81 .82 .83 .84 ... 8590 »

源码中国 www.ymcn.org