搜索结果
找到约 331 项符合
SECOND 的查询结果
按分类筛选
- 全部分类
- 其他书籍 (45)
- 技术资料 (37)
- 书籍 (34)
- 单片机开发 (17)
- 其他 (16)
- matlab例程 (11)
- 书籍源码 (10)
- VC书籍 (10)
- 电子书籍 (9)
- 软件工程 (7)
- 数学计算 (7)
- 单片机编程 (6)
- 数值算法/人工智能 (6)
- 传感与控制 (6)
- Java编程 (6)
- 汇编语言 (6)
- 通讯/手机编程 (5)
- Linux/Unix编程 (5)
- 嵌入式/单片机编程 (5)
- Java书籍 (5)
- 可编程逻辑 (4)
- 驱动编程 (4)
- 通讯编程文档 (4)
- JavaScript (4)
- PCB相关 (3)
- 学术论文 (3)
- 测试测量 (3)
- uCOS (3)
- 人工智能/神经网络 (3)
- VHDL/FPGA/Verilog (3)
- VIP专区 (3)
- 电源技术 (2)
- DSP编程 (2)
- 文章/文档 (2)
- 数据结构 (2)
- 微处理器开发 (2)
- Delphi控件源码 (2)
- 系统设计方案 (2)
- 其他嵌入式/单片机内容 (2)
- 源码 (1)
- 论文 (1)
- C/C++语言编程 (1)
- uCOS编程 (1)
- 无线通信 (1)
- 接口技术 (1)
- 加密解密 (1)
- 操作系统开发 (1)
- 其他文档 (1)
- 技术书籍 (1)
- 技术教程 (1)
- ARM (1)
- 教程资料 (1)
- 游戏 (1)
- *行业应用 (1)
- 网络 (1)
- 多国语言处理 (1)
- J2ME (1)
- 其他行业 (1)
- Oracle数据库 (1)
- 软件设计/软件工程 (1)
- MySQL数据库 (1)
- SQL Server (1)
- 行业发展研究 (1)
- 能源行业(电力石油煤炭) (1)
其他书籍 If you have programming experience and a familiarity with C--the dominant language in embedded syste
If you have programming experience and a familiarity with C--the dominant language in embedded systems--Programming Embedded Systems, Second Edition is exactly what you need to get started with embedded software. This software is ubiquitous, hidden away inside our watches, DVD players, mobile phones ...
其他书籍 本文挡主要探讨一些web代码安全里比较隐秘
本文挡主要探讨一些web代码安全里比较隐秘,容易被程序员忽视的问题.
主要内容:
二次攻击[Second attack]
类型1:通过文件系统函数漏洞转换
类型2:通过SQL注射漏洞转换
类型3:通过正则表达式中转变量
类型4:通过编码/解码中转变量
数组变量的魅力
Code与系统
Code与http协议
漏洞挖掘 ...
加密解密 The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfi ...
书籍 Mobile Radio Channels
With this book at your fingertips, you, the reader, and I have something in common. We share
the same interest in mobile radio channels. This area attracted my interest first in autumn 1992
whenImovedfromindustrytoacademiatofindachallengeinmylifeandtopursueascientific
career. Since then, I consider ...
书籍 Plug In Electric Vehicles
Plug in Electric Vehicles (PEVs) use energy storages usually in the form of battery
banks that are designed to be recharged using utility grid power. One category of
PEVs are Electric Vehicles (EVs) without an Internal-Combustion (IC) engine
where the energy stored in the battery bank is the only so ...
书籍 Electric Vehicles in Smart Grids
Plug in Electric Vehicles (PEVs) use energy storages usually in the form of
battery banks that are designed to be recharged using utility grid power. One
category of PEVs are Electric Vehicles (EVs) without an Internal-Combustion
(IC) engine where the energy stored in the battery bank is the only so ...
技术资料 Linux IP 网络
This document is a guide to understanding how the Linux kernel (version 2.2.14 specifically) implements networking protocols, focused primarily on the Internet Protocol (IP). It is intended as a complete reference for experimenters with overviews, walk-throughs, source code explanations, and example ...
其他书籍 This document provides guidelines for integrating a discrete high speed USB host controller onto a f
This document provides guidelines for integrating a discrete high speed USB host controller onto a fourlayer
desktop motherboard. The material covered can be broken into three main categories: Board design
guidelines, EMI/ESD guidelines and front panel USB guidelines. Section 1.1 Background provides ...
其他书籍 This document provides guidelines for integrating a discrete high speed USB host controller onto a f
This document provides guidelines for integrating a discrete high speed USB host controller onto a fourlayer
desktop motherboard. The material covered can be broken into three main categories: Board design
guidelines, EMI/ESD guidelines and front panel USB guidelines. Section 1.1 Background provides ...
书籍源码 MATLAB Code for Optimal Quincunx Filter Bank Design Yi Chen July 17, 2006 This file introduces t
MATLAB Code for Optimal Quincunx Filter
Bank Design
Yi Chen
July 17, 2006
This file introduces the MATLAB code that implements the two algorithms (i.e., Algorithms
1 and 2 in [1], or Algorithms 4.1 and 4.2 in [2]) used for the construction of
quincunx filter banks with perfect reconstruction, linear ...