资源列表

« 1 2 ... 4 5 6 7 8 910 11 12 13 14 ... 8594 »

[软件工程Sony IMX122

说明:Sony IMX122 full datasheet
<vk@doty.ru> 在 2022-02-03 上传 | 大小:1815633 | 下载:0

[软件工程Computer Sight Reduction

说明:Journa article on computer sight reduction by R. Flynn
<kwksel91@gmail.com> 在 2022-02-08 上传 | 大小:662982 | 下载:0

[软件工程optimal numerical control

说明:OPTIMAL CONTROL AND NUMERICAL SOFTWARE: AN OVERVIEW - ’Systems Theory: Perspectives, Applications and Developments’, Nova Science Publishers, Editor: Francisco Miranda.
<kwksel91@gmail.com> 在 2022-02-08 上传 | 大小:116756 | 下载:0

[软件工程PCF7936AS datasheet

说明:Security transponder PCF7936AS full datasheet
<serggod> 在 2022-02-10 上传 | 大小:153352 | 下载:1

[软件工程PCI固件架构介绍

说明:介绍PCI固件结构以及初始化流程,对pci设备固件编程有帮助
<zhouyou0220> 在 2022-02-16 上传 | 大小:362430 | 下载:0

[软件工程Sony Ericsson Symbian UIQ Docs

说明:A set of docs regarding Sony Ericsson Symbian UIQ development
<bashnik> 在 2022-02-17 上传 | 大小:4006928 | 下载:0

[软件工程网络预约出租汽车监管信息交互平台总体技术要求

说明:网络预约出租汽车监管信息交互平台总体技术要求
<AlipayLogin_2088142338217977> 在 2022-02-22 上传 | 大小:20225398 | 下载:0

[软件工程Cybersecurity Strategy Implementation1

说明:The Attack-Centric Strategy had the highest Cybersecurity Fundamentals Scoring System (CFSS) estimated total score. It earned nearly a perfect score with 95 points out of a possible 100.
<iwc2007008> 在 2022-02-27 上传 | 大小:163819 | 下载:0

[软件工程Cybersecurity Strategy Implementation2

说明:The Intrusion Kill Chain fr a mework is based on Lockheed Martin's paper Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains
<iwc2007008> 在 2022-02-27 上传 | 大小:166745 | 下载:0

[软件工程Cybersecurity Strategy Implementation3

说明:An Intrusion Kill Chain is the stages or phases that can be used in attacks by attackers.
<iwc2007008> 在 2022-02-27 上传 | 大小:147114 | 下载:0

[软件工程Cybersecurity Strategy Implementation4

说明:Once attackers have selected their target and have some understanding of where they are on the internet and the technologies they use, then they figure out how they are going to attack the victim. This phase is called
<iwc2007008> 在 2022-02-27 上传 | 大小:147037 | 下载:0

[软件工程Cybersecurity Strategy Implementation5

说明:Once the attackers have successfully installed their tools on the victim's system, they can send commands to their tools or to the system itself.
<iwc2007008> 在 2022-02-27 上传 | 大小:147692 | 下载:0
« 1 2 ... 4 5 6 7 8 910 11 12 13 14 ... 8594 »

源码中国 www.ymcn.org