资源列表
[软件工程] javacourse
说明:该压缩文件中共包含16个非常实用的java学习实例,可作为java教学课件-the compressed file contains 16 CPC very practical example of learning java, java as Courseware<谢青> 在 2025-04-30 上传 | 大小:144kb | 下载:0
[软件工程] Simulations
说明:Matrix laboratory matlab full detail simulations<Maheswarasarma> 在 2025-04-30 上传 | 大小:143kb | 下载:0
[软件工程] sfgdemov20_R305
说明:FINGER PRINT INFO TO INTERFACE ARM7 MICROCONTROLLER<srikanth> 在 2025-04-30 上传 | 大小:143kb | 下载:0
[软件工程] Firmware update flow
说明:Firmware upload process documentation<jkmsngr300> 在 2021-01-23 上传 | 大小:143.02kb | 下载:0
[软件工程] Cybersecurity Strategy Implementation3
说明:An Intrusion Kill Chain is the stages or phases that can be used in attacks by attackers.<iwc2007008> 在 2022-02-27 上传 | 大小:143.67kb | 下载:0
[软件工程] Cybersecurity Strategy Implementation4
说明:Once attackers have selected their target and have some understanding of where they are on the internet and the technologies they use, then they figure out how they are going to attack the victim. This phase is called<iwc2007008> 在 2022-02-27 上传 | 大小:143.59kb | 下载:0
[软件工程] Cybersecurity Strategy Implementation8
说明:Another modification to this approach worth considering is whether to update the phases and the actions in the Courses of Action Matrix. For example, the Reconnaissance phase of the Intrusion Kill Chain can be split i<iwc2007008> 在 2022-02-27 上传 | 大小:143.93kb | 下载:0
[软件工程] Cybersecurity Strategy Implementation10
说明:This mapping exercise can help expose optimistic assumptions about organizations' security capabilities. Some security professionals call this type of exercise cartography.<iwc2007008> 在 2022-02-27 上传 | 大小:143.37kb | 下载:0