虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

LPI-Linux-<b>Certification</b>-in-a-Nuts

  • creat a certificate using makecert creat a PKCS#12.pfx file to store the private key Encrypte data

    creat a certificate using makecert creat a PKCS#12.pfx file to store the private key Encrypte data using the public Key in Certificate Decrypt data using the private key in a PKCS#12.pfx file

    标签: creat certificate Encrypte makecert

    上传时间: 2016-10-28

    上传用户:agent

  • 计算这个智力题: 在这个乘法算式里

    计算这个智力题: 在这个乘法算式里,每一个字母代表着0-9中的一个数,不同字母代表不同数。 A B C D E F G H * A J --------------------- E J A H F D G K C B D F H A J E C --------------------- C C C C C C C C C 请问,C 代表哪个数字?

    标签: 计算 乘法

    上传时间: 2013-12-30

    上传用户:stampede

  • This a GUI that manages DSP analysis functions for wav-files (e.g., speech signals). Two functions (

    This a GUI that manages DSP analysis functions for wav-files (e.g., speech signals). Two functions (plotps.m and spect.m) are included for starters. You may write your own functions and integrate that into the GUI without much hassle (see instructions in the accompanying readme.txt file). Additional features like the snipper lets you trim the time series and save it as a separate wav-file. The GUI is a great tool for instructors in a DSP course and DSP researchers alike!

    标签: functions wav-files analysis manages

    上传时间: 2016-11-09

    上传用户:从此走出阴霾

  • The DSKs or eZdspTM LF2407 and the DMC1500 make up a table top motor development system which allow

    The DSKs or eZdspTM LF2407 and the DMC1500 make up a table top motor development system which allows engineers and software developers to evaluate certain characteristics of the TMS320F240, TMS320F243, and TMS320LF2407 DSPs to determine if the processor meets the designers application requirements. Evaluators can create software to execute onboard or expand the system in a variety of ways.

    标签: development eZdspTM system allow

    上传时间: 2013-12-24

    上传用户:zhuoying119

  • This book is designed to teach you the best practices in developing Windows DNA applications. We ha

    This book is designed to teach you the best practices in developing Windows DNA applications. We have avoided making this book a primer on every technology associated with Windows DNA. If we had followed this course, this would be an encyclopedia set. Everyone has their favorite authors and books on the various technical subject areas. The market is full of books to teach you the basics, the how, this book tries to be different in that we pull out the important points to teach you about the why. If you need training in a particular technology covered in this book, Sams has a number of 24-hour and 21-day books that cover a wide range of topics.

    标签: applications developing practices designed

    上传时间: 2016-11-27

    上传用户:yyq123456789

  • The literature of cryptography has a curious history. Secrecy, of course, has always played a centra

    The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.

    标签: cryptography literature has Secrecy

    上传时间: 2016-12-08

    上传用户:fxf126@126.com

  • neural network utility is a Neural Networks library for the C++ Programmer. It is entirely object o

    neural network utility is a Neural Networks library for the C++ Programmer. It is entirely object oriented and focuses on reducing tedious and confusing problems of programming neural networks. By this I mean that network layers are easily defined. An entire multi-layer network can be created in a few lines, and trained with two functions. Layers can be connected to one another easily and painlessly.

    标签: Programmer Networks entirely network

    上传时间: 2013-12-24

    上传用户:liuchee

  • Process a binary data stream using a communication system that consists of a baseband modulator, c

    Process a binary data stream using a communication system that consists of a baseband modulator, channel, and demodulator. Compute the system s bit error rate (BER). Also, display the transmitted and received signals in a scatter plot.

    标签: communication modulator baseband consists

    上传时间: 2017-01-08

    上传用户:ardager

  • if an application works with restricted low level system calls, it must obtain a Microsoft Mobile2Ma

    if an application works with restricted low level system calls, it must obtain a Microsoft Mobile2Market privileged signature. To get a privileged signature, logo certification is now a requirement, not an option! This article shows how to abstract some of the most common issues a developer will encounter when creating a native code application that must be logo certified for each platform. windowsmobile5.0以上版本logo注册例子,可以加入自己的工程文件中。

    标签: application restricted Microsoft Mobile2Ma

    上传时间: 2017-01-16

    上传用户:13160677563

  • 本课题设计的双机通信系统

    本课题设计的双机通信系统,应能完成2台80X86PC机的串行通信。将数据从A机发送到B机,或从B机发送到A机。

    标签: 双机通信

    上传时间: 2014-07-13

    上传用户:stampede