-
-
[
Unix_Linux]
LIDS.rar
... technologies, is a deception on the attacker' s technology, through the arrangement of some of the host as a bait, network services and information to induce them to attack those who attack reduce the system caused by the actual security threat.
-
[
Java/JSP]
paopaotang.rar
... chariot BNB? Because the game is like a bubble bomb bubble in the same parish. In this game, players control their own tanks to attack hard to ensure that they have a way out. Tanks game obstacles encountered by the main wall of the bomb (bubble). Can be ...
-
-
-
[
TEXT]
baowuyuan.rar
In the literature after the completion of this documentary, especially in the completion of the typing and proofreading manuscripts, after a huge attack on the guilty feeling in my heart. I can not but regret to inform you that the editor or the readers ...
Category:
IT Hero Upload User:
chinamxzg Size:
42K
-
[
PDF]
ApplicationofDigitalWatermarkingandthebenchmarking
... and the impact of image watermarking system, an important parameter based on a variety of digital watermarking typical way to attack a more complete analysis, the final typical of the existing benchmarks are discussed, pointing out their limitations.
-
-
[
Matlab]
gongji.rar
Watermark on the images embedded in a different attack to add noise, filter, shear, compression, rotating 45 degrees
-
[
Visual C++ (VC++)]
tcp.zip
... congestion window algorithm to attack the agreement TCP congestion window algorithm to attack the agreement TCP congestion window algorithm to attack the agreement TCP congestion window algorithm attacks blocking window algorithm to attack the agreement
-
[
Visual C++ (VC++)]
c__s.rar
The basis of network attack and defense, including the Trojan horse technology, two client and server code