搜索结果

找到约 1,339 项符合 Information Theory 的查询结果

按分类筛选

显示更多分类

加密解密 This program applies Message Digest (MD5) Algorithm Developed by Maimouna Al-ammar

This program applies Message Digest (MD5) Algorithm Developed by Maimouna Al-ammar 5th Year, Computer Engineering Department, University of Damascus Information and Network Security Material
https://www.eeworm.com/dl/519/476072.html
下载: 27
查看: 1051

技术资料 InsideOLE2

iniside ole 很不错的资料,对于很想学好com的人来说真是不可多得的资料!-iniside CNES very good information
https://www.eeworm.com/dl/911035.html
下载: 6
查看: 1408

其他书籍 The Linux kernel is one of the most interesting yet least understood open-source projects. It is als

The Linux kernel is one of the most interesting yet least understood open-source projects. It is also a basis for developing new kernel code. That is why Sams is excited to bring you the latest Linux kernel development information from a Novell insider in the second edition of Linux Kernel Developme ...
https://www.eeworm.com/dl/542/170032.html
下载: 72
查看: 1130

其他书籍 The Linux kernel is one of the most interesting yet least understood open-source projects. It is als

The Linux kernel is one of the most interesting yet least understood open-source projects. It is also a basis for developing new kernel code. That is why Sams is excited to bring you the latest Linux kernel development information from a Novell insider in the second edition of Linux Kernel Developme ...
https://www.eeworm.com/dl/542/179427.html
下载: 168
查看: 1096

教育系统应用 This software designs the student result management system m ay replace the tedious low effect the m

This software designs the student result management system m ay replace the tedious low effect the manual management, has realized the result management, the information management and the curriculum manages three big cores functions.
https://www.eeworm.com/dl/621/200194.html
下载: 91
查看: 1071

软件设计/软件工程 The intended use of this help manual is a quick reference guide as it is not fully inclusive of all

The intended use of this help manual is a quick reference guide as it is not fully inclusive of all elements of the PL/SQL Programming Language. Please refer to the PL/SQL User s Guide and Reference for more information.
https://www.eeworm.com/dl/684/208003.html
下载: 57
查看: 1079

电子书籍 信息安全与保密的一些PPT文件

信息安全与保密的一些PPT文件,对初学者可以了解概况,Information security and confidentiality of PPT document for beginners can understand Profiles.
https://www.eeworm.com/dl/cadence/ebook/218413.html
下载: 121
查看: 1055

加密解密 This program applies Simplified DES (S-DES) Ciphering Algorithm Developed by Maimouna Al-ammar 5t

This program applies Simplified DES (S-DES) Ciphering Algorithm Developed by Maimouna Al-ammar 5th Year, Computer Engineering Department, University of Damascus Information and Network Security Material
https://www.eeworm.com/dl/519/476053.html
下载: 124
查看: 1075

书籍 The Next Generation CDMA Technologies

This book addresses the issues on the development of next generation CDMA technologies and contains a lot of information on the subject from both the open literature and my own research activities in the last fifteen years.
https://www.eeworm.com/dl/522155.html
下载: 1
查看: 81

技术资料 20090412142015541

这本书是介绍关于中国电力百科全书的知识的。-This book is information on China&#39 s power of knowledge encyclopedia.
https://www.eeworm.com/dl/907004.html
下载: 8
查看: 7794