xjx001515 2019-05-14 17:09:13
Description: The fermentation of an event that saw the dispersal of an airplane must have started to take off sharply at the time of punch-in.
Plat: C/C++ | Size: 830KB | Downloads: 0
skyelves 2019-05-14 11:06:14
Description: the implementation of cmsketch and csketch
Plat: C/C++ | Size: 1KB | Downloads: 0
hu1111 2019-05-13 17:14:14
Description: Differential Equations in Evolutionary Game
Plat: matlab | Size: 95KB | Downloads: 3
Gewus 2019-05-11 22:28:09
Description: Complete Elliptic Curve Key Generation Programming Verification of Elliptic Curve Addition over Finite Fields Elliptic Curve Encryption and Decryption Verification Preparing experiment report
Plat: C/C++ | Size: 127KB | Downloads: 0
Gewus 2019-05-11 22:26:17
Description: Programming Implementation of Shamir(t,n) Key Sharing Scheme Generation and Distribution of Shared Secrets Recurrent Verification of Shared Key
Plat: Python | Size: 66KB | Downloads: 0
Yhooyon 2019-05-09 21:08:43
Description: FF1 conformal encryption code Java can be used for data desensitization technology
Plat: GO | Size: 23KB | Downloads: 0
Yhooyon 2019-05-09 21:07:20
Description: FF1 conformal encryption code Java can be used for data desensitization technology
Plat: Java | Size: 80KB | Downloads: 1
Erthrus 2019-05-08 21:36:46
Description: "Security Vulnerability Tracking" is a classic book. Software security has been developing rapidly. In the future, we will face dangerous attacks that we don't know today. This book mainly discusses the steps of security testing from the attacker's point of view and using the attacker's method, so as to promote your testing work and develop better software. This is not only a book for security testing, but also an excellent reference book for information security researchers.
Plat: Others | Size: 71223KB | Downloads: 2
rabuzi 2019-05-08 10:40:23
Description: tutorial of how to configure port scanner using aplication
Plat: WINDOWS | Size: 1093KB | Downloads: 0
aiai_cao 2019-05-07 21:36:12
Description: Use Python to become a top hacker, explain how to use Python to attack website and exploit vulnerabilities
Plat: Python | Size: 1427KB | Downloads: 6
aiai_cao 2019-05-07 21:28:06
Description: Data Analysis of Network Security, Network Security Based on Big Data Analysis
Plat: Python | Size: 4130KB | Downloads: 2
yaoganaihao 2019-05-07 17:50:00
Description: This is a classical FSC video recording software, which occupies less space and supports many types.
Plat: Others | Size: 3167KB | Downloads: 1
jianguo8001 2019-05-06 17:32:14
Description: TOPSEC AC USER GUIDE
Plat: Others | Size: 11322KB | Downloads: 0
KAN1234 2019-05-04 15:27:31
Description: Snort 2.0 intrusion detection technology book, detailed analysis of source code and intrusion technology.
Plat: Others | Size: 6387KB | Downloads: 0
大伟喂喂喂 2019-04-26 20:20:14
Description: By language source code, literature on system security, people in need to see it!!
Plat: Others | Size: 17002KB | Downloads: 0
zhaochangqing99 2019-04-26 11:03:11
Description: sourceinsight4.0Cracked Version Download Chinese Free Version
Plat: C/C++ | Size: 21023KB | Downloads: 4
desert85 2019-04-24 12:08:26
Description: Running test programming3
Plat: Visual C++ | Size: 556KB | Downloads: 0
锅锅guo 2019-04-23 21:54:26
Description: Student identity management, identity information increase, delete, modify.
Plat: Java | Size: 3100KB | Downloads: 0
kingini 2019-04-22 11:24:26
Description: security system using data
Plat: Java | Size: 6113KB | Downloads: 0
aimannaeem0 2019-04-16 15:47:10
Description: Its the matlab code with a .txt file
Plat: matlab | Size: 99KB | Downloads: 0
OliverZhu 2019-04-13 10:20:31
Description: Authenticated Key Exchange Protocol Based on Elliptic Curve Cryptosystem.pdf
Plat: WINDOWS | Size: 320KB | Downloads: 0
networkdisk 2019-04-12 21:37:35
Description: Record each batch of access to remote desktop IP, can be placed in the server, each time the server logs in will record the server's IP.
Plat: Visual Basic | Size: 1KB | Downloads: 1
大唐哥 2019-04-12 09:13:37
Description: Nmap, a scanning tool, has a very powerful function. It has a comprehensive grammar for port scanning.
Plat: PDF | Size: 41532KB | Downloads: 2
大唐哥 2019-04-12 09:11:28
Description: The analysis of many practical cases has been recorded, which is very helpful to the safety audit.
Plat: PDF | Size: 2056KB | Downloads: 0
大唐哥 2019-04-12 09:10:07
Description: A good book on Web security, which records a lot of web application security
Plat: PDF | Size: 18922KB | Downloads: 3
联合利华张 2019-04-07 07:28:53
Description: There are many ways to decompile, in fact, the most reliable is IL decompilation, but I'm not going to talk about IL decompilation, the underlying code, but Reflector.
Plat: C# | Size: 15136KB | Downloads: 1
1ver 2019-04-05 18:07:56
Description: KN visual cryptographic implementation, generating four key pictures, any two superposition will generate plaintext
Plat: matlab | Size: 4944KB | Downloads: 1
1ver 2019-04-05 18:04:53
Description: image covering implementation, generating four key pictures, any two superposition will generate plaintext
Plat: matlab | Size: 217KB | Downloads: 0
1ver 2019-04-05 18:03:44
Description: visual cryptographic implementation, generating four key pictures, any two superposition will generate plaintext
Plat: matlab | Size: 1733KB | Downloads: 0
周_粥 2019-04-03 21:41:38
Description: Parsing of LRC and SRT subtitle files written in C#
Plat: C# | Size: 62KB | Downloads: 0
Tags: