CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 文档资料 搜索资源 - Penetration

搜索资源列表

  1. the_wireless_network_in_digital_family

    0下载:
  2. 随着数字家庭技术的不断进步,数字产品日益渗透到社会生活的各个领域,这些为未来数字家庭的实现奠定了基础。本文从数字家庭中无线网络的角度出发,分析了家庭无线网络应满足的技术要求;从普通数据传输和支持流媒体应用等方面比较了目前市场上家庭无线网络技术解决方案的特点;结合数字家庭中对数据传输的要求,着重描述了目前主流无线网络的技术发展走向,最后介绍了家庭无线网络的多种新应用模式。-the continuous advancement of technology, the growing penetrati
  3. 所属分类:行业发展研究

    • 发布日期:2008-10-13
    • 文件大小:814925
    • 提供者:麦克狼
  1. 0706.0655v2

    0下载:
  2. A cylindrical wave expansion method is developed to obtain the scattering field for an ideal two-dimensional cylindrical invisibility cloak. A near-ideal model of the invisibility cloak is set up to solve the boundary problem at the inner boundar
  3. 所属分类:Document

    • 发布日期:2017-05-01
    • 文件大小:521807
    • 提供者:Jason
  1. MAS

    0下载:
  2. With increasing wind penetration in power systems, many national grid codes will demand complete models and simulation studies under different system conditions in order to ensure that the connection of a wind farm will not have a detrimental i
  3. 所属分类:software engineering

    • 发布日期:2017-03-23
    • 文件大小:49854
    • 提供者:Malek Drif
  1. xinxiku

    0下载:
  2. 安全加固 渗透测试 等等一系列的学习资料!内容比较全面-Security penetration testing, and so a series of reinforcement learning materials! More comprehensive content
  3. 所属分类:Project Manage

    • 发布日期:2017-04-02
    • 文件大小:600111
    • 提供者:T程序员
  1. 23_1400_sksalman_01

    0下载:
  2. With increased penetration of wind power into electrical grids, DFIG wind turbines are largely deployed due to their variable speed feature and hence influencing system dynamics. This paper presents simulation results of a Grid-connected DFIG. A
  3. 所属分类:Project Design

    • 发布日期:2017-04-17
    • 文件大小:205394
    • 提供者:rafath
  1. Metasploit-Testers-Guide

    0下载:
  2. 原版Metasploit渗透平台指南,Metasploit是可以自由获取的开发框架。它是一个强大的开源平台,供开发,测试和使用恶意代码,这个环境为渗透测试,shellcode 编写和漏洞研究提供了一个可靠平台。-The original Metasploit penetration platform guide, Metasploit, free access to the development framework. It is a powerful open-source platform
  3. 所属分类:software engineering

    • 发布日期:2017-05-17
    • 文件大小:5010951
    • 提供者:Yuxiao
  1. WEP-crack

    0下载:
  2. Crack WEP tutorial with new festures. With client or without client. Very fast and robust sistem test penetration Crack WEP tutorial with new festures. With client or without client. Very fast and robust sistem test penetration
  3. 所属分类:File Formats

    • 发布日期:2017-06-17
    • 文件大小:27049450
    • 提供者:adriano
  1. TCP-NAT-P2P-

    0下载:
  2. 这是基于TCP协议的NAT穿透技术在P2P中的研究与实现的pdf文件,包括原理,穿透过程,很有参考价值-This is the penetration process of TCP NAT traversal in P2P pdf file, including the principle of great reference value! !
  3. 所属分类:Communication

    • 发布日期:2017-03-23
    • 文件大小:203676
    • 提供者:庄叶丹
  1. Control_of_a_Multilevel_Converter_for_Power_Quali

    0下载:
  2. High penetration of wind energy into the grid may introduce stability and power quality problems due to the fluctuating nature of the wind and the increasing complexity of the power system. By implementing advanced functionalities in power converters
  3. 所属分类:File Formats

    • 发布日期:2017-04-09
    • 文件大小:3078145
    • 提供者:hocine
  1. Metasploit.Penetration.Testing

    0下载:
  2. Penetration testing is one of the core aspects of network security in today s scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system s major com
  3. 所属分类:Communication

    • 发布日期:2017-05-16
    • 文件大小:4131658
    • 提供者:ahmed
  1. BackTrack-5-Wireless-Penetration-Testing---2011.r

    0下载:
  2. Wireless Networks have become ubiquitous in today s world. Millions of people use them worldwide every day at their homes, offices, and public hotspots to log on to the Internet and do both personal and professional work.
  3. 所属分类:Communication

    • 发布日期:2017-05-31
    • 文件大小:13343075
    • 提供者:ahmed
  1. Network-Reconfiguration-in-Balanced-and-Unbalance

    0下载:
  2. Network Reconfiguration in Balanced and Unbalanced Distribution Systems with High DG Penetration
  3. 所属分类:Development Research

    • 发布日期:2017-04-03
    • 文件大小:892757
    • 提供者:farzad
  1. 11

    0下载:
  2. 基于良性蠕虫的网络渗透测试方案设计,是自己写的,可供参考。-Network penetration testing program design based benign worm, write your own, for reference.
  3. 所属分类:Project Design

    • 发布日期:2017-04-24
    • 文件大小:97728
    • 提供者:林品乐
  1. C-game-programming

    0下载:
  2. 本书以C语言游戏编程入手,以102个实例,近200个函数较为系统地介绍了C基于游戏编程与开发的方法与技巧,内容丰富并相互包容,相互渗透。以实际的基于不同平台的游戏制作为背景,知识阐述与实际案例结合,深入浅出,具体、直观、全面,可操作性强;是一本难得的集入门、深入到精通C游戏编程的综合书籍。-The book starts with C game programming language, of which 102 cases, nearly 200 functions systematicall
  3. 所属分类:software engineering

    • 发布日期:2017-05-26
    • 文件大小:9195150
    • 提供者:木小马
  1. Improving-the-penetration-level-of-PVs-

    0下载:
  2. This paper proposes the use of a common DC link in residential buildings to allow customers to inject theirsurplus power that otherwise would be limited due to AC power quality violation. The surplus powercan easily be transferred to other phases and
  3. 所属分类:Development Research

    • 发布日期:2017-03-28
    • 文件大小:870857
    • 提供者:s
  1. IEEE_06652

    0下载:
  2. Coordination Assessment of Overcurrent Relays in Distribution Feeders with High Penetration of PV Systems
  3. 所属分类:Development Research

    • 发布日期:2017-04-07
    • 文件大小:271298
    • 提供者:hassan
  1. 6-barasi-sistem-tahrik-dar-zhenator-haye-tolid-ba

    0下载:
  2. Coordination Assessment of Overcurrent Relays in Distribution Feeders with High Penetration of PV Systems
  3. 所属分类:Development Research

    • 发布日期:2017-05-17
    • 文件大小:4932733
    • 提供者:hassan
  1. A stochastic, contingency-based security-constrained optimal power flow for the procurement of energy and distributed re

    0下载:
  2. It is widely agreed that optimal procurement of reserves,with explicit consideration of systemcontingencies, can improve reliability and economic efficiency in power systems.With increasing penetration of uncertain generation resources, this optimal
  3. 所属分类:行业发展研究

    • 发布日期:2014-07-14
    • 文件大小:387701
    • 提供者:tahomatab
  1. P2P_PPT

    0下载:
  2. p2p的穿透原理,这个可以加深路由器nat的理解,更能掌握其中的运行机制。-p2p principle of penetration, this can deepen the understanding of nat router, a better grasp of where the operating mechanism.
  3. 所属分类:software engineering

    • 发布日期:2017-04-04
    • 文件大小:168649
    • 提供者:lxjlhyy
  1. penetration

    0下载:
  2. PENETRATION USING KALI AND HACKING BOOK
  3. 所属分类:software engineering

    • 发布日期:2017-06-13
    • 文件大小:20579548
    • 提供者:asm
« 12 »
搜珍网 www.dssz.com