没有合适的资源?快使用搜索试试~
我知道了~
文库首页
安全技术
网络安全
0722-3226 Military Technology 2019 043 011.pdf
0722-3226 Military Technology 2019 043 011.pdf
Military
Technol
需积分: 0
0 下载量
180 浏览量
2019-11-08
10:01:13
上传
评论
收藏
21.91MB
PDF
举报
温馨提示
立即下载
Military Technology 2019 年 043卷 011期...
资源推荐
资源评论
Military-Grade-5G-Use-Cases-and-Challenges.pdf
浏览:83
Military-Grade-5G-Use-Cases-and-Challenges.pdf
Cryptography - Wikipedia.pdf
浏览:155
加密学的英文wiki副本 Cryptography or cryptology is the practice and study of techniques for secure communication in...payment cards, digital currencies, computer passwords, and military communications.
Test Method Standard Microcircuits MIL-STD-883J.pdf
浏览:99
This standard establishes uniform methods, controls, and procedures for testing microelectronic devices suitable for use within Military and Aerospace electronic systems including basic environmental
Magos-Advantages-White-Paper.pdf
浏览:121
Magos offers the customer a cost effective and high performance detection and surveillance solution that was not accessible before to non-military customers due to high costs and complicated ...
Role-Based Access Controls.pdf
浏览:142
While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of .
Ebooks For Dummies Collection
浏览:67
5星 · 资源好评率100%
British Military History For Dummies.pdf ** Building A Web Site For Dummies 2nd Ed 2004.pdf Building Confidence For Dummies.pdf Building Flash Web Sites For Dummies.pdf Building Research Tools With ..
military-tools-geoprocessing-toolbox是用于ArcGISforDesktop和.zip
浏览:146
military-tools-geoprocessing-toolbox是用于ArcGISforDesktop和.zip
idec.rar_Modified_idec2.vhdl
浏览:19
2. You may use this core in any way, be it academic, commercial, or -- military. Modified or not.
Big Data and Visual Analytics-Springer(2017).pdf
浏览:159
Civilizations depend on technology and technology comes from knowledge. The integration of knowledge is the key for the twenty-first century problems. Data science in general and Big Data Visual ...
HJ080IA-01E.pdf
浏览:11
HJ080IA-01E LVDS 接口 LCD 屏幕的文档资料 HJ080IA-01E lcd use for PDA & Handheld, GPS, PSP, Industrial & Medical & Military, Laptop, Electronic Equipments;
Configuration Management MIL-HDBK-61.pdf
浏览:146
This military handbook provides guidance and information to DoD acquisition managers, logistics managers, and other individuals assigned responsibility for Configuration Management. Its purpose is to
Military FPS Hands Full gloves.rar
浏览:105
Military FPS Hands Full gloves.rar
Where_Wizards_Stay_Up_Late_The_Origins_Of_The_Internet.pdf
浏览:139
These inside stories tell how the development was initiated, funded, and guided by the visible hand of the US government, the monstrous military-industrial complex, and the universities. It also ...
Simple Military - Cartoon War.rar
浏览:124
Simple Military - Cartoon War.rar
Windows Forensic Analysis Including DVD Toolkit.pdf
浏览:152
in the military and involved in physical and communications security),I’ve met a lot of great people and done a lot of really interesting things.Over time, people have shared things with me that have.
[Gabi_Ben-Dor_Anatoly_Dubinsky_T._Elperin]_Applied(z-lib.org).pdf
浏览:99
High-speed impact dynamics is of interest in the fundamental sciences, e.g., astrophysics and space sciences, and has a number of important applications in military technologies, homeland security and
CRC Press - Investigating Computer-Related Crime.7z
浏览:154
The introduction of the IBM Personal Computer in 1982 fostered a technology revolution that has changed the way the world does business. Prior to that historic milestone, several personal computers ..
Failure Rate Sampling Plans and Procedures MIL-STD-690D.pdf
浏览:190
FR testing for the purpose of direct reference in appropriate military electronic parts established reliability (ER) specifications. Figures and tables throughout this standard are based on ...
E53494United States Military Academy, NY, USA.pdf
浏览:43
E53494United States Military Academy, NY, USA
BurpLoaderKeygen.jar.zip
浏览:165
网络安全-02-BurpSuite工具详细安装教程 BurpSuite注册机下载激活-BurpSuite工具 将BurpLoaderKeygen.jar & burpsuite_pro_v2023.4.5.jar 放置同一目录下 3.3.2 cmd命令行执行 java -jar BurpLoaderKeygen.jar >java -jar BurpLoaderKeygen.jar
最新版ISO/IEC 27001:2022、ISO 27002:2022中英文合集
浏览:103
5星 · 资源好评率100%
ISO 27001:2022英文版 ISO 27001:2022中文版(本人译稿,再也不改了版) ISO 27002:2022英文版 ISO 27002:2022中文版(本人译稿,再也不改了版) 全部为文字版PDF文件,带完整目录标签。
Goby红队版-win-x64-2.4.7版本
浏览:18
Goby红队专版:集成1500个poc和exp ,覆盖普通版本所有功能,开箱即用 使用方式: 解压后双击goby.exe运行即可 注意事项: 最新的漏洞不可以在线更新,可自行添加poc和exp 重要的事情说三遍 不要用于非法或未授权测试! 不要用于非法或未授权测试! 不要用于非法或未授权测试! 自行判断可刑性!
Chrome Header Editor 插件
浏览:118
Chrome Header Editor 插件 及 配置文件,旨在取消因流量异常或IP异常导致的谷歌人机验证。
ISO SAE 21434-2021 中文版.pdf
浏览:132
4星 · 用户满意度95%
ISO SAE 21434中文版
OpenVAS GVM 中文翻译补丁
浏览:29
自己制作的粗糙版 放入/usr/share/gvm/gsad/web/locales目录刷新浏览器即可
安全认证cisp教材全套
浏览:155
5星 · 资源好评率100%
cisp教材全套,最全的CISP电子版教材,总共20章节分20个PDF文件
STM32F103C8T6核心板-电路原理图1.PDF
浏览:47
E:\工作\..\STM32F103C8T6.SchDocSTM32F103C8T6核心板原理图源地工作室www.vcc-gnd.com源地工作室http://
软件工程导论(第六版)课后习题答案1
浏览:158
5星 · 资源好评率100%
第一章一、什么是软件危机?它有哪些典型表现?为什么会出现软件危机?软件危机是指在计算机软件开发、使用与维护过程中遇到的一系列严重问题和难题。它包括两方面:如何开
评论
收藏
内容反馈
立即下载
资源评论
资源反馈
评论星级较低,若资源使用遇到问题可联系上传者,3个工作日内问题未解决可申请退款~
联系上传者
评论
TwoBeOne
粉丝: 0
资源:
2
私信
上传资源 快速赚钱
我的内容管理
展开
我的资源
快来上传第一个资源
我的收益
登录查看自己的收益
我的积分
登录查看自己的积分
我的C币
登录后查看C币余额
我的收藏
我的下载
下载帮助
前往需求广场,查看用户热搜
最新资源
服务器搭建所需资源:static文件夹
Vue02的源码学习资料
Python 程序语言设计模式思路-行为型模式:访问者模式:在不改变被访问对象结构的情况下,定义对其元素的新操作
Vue01的相关代码资料
蓝桥杯单片机第十二届国赛题
Linux 常用命令参考手册, 日常运维的最佳拍档
常用的60个Linux常用命令
平台设备平台设备平台设备
串口串口串口串口串口串口
SA-1B json转mask图像python脚本
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功