资源列表
[其它文档] remove all negatives
说明:credit repair docs lllllll<airuphere2@protonmail.ch> 在 2022-02-16 上传 | 大小:1.57mb | 下载:0
[软件工程] PCI固件架构介绍
说明:介绍PCI固件结构以及初始化流程,对pci设备固件编程有帮助<zhouyou0220> 在 2022-02-16 上传 | 大小:353.94kb | 下载:0
[软件工程] Sony Ericsson Symbian UIQ Docs
说明:A set of docs regarding Sony Ericsson Symbian UIQ development<bashnik> 在 2022-02-17 上传 | 大小:3.82mb | 下载:0
[编程文档] Energy_detector_master
说明:Cognitive radios (CRs) have been proposed as a possible solution to improve spectrum utilization by enabling opportunistic spectrum sharing. The main requirement for allowing CRs to use licensed spectrum on a secondary basis is not causing interfer<yoyolataye2@gmail.com> 在 2022-02-18 上传 | 大小:1.76kb | 下载:0
[其它文档] 数电学习自用(文档+PDF书籍)
说明:数字电子技术基础简明教程_第三版_余孟尝.pdf+PPT 康华光五版数字课件 数电文档自用存<xingfubushiqingge> 在 2022-02-18 上传 | 大小:123.1mb | 下载:0
[软件工程] 网络预约出租汽车监管信息交互平台总体技术要求
说明:网络预约出租汽车监管信息交互平台总体技术要求<AlipayLogin_2088142338217977> 在 2022-02-22 上传 | 大小:19.29mb | 下载:0
[行业发展研究] STVAR
说明:matlab code for STVAR model<1002464393@qq.com> 在 2022-02-24 上传 | 大小:52.8kb | 下载:1
[软件工程] Cybersecurity Strategy Implementation1
说明:The Attack-Centric Strategy had the highest Cybersecurity Fundamentals Scoring System (CFSS) estimated total score. It earned nearly a perfect score with 95 points out of a possible 100.<iwc2007008> 在 2022-02-27 上传 | 大小:159.98kb | 下载:0
[软件工程] Cybersecurity Strategy Implementation2
说明:The Intrusion Kill Chain fr a mework is based on Lockheed Martin's paper Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains<iwc2007008> 在 2022-02-27 上传 | 大小:162.84kb | 下载:0
[软件工程] Cybersecurity Strategy Implementation3
说明:An Intrusion Kill Chain is the stages or phases that can be used in attacks by attackers.<iwc2007008> 在 2022-02-27 上传 | 大小:143.67kb | 下载:0
[软件工程] Cybersecurity Strategy Implementation4
说明:Once attackers have selected their target and have some understanding of where they are on the internet and the technologies they use, then they figure out how they are going to attack the victim. This phase is called Weaponization<iwc2007008> 在 2022-02-27 上传 | 大小:143.59kb | 下载:0
[软件工程] Cybersecurity Strategy Implementation5
说明:Once the attackers have successfully installed their tools on the victim's system, they can send commands to their tools or to the system itself.<iwc2007008> 在 2022-02-27 上传 | 大小:144.23kb | 下载:0