搜索资源列表
6DOF
- 导弹六自由度仿真模型,并且仿真了导弹攻击一个匀速直线运动的目标的过程-missile six degree-of-freedom simulation model and simulation of a missile attack on a uniform linear motion of the target
honeypot
- 蜜罐系统是在服务器上,模拟不同的服务器,然后让黑客去攻击,记录下其攻击的手段和内容-Honeypot system is on the server to simulate a different server, and then let the hackers to attack, to record the means and content of their attacks
honeypot
- 蜜罐系统是在服务器上,模拟不同的服务器,然后让黑客去攻击,记录下其攻击的手段和内容-Honeypot system is on the server to simulate a different server, and then let the hackers to attack, to record the means and content of their attacks
sjgjq
- 黑客工具 手机攻击器 可以攻击无聊骚扰人士-Cell phone hacking tools attack senseless harassment of people who can attack the device
1
- 雷击是严重自然灾害,被世界气象组织列为十大自然灾害之一。随着计算机技术和电子信息的不断发展,日益繁忙庞杂的事务通过高速电脑、自动化设备及通讯设备得以井然有序,而这些敏感电子设备的工作电压却在不断降低,其数量和规模不断扩大,因而它们受到过压特别是雷电袭-Lightning is a serious natural disasters, by the World Meteorological Organization as one of the top ten natural disasters.
vertex
- 该程序可用于计算无后缘后掠角的平板梯形翼在小攻角时升力与升力系数-This program can be used to calculate the plate without posterior trapezoidal wing sweep angle of attack in the small lift and lift coefficient
vpn_hotel_fangan
- 连锁酒店解决方案: 由于商务型、游客型的客人占大部分的酒店住房比例,这些客人多半有收发MAIL、实时通、Skype、数码相机传输、浏览网页等方面的需求,因此是否能提供优质的宽带上网服务,可以说是酒店市场决胜的关键之一。 总和来说,目前酒店行业的网络建置需求,主要分为两大层面,第一个层面是针对单一的酒店内部,酒店业者普遍希望可以部署畅通、稳定、不易受攻击的酒店网络。第二个层面是针对连锁型酒店,希望可以建立总部、各地分店、甚至移动用户间互连互通的网络系统,实现总部可在第一时间掌握各分
StudentManage
- 用mfc制作的学生袭击管理系统 实现功能: 1、动态添加学生信息,包括学号,姓名,各科成绩,总成绩 2、实现列表显示学生信息 3、列表显示的方式选择:按姓名显示、学号显示 4、有添加、修改、删除等操作 5、查询功能,分为按姓名查询和按学号查询等-Students produced with mfc attack management system to achieve functions: 1, dynamically add student information
renzhigongji
- 一种解决认知无线电网络模仿主用户攻击问题的方案,对认知无线电的攻击理论进行了补充-A solution to mimic the main users of cognitive radio networks attack the problem, on the theory of cognitive radio was supplemented by the attacks
LAN-ARP-attack
- ARP 以后,对整个网络会有点影响,监听也只能监听一部分,不象同一HUB下的监听。对被监听者会有影响,因为他掉了一部分数据。 当然还有其他一些应用,需要其他技术的配合。以下是send_arp.c的源程序 -ARP after a bit of the whole network, monitor only a part of listening, not listening, as under the same HUB. Have an impact on those who are lis
SEO
- 攻能强大的企业网站SEO优化标准站V3.0-Attack can be a powerful enterprise website SEO optimization standard station V3.0
cxcy
- 黑鹰桨叶升力/阻力/力矩系数随迎角变化数据模型-The paddle lift/drag/moment coefficient different angles of attack data
GPNattackzone
- 中程空空导弹火控系统广义比例导引攻击区绘制程序(vs2012编译平台下编写)-Attack zone under the generalized proportional guidance law(programmed in visual studio 2012)
Shock-Wave-Calculation
- 用CFD方法计算超声速下小攻角翼型产生的激波-CFD method with a small angle of attack under supersonic shock wave generated airfoil
I-st-Demo-Code-with-noise-added
- discrete wavelet and svd based watermarking with 12 type of attack included
fangzheng0
- 该程序是对飞行器的航迹进行模拟。包括3个文件,主程序是fangzhen.m,可以反映出飞行器高度、速度、攻角等参数对飞行器航迹的有效-The program is a simulated aircraft track. Includes three files, the main program is fangzhen.m, can reflect the aircraft altitude, speed, angle of attack of the aircraft trajectory p
angleOfg2b
- 基于simulink建立了飞机六自由度模型,并计算其迎角。-Based on simulink established six degrees of freedom model aircraft, and calculate the angle of attack.
Fluent-history-result-postprocess
- Fluent软件通常用于航空航天领域,本程序可以实现对Fluent计算结果的自动提取,并且按照来流迎角对升阻力、力矩系数排序,最后生成结果文件-Fluent software is typically used for aerospace applications, this program can achieve automatic extraction Fluent calculation results, and in accordance to the flow angle of att
LOIC-1.0.8-binary
- Low Orbit Ion Cannon (LOIC) is an open source network stress testing and denial-of-service attack application, written in C#. LOIC was initially developed by Praetox Technologies, but was later released into the public domain, and now is hosted on se
Network-risk-transfer-attack-model
- 网络风险攻击模型,分析网络中各节点的风险对后续阶段的影响-Network risk transfer attack model