资源列表
[CA认证] chapter1courseinformation
说明:这是有关网络安全的教案与PPT文件,我们老师做的很好,可以参考一下。-It is about network security, lesson plans and PPT files, we do a very good teacher, you can reference<mao> 在 2025-06-27 上传 | 大小:136kb | 下载:0
[CA认证] 2
说明:This program is about taking a sentence and somehow concealing it within a body of text and then subsequently being able to retrieve it. I.e. if you were to send someone the file, it would just look like the book and you d not notice that it containe<ed> 在 2025-06-27 上传 | 大小:141kb | 下载:0
[CA认证] Montgomery
说明:montgomery加密算法在ARM处理器上实现,-Montgomery encryption algorithm is implemented on an ARM processor,<罗风> 在 2025-06-27 上传 | 大小:141kb | 下载:0
[CA认证] defcon-17-taylor-extras
说明:defcon-taylor (some obfuscation techniques to prevent from reverse engineering)<sxs> 在 2025-06-27 上传 | 大小:139kb | 下载:0
[CA认证] Keypad_7Seg_LCD_Rs232
说明:Keypad, LCD and RS232 in AVR and CodeVisionAVR<Thanh Xuan> 在 2025-06-27 上传 | 大小:138kb | 下载:0
[CA认证] MICCAIworkshopCVII_2
说明:The segmentation of structure from 2D and 3D images is an important rst step in analyzing medical data. For example, it is necessary to segment the brain in an MR image, before it can be rendered in 3D for visualization purposes. Segmentation<patel> 在 2025-06-27 上传 | 大小:140kb | 下载:0
[CA认证] jCryption-2.0
说明:In short words jCryption is a javascr ipt HTML-Form encryption plugin, which encrypts the POST/GET-Data that will be sent when you submit a form.<KimarU> 在 2025-06-27 上传 | 大小:143kb | 下载:0
[CA认证] DES
说明:可以用于多位二进制数加密解密的DES算法,在main函数中给出了使用范例,使用者可以比较并且了解到DES的雪崩效应。-Can be used for a number of binary encryption and decryption of DES algorithm, using the example given in the main function, the user can compare and understand the avalanche effect of DES.<子木> 在 2025-06-27 上传 | 大小:137kb | 下载:0
[CA认证] crc_rec_fin
说明:A cyclic redundancy check (CRC) is an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data.<jamal almelhany> 在 2025-06-27 上传 | 大小:139kb | 下载:0