-
C06-Views
一个演示IOS View 的程序,学完之后,View就不难了(A demonstration of IOS View procedure, after school, View is not difficult)
- 2012-02-06 15:37:22下载
- 积分:1
-
211UPLINKnew
本文档,分别描述了LTE上行PUSCH信道,PUCCH信道,PRACH信道的基带信号处理流程(This document describes the LTE Uplink PUSCH each channel, PUCCH channel, PRACH channel baseband signal processing)
- 2010-06-23 10:33:42下载
- 积分:1
-
7408595
说明: 用于关闭Windows信使服务弹出窗口的小程序,使用Delphi6编写(Mini Programs, who closes the Windows Messenger Service pop-up window, written in Delphi6)
- 2019-04-21 12:03:40下载
- 积分:1
-
s7-PLC2PC
这是在PC端使用S7 M SC om M控制,在S - 200 C侧使用免费的PI端口通信,实现他们之间的信息交换,来创建一个简单的分布式控制系统。1 s7 - 200系列P LC自由端口通信方式
(This is in the PC End use of 7 M SC om M controls, in S- 200 PI C side using the free port Communication, realize the information exchange between their, to construct a simple Distributed control system. 1 S7-200 series P LC free port communication way)
- 2013-09-22 21:40:48下载
- 积分:1
-
psubst_v2_2
使用微软操作系统内建指令”SUBST”的范例工具程序.在档案总管中加载虚拟磁盘驱动器,将您常用的目录变成磁盘驱动器代码,在我的计算机中方便快速的开启.(Built using Microsoft operating system command SUBST an example of tools procedures. In the Windows Explorer to load a virtual disk drive, commonly used in the directory of your disk drive into a code, on my computer quickly and easily open.)
- 2008-12-18 14:50:50下载
- 积分:1
-
object
Iphong高级编程,讲解很独到很详细,推荐看一看!(Iphong advanced programming, to explain in great detail is very unique, recommend a look!)
- 2013-06-28 14:48:14下载
- 积分:1
-
feijishugongji
《菜鸟也能防黑客之非技术攻击》就是向大家介绍这种方法。正如书名所述,这些方法并不是多么高深的技米,你也一样可以做到。看过《菜鸟也能防黑客之非技术攻击》之后,你会发现在非技术攻击面前,那些所谓的高科技设备是多么的脆弱。想知道黑客怎样从电脑中获取数据而不留痕迹吗?如何不用碰键盘就能侵入邮件服务器吗?这不是魔幻大片,而是真真正正发生在我们身边。
我们都知道信息的重要性。随着计算机时代的来临,大量的信息以电子的形式存储。而用高科技的电子保护系统来保护信息也就是自然而然的事情。作为一名职业黑客,作者的主要工作就是发现这些系统的弱点。在一次又一次的入侵后,作者发现了可以绕开那些所谓高科技防御系统的方法。
你和你身边的人很可能现在就正在受到此种攻击,你准备好了吗?("Rookie also can prevent unskilled hackers attack" is to introduce this method. As the title said, these methods are not rocket technology meters, you can do it too. Read the "rookie can prevent unskilled hackers attack" after, you will find in front of non-technical attacks, how fragile is the so-called high-tech equipment. Want to know how to get data from hackers computer without leaving traces of it? How not to touch the keyboard can invade the mail server? It s not magic movies, but really in our midst.
We all know the importance of information. With the advent of the computer age, a lot of information stored in electronic form. And with high-tech electronic protection systems to protect information that is a natural thing. As a professional hacker, author of the main job is to find weaknesses in these systems. Again and again after the invasion, the authors found that can bypass the so-called high-tech defense systems.
You and the people around you are likely to suffer such att)
- 2013-12-06 14:56:44下载
- 积分:1
-
NetWork_Xiexiren
计算机网络课件。。。。。。。谢西人的课件。。。。(Courseware for computer networks. . . . . . . West hsieh courseware. . . .)
- 2009-03-23 16:55:54下载
- 积分:1
-
win2003_youhu
用来清理windows2003系统的dos批处理小程序,强烈推荐(windows2003 system used to clean up the dos small batch process, and strongly recommended)
- 2007-04-13 16:10:58下载
- 积分:1
-
msgbuf
linux下进程间的通信,非常好的实例,代码页比较好,完整(linux under the inter-process communication, a very good example, code page, complete)
- 2014-09-22 05:47:14下载
- 积分:1