The tool presented below tries to detect from remote if the target machine was compromised with the
The tool presented below tries to detect from remote if the target machine was compromised with the HACKER Defender root...
Finite+State+Machine技术资料下载专区,收录364份相关技术文档、开发源码、电路图纸等优质工程师资源,全部免费下载。
The tool presented below tries to detect from remote if the target machine was compromised with the HACKER Defender root...
This book described a kind of Virtual Machine named KVM , and described the concept of virtual machine.
visual integrity of the source code matching, can be directly used in machine vision is the important part
A Parallel program to multiply two matrices using Parallel Virtual Machine(PVM).Also a document to install PVM in linux...
C programs for adding two matrices parallely usinf Parallel Virtual Machine(PVM).It is working and can be used as a star...
this program can make the sound of machine in computer...I ve tried this for Windows XP,
决策树,Machine Learning, Tom Mitchell, McGraw Hill,第3章决策树源码
it s a code for calculator the price of a machine which have a lot of parts.
Browser-based (HTTP) file uploading is a great way to transfer arbitrary files from a client machine to the Web server w...
这是著名FEAP(Finite Element Analysis Program)程序的低版本(FEAP源代码没找到),包括了有限元的常用单元