CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Main Category
SourceCode
Web Code
Develop Tools
Document
Other resource
Search in result
Search
list
Sort by :
«
1
2
...
.76
.77
.78
.79
.80
267181
.82
.83
.84
.85
.86
...
267450
»
c#画图
Downloaded:0
c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图c#画图
Date
: 2022-02-24
Size
: 16kb
User
:
48411296@qq.com
STVAR
Downloaded:1
matlab code for STVAR model
Date
: 2022-02-24
Size
: 52.8kb
User
:
1002464393@qq.com
Tic Tac Toe terminal game
Downloaded:0
This is game Tic Tac Toe, which can be played in terminal
Date
: 2022-02-24
Size
: 2.43kb
User
:
cbcgzwrxufkzofaygz
transportation problem solver
Downloaded:0
excel spreadsheet useful for transportation problems solving
Date
: 2022-02-25
Size
: 7.96kb
User
:
813350
DVP-7635HE Linux Driver
Downloaded:0
Linux driver for DVP-7635HE source code. DVP-7635HE is a high-quality, high-performance capture device which is specially designed for high-definition video capture applications. It supports up to 4 channel of high-defin
Date
: 2022-02-25
Size
: 19.72mb
User
:
nopmeister@gmail.com
parasolid
Downloaded:2
三维几何建模造型内核的库文件。 Parasolid是世界上领先的、经过生产证明的三维几何建模组件软件。
Date
: 2022-02-25
Size
: 215.88kb
User
:
MonoKelvin
qca-ossl-2.0.0
Downloaded:0
qca的OPENSSL模块,支持SSL2、SSL3、TLS等协议,扩展qca的功能
Date
: 2022-02-26
Size
: 54.26kb
User
:
zhao_zz@139.com
Cybersecurity Strategy Implementation1
Downloaded:0
The Attack-Centric Strategy had the highest Cybersecurity Fundamentals Scoring System (CFSS) estimated total score. It earned nearly a perfect score with 95 points out of a possible 100.
Date
: 2022-02-27
Size
: 159.98kb
User
:
iwc2007008
Cybersecurity Strategy Implementation2
Downloaded:0
The Intrusion Kill Chain framework is based on Lockheed Martin's paper Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains
Date
: 2022-02-27
Size
: 162.84kb
User
:
iwc2007008
Cybersecurity Strategy Implementation3
Downloaded:0
An Intrusion Kill Chain is the stages or phases that can be used in attacks by attackers.
Date
: 2022-02-27
Size
: 143.67kb
User
:
iwc2007008
Cybersecurity Strategy Implementation4
Downloaded:0
Once attackers have selected their target and have some understanding of where they are on the internet and the technologies they use, then they figure out how they are going to attack the victim. This phase is called We
Date
: 2022-02-27
Size
: 143.59kb
User
:
iwc2007008
Cybersecurity Strategy Implementation5
Downloaded:0
Once the attackers have successfully installed their tools on the victim's system, they can send commands to their tools or to the system itself.
Date
: 2022-02-27
Size
: 144.23kb
User
:
iwc2007008
«
1
2
...
.76
.77
.78
.79
.80
267181
.82
.83
.84
.85
.86
...
267450
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.