搜索资源列表
CyberCrime
- WHAT IS CYBER CRIME... and how to avoid it
SynScan
- Delphi Full SynScanner 2009 Diq3N PRogramming is now available u can with this doss attacks or syn scan. If u need contact with me : Root [at] Cyber-Root[dut]com
LanHouse
- cyber lan task( for lan users )
Cyber
- Internet Cafe Management (sample source code)
net_bar_mangage_system
- 这是个网吧管理系统 包括客户端和服务端。还有答辩的ppt功能很全面,希望对大家有用-This is a cyber cafe management system, including client and server. Ppt defense capabilities are very comprehensive, and hope for all of us
lsb1
- This was used at the 2004 Cyber Summer Camp This program hides a message image in the lower bit planes of a cover image
Kiosk-Control-System
- Online reservation system at cyber cafes/ Kiosks
OLEAuto
- MS Office Automation using C++” - this what I started searching over the internet a few weeks back to plot a graph in an Excel sheet through my program. Fortunately, I got a few - actually very few - inputs from the cybe
pso_in_SD
- 最新SD期刊上关于改进型PSO算法,我是通过学校内部数据库在SD下载的哦!包括《A dynamic inertia weight particle swarm optimization algorithm》、《Adaptive Particle Swarm Optimization》、《Cyber Swarm Algorithms – Improving particle swarm optimization using adaptiv
a
- 基于C++的网络嗅探器系统的设计与实现 可以进行数据包的解析和了解-Zero-day cyber attacks such as worms and spy-ware are becoming increasingly widespread and dangerous. The existing signature-based intrusion detection mechanisms are often not sufficient
Evolution_of_Cyber_Crime.pdf.tar
- Evolution of cyber crime
textbook01
- XML report cyber 교 육 자 료 -XML report cyber 교 육 자 료
CyberCafe
- source code cyber cafe
CYBER-MICE-PARTY-
- 电子老鼠走迷宫的模拟过程 包括友好的展示界面-Electronic Mouse Maze of the simulation process including the friendly display interface
A-Simulation-System-for-Multi-Mobile-Events-in-WS
- Sensor networks are a sensing, computing and communication infrastructure that are able to observe and respond to phenomena in the natural environment and in our physical and cyber infrastructure. In this paper, we inv
CyberNT3_public
- 第六届飞思卡尔杯智能车竞赛的上海交通大学Cyber++队的比赛源代码。基于DSC MC56F83-Smart Car for MC56F8366
GetNetworkResInfo
- VC实例代码程序,如何获取计算机网络资源信息。-How to access the computer cyber source information
cyberlinkJAVA
- cyber的UPnPjava开发包 -The package for UPnP-Java Development,Good Source,Thankyou!
a_cyber_cafe_billing_system
- to avoid cyber crime
IMAGE-STEGANALYSIS-USING-BINARY-SIMILARITY-MEASUR
- Steg-Analysis Using Chi-Square Test, aims at the analysis of digital images that are transmitted through the cyber space for encoded hidden messages using Chi-Square test, a statistical approach.