This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It s detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive.
標(biāo)簽: up-to-date only cutting-edge material
上傳時(shí)間: 2017-07-09
上傳用戶:comua
ImpulseC Codeveloper fft code. This file implements the hardware portion of a 256 sample FFT using a radix-4 algorithm. This implementation demonstrates that results similar to hand-coded HDL can be achieved using the C language, and without using a low-level style of C code.
標(biāo)簽: Codeveloper implements ImpulseC hardware
上傳時(shí)間: 2014-01-16
上傳用戶:hustfanenze
linux book, this book is about linux programing. i hope it will help you. i am glad to share my files. thanks :) Moving to Linux Second Edition
標(biāo)簽: linux book programing about
上傳時(shí)間: 2014-11-30
上傳用戶:wfl_yy
The code for this article was written for version 1.0 of the Active Template Library (ATL). The current version of the code (in SieveATL) was built with Visual C++ 6.0 and the ATL provided with that compiler. It may be slightly different than the code shown in the article. The directory SieveMFC contains an MFC version of a component equivalent to the ATL version discussed in the article. It was built with version 5 of the C++ compiler and the MFC version provided with it. The code discussed in the article was later adapted for Hardcore Visual Basic, Second Edition. Comparable Visual Basic versions are discussed in Chapter 10 of the book. Bruce McKinney
標(biāo)簽: The for Template Library
上傳時(shí)間: 2013-12-01
上傳用戶:古谷仁美
This software is developed to provide ease with controller design. For PID control, options are given to design and analyse the compensated and uncompensated system. You are free to choice among Proportional PI, PD and PID mode of control. Both frequency and time domain characteristics can be observed. Special Menus are given to observe time and frequency response plots. For Statefeedback controller similar options are given. But this is limited to second order system only.
標(biāo)簽: controller developed software control
上傳時(shí)間: 2017-07-25
上傳用戶:aysyzxzm
Those who are working on power system optimisatio, for them here is all the load flow programs from book hadi sadat. It i the 1st part. Second part is also uploaded in this site by me
標(biāo)簽: optimisatio programs working system
上傳時(shí)間: 2017-07-30
上傳用戶:xymbian
When trying to extract information from SAR images, we need to distinguish two types of image property. The more important is where properties of the scene (e.g., its dielectric constant, its geometry, its motion, etc.) produce effects in the image measurements or examination of the image then can provide information about the scene. The second is generated purely by the system and the signal processing.
標(biāo)簽: distinguish information extract trying
上傳時(shí)間: 2014-01-09
上傳用戶:huyiming139
simple clock display clock Dimensions,Draw the circle and numbers,Formats the date ,Font for number ,Color of main hands and dial,Color of second hand and numbers
標(biāo)簽: clock Dimensions the Formats
上傳時(shí)間: 2014-11-24
上傳用戶:wanqunsheng
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfigurable hardware for cryptographic applications are discussed from a systems perspective. Second, potential security problems of FPGAs are described in detail, followed by a proposal of a some countermeasure. Third, a list of open research problems is provided. Even though there have been many contributions dealing with the algorithmic aspects of cryptographic schemes implemented on FPGAs, this contribution appears to be the first comprehensive treatment of system and security aspects.
標(biāo)簽: cryptographic applications attractive for
上傳時(shí)間: 2013-12-07
上傳用戶:zhuimenghuadie
This short paper will give you some VHDL code examples that will help you design synchronous circuits that work first time.The philosophy behind Ten-Commandment code is that synthesizers are not to be trusted too much. Most of the code you will see is close to the structural level some more overtly than others.
標(biāo)簽: will synchronous you examples
上傳時(shí)間: 2014-12-01
上傳用戶:sjyy1001
蟲蟲下載站版權(quán)所有 京ICP備2021023401號(hào)-1