您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. The Oracle Hacker

  2. 涉及oracle安全方面的知识。 Exploring every technique and tool used by black hat hackers to invade and compromise Oracle, this in-depth guide shows you how to find the weak spots in your databases so you can better defend them.
  3. 所属分类:Oracle

    • 发布日期:2009-06-01
    • 文件大小:495616
    • 提供者:waterlili
  1. ZJU_ACM_All_Anwer 搞编程的都知道的浙江大学A 题库.本书 集了所有经 Z 题解集,集合并附 Mathimaticsumerical algorithms 数值算法

  2. ZJU_Main 主页 下一页 ZJU 题型分类 文演整理版 2008-3-23 数论: 1007 Numerical Summation of a Series 简单题,还是蛮有意思的 1045 HangOver 简单题 1049 I Think I Need a Houseboat 简单题 1028 Flip and Shift 简单题,可以DP/BFS/……,但 是实际上有数学方法可直接判断出来 1026 Modular multiplication of polynomials 简单题
  3. 所属分类:其它

    • 发布日期:2009-06-30
    • 文件大小:842752
    • 提供者:xuhaofeng221
  1. Oracle Hacker

  2. Exploring every technique and tool used by black hat hackers to invade and compromise Oracle, this in-depth guide shows you how to find the weak spots in your databases so you can better defend them.
  3. 所属分类:Oracle

    • 发布日期:2009-07-26
    • 文件大小:495616
    • 提供者:xman_78tom
  1. Identification of Bitmap Compression History

  2. Sometimes image processing units inherit images in raster bitmap format only, so that processing is to be carried without knowledge of past operations that may compromise image quality (e.g., compression).
  3. 所属分类:其它

    • 发布日期:2009-08-24
    • 文件大小:353280
    • 提供者:likeliu
  1. linear robust control.PDF Michael Green David J.N. Limebeer

  2. Our aim in writing this book is to generate an accessible text that develops along a single line of argument. In any exercise of this sort, the selection of material is bound to involve compromise. We have made no attempt to review all the material
  3. 所属分类:Access

    • 发布日期:2009-09-08
    • 文件大小:9437184
    • 提供者:wzxheu
  1. Hacking the next generation

  2. This book is for anyone interested in learning the techniques that the more sophisticated attackers are using today. Other books on the topic have the habit of rehashing legacy attack and penetration methodologies that are no longer of any use to cr
  3. 所属分类:其它

    • 发布日期:2009-09-24
    • 文件大小:6291456
    • 提供者:bestchoice
  1. A Buffer Overflow Study Attacks and Defenses

  2. Introduction On november 2, 1988 a new form of threat appeared with the Morris Worm, also known as the Internet Worm. This famous event caused heavy damages on the internet, by using two common unix programs, sendmail and fingerd. This was possible
  3. 所属分类:Oracle

    • 发布日期:2009-10-13
    • 文件大小:496640
    • 提供者:zhoujq
  1. XtraGrid帮助文件

  2. XtraGrid帮助文件 Written from the ground-up in C# - the XtraGrid fully exploits and extends upon our many years of experience in building visual controls for the Windows(R) family of operating systems. It's a true no-compromise control, taking full adva
  3. 所属分类:C#

    • 发布日期:2009-10-24
    • 文件大小:12582912
    • 提供者:xdx2009
  1. Thinking in Patterns中文版

  2. 目录 译序............................................................................................................................................I 目录....................................................................................................
  3. 所属分类:Java

    • 发布日期:2009-12-17
    • 文件大小:2097152
    • 提供者:wuji0301cata
  1. POJ ACM 1015 Jury Compromise

  2. POJ ACM 1015 Jury Compromise 两种解法 解题报告
  3. 所属分类:专业指导

    • 发布日期:2010-01-09
    • 文件大小:21504
    • 提供者:jshaczhab
  1. Combating Spyware in the Enterprise(syngress安全图书)

  2. Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware. Combating Spyware in the Enterprise begins by examining the various types of insidious spyware an
  3. 所属分类:Web开发

    • 发布日期:2010-03-01
    • 文件大小:7340032
    • 提供者:sunxianbin
  1. A Buffer Overflow Study

  2. On november 2, 1988 a new form of threat appeared with the Morris Worm, also known as the Internet Worm. This famous event caused heavy damages on the internet, by using two common unix programs, sendmail and fingerd. This was possible by exploiting
  3. 所属分类:Oracle

    • 发布日期:2010-03-11
    • 文件大小:496640
    • 提供者:bxbkoala
  1. pku acm 2250 Compromise代码

  2. pku acm 第2250题Compromise Java完整的代码,有详细的注释
  3. 所属分类:Java

    • 发布日期:2007-12-27
    • 文件大小:2048
    • 提供者:china8848
  1. poj经典动态规划题目解题报告

  2. poj经典动态规划题目解题报告,包括经典的动态规划题目20多道,可以作为学习动态规划系统的资料,包括题目:Pku acm 1179 PolygonPku acm 1125 Stockbroker GrapevinePku acm 1160 post officePku acm 1014 DividingPku acm 1050 To the MaxPku acm 1088 滑雪Pku acm 2533 Longest Ordered SubsequencePku acm 1631 Bridgi
  3. 所属分类:专业指导

    • 发布日期:2008-01-03
    • 文件大小:270336
    • 提供者:china8848
  1. 浙江大学题解ZJU_ALL

  2. ZJU_Main 主页 下一页 ZJU 题型分类 文演整理版 2008-3-23 数论: 1007 Numerical Summation of a Series 简单题,还是蛮有意思的 1045 HangOver 简单题 1049 I Think I Need a Houseboat 简单题 1028 Flip and Shift 简单题,可以DP/BFS/……,但是实际上有数学方法可直接判断出来 1026 Modular multiplication of polynomials 简单题,
  3. 所属分类:其它

    • 发布日期:2010-07-19
    • 文件大小:855040
    • 提供者:jack340
  1. 浙大ACM归类与题解

  2. 浙大ZJU 题型分类及解答 数论: 1007 Numerical Summation of a Series 简单题,还是蛮有意思的 1045 HangOver 简单题 1049 I Think I Need a Houseboat 简单题 1028 Flip and Shift 简单题,可以DP/BFS/……,但是实际上有数学方法可直接判断出来 1026 Modular multiplication of polynomials 简单题,有比较简单的好算法 1307 Packets 简单题,
  3. 所属分类:其它

    • 发布日期:2010-07-24
    • 文件大小:855040
    • 提供者:ForeverAlone
  1. POJ1015-Jury Compromise【动态规划DP】

  2. 北大POJ1015-Jury Compromise【动态规划DP】 解题报告+AC代码
  3. 所属分类:C/C++

    • 发布日期:2011-08-09
    • 文件大小:10240
    • 提供者:lyy289065406
  1. compromise是一个开源的基于JavaScript的自然语言处理库

  2. compromise 是一个开源的,基于 Javascr ipt 的自然语言处理库
  3. 所属分类:其它

    • 发布日期:2019-08-08
    • 文件大小:825344
    • 提供者:weixin_39841882
  1. QoS-aware and compromise-resilient key management scheme for heterogeneous wireless Internet of Things

  2. QoS-aware and compromise-resilient key management scheme for heterogeneous wireless Internet of Things
  3. 所属分类:其它

    • 发布日期:2021-02-09
    • 文件大小:289792
    • 提供者:weixin_38673924
  1. Protection approach for passive optical network considering compromise between deployment cost and recovery efficiency

  2. Protection approach for passive optical network considering compromise between deployment cost and recovery efficiency
  3. 所属分类:其它

    • 发布日期:2021-02-09
    • 文件大小:248832
    • 提供者:weixin_38740328
« 12 3 4 5 6 »