-
-
[
Others]
jiaxajw.rar
international chess, if the Queen's decentralization 8 8 8* The International Chess chessboard, and makes between any two Queen's not attack each other, ask a number of ways, These methods can you find out?
-
-
-
[
C/C++]
Queen.rar
n* n chessboard placed on each other from attack of the n-Queens, according to chess rules we can see: Queen can attack the peer-pawn with the column with a slash
-
-
[
Visual C++ (VC++)]
fengyunyaliceshi8.0.rar
Fengyun stress testing is a DDoS attack software can simultaneously attack multiple targets, Trojans have been free to kill, background verification software, the effect of super. Attack types: TCP, UDP, ICMP, HTTP Get flood. Control can be ...
-
[
Others]
dentity-Based.rar
... bilinear Diffie-Hellman problem difficult to resolve under the assumption that the new proposal for adaptive chosen ciphertext attack is safe. with the traditional first signed encrypted program compared ciphertext of the program significantly reduced the ...
-
[
C/C++]
heikegongfang.rar
A book about a hacker attack and defense of the e-books, explained the process of a hacker attack and defense and some hackers code for entry-
-
[
Matlab]
attack_wmk.rar
Add watermark in image in the watermark extraction, the need to know the original watermark data and make the extraction and attack test
-