公務員信息管理系統 基于jsp的 由java SQL開發的無紙化辦公系統
上傳時間: 2013-12-17
上傳用戶:asdfasdfd
這是用JSP和SQL來開發的,基本完成了一個網上書店所要的功能,有待于加油的是細點
上傳時間: 2015-05-14
上傳用戶:開懷常笑
學生文件管理系統主要介紹SQL語言程序開發系列
上傳時間: 2013-12-28
上傳用戶:lanhuaying
The tar file contains the following files: ptfsf.c: heart of the perfect TFSF code ptfsf.h: header file for same ptfsf-demo.c: FDTD code which demonstrates use of perfect TFSF code. Essentially this program used to generate results shown in the paper ptfsf-file-maker.c: code to generate an incident-field file using the "perfect" incident fields ptfsf-demo-file.c: FDTD code which uses the perfect incident fields stored in a file fdtdgen.h: defines macros used in much of my code Makefile: simple make-file to compile programs Also include are some simple script files to run the programs with reasonable values. The code assumes a two-dimensional computational domain with TMz polarization (i.e., non-zero field Ez, Hx, and Hy). The program is currently written so that the incident field always strikes the lower-left corner of the total-field region first. (If you want a different corner, that should be a fairly simple tweak to the code, but for now you ll have to make that tweak yourself.)
標簽: ptfsf following the contains
上傳時間: 2013-11-28
上傳用戶:風之驕子
This a very simple Yee algorithm 3D FDTD code in C implementing the free space form of Maxwell s equations on a Cartesian grid. There are no internal materials or geometry. The code as delivered simulates an idealized rectangular waveguide by treating the interior of the mesh as free space/air and enforcing PEC (Perfect Electric Conductor) conditions on the faces of the mesh.
標簽: implementing algorithm Maxwell simple
上傳時間: 2015-05-14
上傳用戶:水中浮云
mysql使用手冊,包括安裝配置,sql語句的使用.
上傳時間: 2015-05-14
上傳用戶:ls530720646
I. Introduction This code exploits a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04-007 patch. II. Screenshots $ ./kill-bill.pl . kill-bill : Microsoft ASN.1 remote exploit for CAN-2003-0818 (MS04-007) by Solar Eclipse <solareclipse@phreedom.org> Usage: kill-bill -p <port> -s <service> host Services: iis IIS HTTP server (port 80) iis-ssl IIS HTTP server with SSL (port 443) exchange Microsoft Exchange SMTP server (port 25) smb-nbt SMB over NetBIOS (port 139) smb SMB (port 445) If a service is running on its default port you don t have to specify both the service and the port. Examples: kill-bill -s iis 192.168.0.1 kill-bill -p 80 192.168.0.1 kill-bill -p 1234 -s smb 192.168.0.1
標簽: I. vulnerability Introduction undisclosed
上傳時間: 2015-05-15
上傳用戶:xhz1993
SQL遠程管理程序的源碼,DELPHI做的.不需要控件
上傳時間: 2015-05-15
上傳用戶:yxgi5
The DES sound code with C
上傳時間: 2013-11-29
上傳用戶:曹云鵬
RSA code with C in the POS
上傳時間: 2013-12-28
上傳用戶:標點符號