-
-
[
Others]
048.rar
... system. Discussed in detail binary digital watermark embedding and extraction algorithms as well as the concrete realization, and its anti-attack capability of the analysis to a certain extent. Finally the use of MATLAB tools for the realization of a ...
-
[
PDF]
2-11.rar
Hackers attack and defense of the practice deception三十六计- Trojan disguised comprehensive analysis of technology
-
-
[
Visual C++ (VC++)]
md5.rar
File information using MD5 encryption, making the information during transmission to avoid being attack and tampering. Improve information security and stability.
-
-
-
[
Delphi]
dbserver1.30.rar
Legend DBSERVER attack DBSERVER legend browser source code browser source code attacks
-
-
-
[
Visual C++ (VC++)]
LongZuiXin.rar
Game: Mortal dinosaur steps: the arrow keys to control the direction of 0 and a small keyboard. Control attack and jump. Tip: the game is semi-finished products, the main framework and skills have been achieved, the other part of themselves to realize, ...
Category:
GDI-Bitmap Upload User:
yxjcsm Size:
3192K