搜索资源列表
Oracle-cloud-computing-strategy.pdf
- Oracle 云计算战略 • 提供私有云和公有云两种解决方案供客户选择 • 提供全面、集成的 SaaS、PaaS 和 IaaS 产品 • 让客户根据业务需要采用云 最小面积的矩形。由于各种包装 是不可数无穷的,成功优化的关键问题 是有限的解空间的引进,其中包括一个 最佳解决方案。本文提出了这样一个解决方案空间 每个包装的代表由一对模块的名称序列, 被称为序列对。通过模拟搜索这个空间 退火,数百个模块已挤满有效地 证明
Birthday-Attack
- This Birthday attack document that tells about birthday attack with example.-This is Birthday attack document that tells about birthday attack with example.
SQL-injection
- SQL INJECTION ATTACK TECHNIQUES AND COUNTERMEASURES ANALYSIS sql注入的学术论文,想法很独特,值得一看 -SQL INJECTION ATTACK TECHNIQUES AND COUNTERMEASURES ANALYSIS sql injection papers, the idea is unique and worth a visit
solutions-eight-queens-problem
- 八皇后问题要求在一个8X8的棋盘上放上8个皇后,使得每一个皇后既攻击不到另外七个皇后,也不被另外七个皇后所攻击-Eight queens problem requirements put eight queens on a 8x8 board, making a queen both attack less than seven other Queen or seven Queen' s attack
Watermark-steganography-attack
- 介绍水印攻击和隐写分析的算法与调用的函数等-Introduction watermark attacks and steganography algorithms and call functions, etc.
virtools-lab-report
- virtools应用,在文章中提到了,基于virtools 引擎开发,游戏中连续攻击系统,脚本代码的编写,分享给需要的朋友-virtools applications mentioned in the article, based on virtools engine development, the game continuously attack the system, the scr ipt code is written to share a friend in need
gongfang
- 网络攻击与防御内容的的一些简单介绍,可以给读者了解网络的一些基层知识,便于学习。-Some brief content network attack and defense, you can give the reader understand some basic level of knowledge networks, to facilitate learning.
A-New-Attack-on-RSA-and-CRT-RSA
- A New Attack on RSA and CRT-RSA