-
Consider the external magnetic field simulation using the ISING MODEL package fo...
考虑了外加磁场的ISING MODEL 模拟
要用fortran软件包打开-Consider the external magnetic field simulation using the ISING MODEL package fortran open
- 2022-01-22 03:45:07下载
- 积分:1
-
PHP接口说明文档
农行网上支付平台-商户接口编程指南-PHP-Edition-V3.0.2.pdf(TrustPayClient-PHP-Edition-V3.0.2.pdf)
- 2019-02-20 14:33:13下载
- 积分:1
-
power control based on game theory
利用博弈论对无线网络的功率控制问题进行分析,源码能迭代实现纳什均衡,迭代过程以图形展示。(The game theory is used to analyze the power control of wireless networks, and the source code can realize the Nash equilibrium iteratively, and the iterative process is shown graphically.)
- 2017-09-03 22:02:51下载
- 积分:1
-
真的很麻烦也,有必要这样吗?搞错没有啊?快让我下
真的很麻烦也,有必要这样吗?搞错没有啊?快让我下-really have trouble, it is necessary to do? Ah no wrong? Let me quickly under!
- 2022-07-11 11:30:05下载
- 积分:1
-
dpsk-dsss
说明: 本人仿真的DPSK-DSSS系统,对学习和了解扩频通信的同学们很有用。(simulink the dpsk-spread spectrum system is valueable...)
- 2011-04-11 22:26:57下载
- 积分:1
-
SimulinkPendulumDQN
说明: DQN实现matlab强化学习,解决倒立摆问题(Dqn realizes matlab to strengthen learning and solve the problem of inverted pendulum)
- 2020-07-01 21:20:02下载
- 积分:1
-
常用 oracle数据库脚本
这是常用的一些oracle数据库脚本,自己可以下载下来看看(This is a common Oracle database script, you can download it to see)
- 2020-06-22 05:40:02下载
- 积分:1
-
gouxing1
说明: 主要是各种构型的GDOP分析,构型不小于5种,可以生成GDOP的平面图(It is mainly GDOP analysis of various configurations. There are no less than 5 configurations, which can generate the plane graph of GDOP.)
- 2020-06-18 20:40:01下载
- 积分:1
-
heikegongjuquancheng
《黑客工具全程揭秘》是2012年中国铁道出版社出版的图书,作者是张齐。《黑客工具全程揭秘》分10章围绕当前黑客主流工具展开,囊括最新的攻击手段和防护技巧,涵盖了从系统底层到网络应用层的多方面知识。
《黑客工具全程揭秘》主要针对掌握基础计算机知识,对网络安全兴趣浓厚的同学;对黑客技术感兴趣的读者;网络攻击与防护初级学者以及网络管理者。
目录:
01了解黑客
02计算机安全知识
03扫描工具
04注入工具
05嗅探工具
06qq工具
07木马工具
08加密解密工具
09远程控制工具
10安全工具
写在最后
附录a注册表操作攻略
系统应用
网络应用
系统优化
系统美化
硬件优化
软件设置
添加右键选项
改变目录
更改图标
更改提示信息
禁止菜单("The full disclosure of the hacker tool" is a book published by China Railway Press in 2012 The author is Zhang Qi The whole process of revealing hacker tools is divided into 10 chapters focusing on the current mainstream tools of hackers including the latest means of attack and protection techniques covering all aspects of knowledge from the bottom of the system to the application level of the network
The whole process of revealing the secrets of hackers is mainly for basic computer knowledge interested students in network security readers interested in hacker technology network attack and protection junior scholars and network administrators)
- 2018-02-01 19:51:39下载
- 积分:1
-
AIX、HP、linux操作系统命令汇总
说明: AIX、HP、linux操作系统命令汇总(AIX, HP, Linux operating system command summary)
- 2020-06-22 04:00:01下载
- 积分:1