搜索结果

找到约 878 项符合 NetWork-shy 的查询结果

Linux/Unix编程 在网络安全中经常会遇到rootkit

在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor in ...
https://www.eeworm.com/dl/619/423501.html
下载: 79
查看: 1031

VxWorks Documentation for VxVorks 5.5. OS Libraries API Reference, Driver API Reference, BSP Developers Guid

Documentation for VxVorks 5.5. OS Libraries API Reference, Driver API Reference, BSP Developers Guide, Network Programmers Guide, Architecture Supplement for 68K, ARM, Coldfire, Hitachi, Xscale, MIPS, Pentium and PowerPC, Programmers Guide and more.
https://www.eeworm.com/dl/662/428049.html
下载: 136
查看: 1045

网络 ICC means Internet Communication Component,it has many classes and frameworks that help develop netw

ICC means Internet Communication Component,it has many classes and frameworks that help develop network and communication system.
https://www.eeworm.com/dl/635/430520.html
下载: 55
查看: 1059

通讯编程文档 Java has become a confusing world. Five years ago, there were few decisions to make once you start

Java has become a confusing world. Five years ago, there were few decisions to make once you started programming in Java—you used AWT for graphical user interfaces, sockets for network programming, and hacked together everything else you needed. Since then, though, the APIs available for the Jav ...
https://www.eeworm.com/dl/646/432566.html
下载: 117
查看: 1057

通讯/手机编程 WSNs being energy constrained systems, one major problem is to employ the sensor nodes in such a man

WSNs being energy constrained systems, one major problem is to employ the sensor nodes in such a manner so as to ensure maximum coverage and connectivity with minimal or optimal number of nodes and furthermore elongate network lifetime with maximum energy utilization. The problem addressed has b ...
https://www.eeworm.com/dl/527/433280.html
下载: 67
查看: 1040

游戏 java3D game engine design of the source [three-dimensionalvirtualrealitynetworkprogram] - "virtual

java3D game engine design of the source [three-dimensionalvirtualrealitynetworkprogram] - "virtual reality 3D network programming language VRML -- second-generation network programming language" CD Distribution
https://www.eeworm.com/dl/625/434629.html
下载: 199
查看: 1044

*行业应用 A Design and Implementation of The Online Shopping System Abstract: Along with the development

A Design and Implementation of The Online Shopping System Abstract: Along with the development of the computer ,the database technique is widespread in the application of Internet, more and more , providing more thoughtful and humanized service for the large network customer. Characteristic serv ...
https://www.eeworm.com/dl/631/438939.html
下载: 61
查看: 1141

软件设计/软件工程 This is Modbus RTU Protocl that i have written by Visual Basic to control Inverter N100 (Hyndai-Kor

This is Modbus RTU Protocl that i have written by Visual Basic to control Inverter N100 (Hyndai-Korea) and Multimeter(GE) via RS485 Network
https://www.eeworm.com/dl/684/440063.html
下载: 195
查看: 1068

其他书籍 This book is primarily intended for those student and working professionals that have the desire to

This book is primarily intended for those student and working professionals that have the desire to become network administrators.
https://www.eeworm.com/dl/542/440113.html
下载: 172
查看: 1049

文章/文档 This project concentrates on the deterministic approach. This guarantees the full coverage in mobile

This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
https://www.eeworm.com/dl/652/441081.html
下载: 163
查看: 1071