-
-
-
-
[
Delphi]
50-CALL.rar
delphi write several CALL. there are meditation CALL. the abolition of meditation CALL. there is a general attack CALL. games useful test No. 2008.9.26
-
[
Java/JSP]
mychess.rar
... and two white, and then put black, placed must be able to attack White, and then between two black White black. White placed the same when asked to attack black and white between the black white. Can not place a pawn until ...
-
[
Unix_Linux]
syn_flood.c.tar.gz
SYN attack code is running under linux, we can learn from this example, but do not use this code to attack other people
-
[
C/C++]
lanqiujifenjishiqi.rar
Basketball scoreboard timer, accurate timing, scorecards, and with the countdown, cumulative time, and the attack time, and with alarm function
Category:
SCM Upload User:
brightzhh Size:
9K
-
[
Matlab]
jiyudct.rar
DCT-domain digital watermarking source code. Watermark embedding, watermark detection, attack experiment to test the robustness, an important parameter calculation. Want to do digital watermarking XDJM help.--
-
[
Visual C++ (VC++)]
zte.zip
ZTE interview questions southward to attack Liu Bei Cao Cao, Liu Bei and Guan Yu Shou send jinzhou, Zhang Fei and Guan Yu sent ... Shoucheng door. Liu Bei sent Zhuge Liang for help where Sun Quan. Sun Quan sent troops to attack Cao Cao! Please draw UML diagram
-
[
C/C++]
c++.rar
Senior C programmer, you attack tutorial. Explain in detail. Expert must-read information.
-