在网络安全中经常会遇到rootkit
在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对r...
在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对r...
contains documents related to adaptive beamforming algorithms for Wideband Code Division multiple ...
A Convex Hull is the smallest convex polygon that contains every point of the set S. A polygon P is ...
Auctions are among the oldest economic institutions in place. They have been used since antiquity to...
SPREAD SPECTRUM MODULATION TECHNIQUES -spread spectrum - those modulation methods that are producin...
Novell.Press.Linux.Kernel.Development linux内核开发的经典书籍之一 The Linux kernel is one of the most interes...
Java Extreme Programming Cookbook offers more than just a collection of cut-and-paste code. Each rec...
Frequency domain characterization of los nonfading indoor wireless LAN channel employing frequency a...
Introduction ? ? The ARM Cortex -A8 microprocessor is the first applications microprocessor in A...
Architecture and Implementation ? ? Cortex -A8 of the ARM Microprocessor October 2005...