Examples showing the use of Certificate Revocation Lists (CRLs) and Online Certificate Status Protoc
Examples showing the use of Certificate Revocation Lists (CRLs) and Online Certificate Status Protoc...
Examples showing the use of Certificate Revocation Lists (CRLs) and Online Certificate Status Protoc...
In this edition, the majority of the book is dedicated to covering the Winsock API. Chapter 1 starts...
Intrusion Detection:Host-based Network Intrusion Detection • At each host, monitor all incomi...
This document describes the uIP TCP/IP stack. The uIP TCP/IP stack is an extremely small implementat...
THIS CODE IS FOR EXAMPLE PURPOSES ONLY, USE AT YOUR OWN RISK, NO WARRANTY IS ASSUMED OR IMPLIED ...
In this paper, we describe the development of a mobile butterfly-watching learning (BWL) system to ...
DS-CDMA通信系统中的空时移动信道估计,原文发表在IEE PROCEEDING OF COMMUNICATION上...
Dropbear is an SSH 2 server, designed to be usable in small memory environments. It supports: ...
This m file analyzes a coherent binary phase shift keyed(BPSK) and a amplitude shift keyed(ASK) comm...
This directory contains an example ADSP-BF535 subroutine that demonstrates the initialization of t...