Welcome![Sign In][Sign Up]
Location:
Search - CONFIDENTIAL

Search list

[ARM-PowerPC-ColdFire-MIPS8051_2.4_tft_demo

Description: 8051 驱动2。4 寸 屏的的DEMO 代码,我公司最高机密代码, 一般不释放的,为了赚个分数,冒险顶出-8051 for 2.4 tft demo code, my company last advance confidential
Platform: | Size: 41984 | Author: 杨烈志 | Hits:

[Mathimatics-Numerical algorithmsBFAFormula_Dll

Description: 该项目是人体脂肪磅的计算公式,用于检测人体脂肪磅测量的各项参数是否准确,因计算公司具有保密性,采用动态库生成,其中包含计算公式和一个应用实例-The project is the formula for calculating the pounds of body fat, pounds of body fat measurements for the detection of the parameters are correct, because the company is confidential calculated using the generated dynamic library, which contains the formula and an application example
Platform: | Size: 7937024 | Author: 阿邹 | Hits:

[Linux-Unixyunabquan

Description: 云计算的概念越来越流行,而且云计算被认为是一种强大的商业模式,使用云计算,可以根据需要购买计算能力、磁盘存储、协作应用开发资源、客户关系管理(CRM),而且它非常灵活。但是采用云计算仍然存在很多的安全隐患和管理难题,例如确我们需要定没有把企业数据或者任何个人信息或其它机密信息至于风险之中。-Increasingly popular concept of cloud computing, and cloud computing is considered to be a powerful business model, the use of cloud computing, according to need to purchase computing power, disk storage, collaborative application development resources, customer relationship management (CRM), and it Very flexible. However, the cloud is still a lot of security risks and management challenges, such as do not we need to set the enterprise data or any personal information or other confidential information The risk.
Platform: | Size: 385024 | Author: ltl | Hits:

[Program docIT-Scenario-Analysis-Report

Description: Because of the role that Computing Professional holds in the information systems of an organization, which give them the right to access the highly confidential information stored in its information systems, because they often need to access it to execute various activities that are stated in the employment or sale contract. As a result, they may found some discrepancies about the data stored inside its information system, but what they should do under this kind of situations, because they usually signed not to disclose any information stored in its information system to other written its written permission. In the report, we will describe a typical scenario for this kind of situation.-Because of the role that Computing Professional holds in the information systems of an organization, which give them the right to access the highly confidential information stored in its information systems, because they often need to access it to execute various activities that are stated in the employment or sale contract. As a result, they may found some discrepancies about the data stored inside its information system, but what they should do under this kind of situations, because they usually signed not to disclose any information stored in its information system to other written its written permission. In the report, we will describe a typical scenario for this kind of situation.
Platform: | Size: 37888 | Author: leotiger | Hits:

[mpeg mp3ACTIONS-SDK

Description: 炬力MP3 SDK开发文档,属内部机密资料,和大家分享了-Actions MP3 SDK development documents, an internal confidential information to share with you
Platform: | Size: 1205248 | Author: sunxiao | Hits:

[Other05340574

Description: Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks
Platform: | Size: 1252352 | Author: nishant | Hits:

[Delphi VCLDateEdit

Description: EXPRESSDATEEDIT SOFTWARE COMPONENT PRODUCT(S). You may install and use one copy of the SOFTWARE COMPONENT PRODUCT(S), including any and all source code if provided, or any prior version legally licensed for the same operating system, on a single computer. The primary user of the computer on which the SOFTWARE COMPONENT PRODUCT(S) COMPONENT PRODUCT(S) is installed may make a second copy for his or her exclusive use on a portable computer. You acknowledge and agree that the SOFTWARE COMPONENT PRODUCT(S) in source code form remains a confidential trade secret of DEVELOPER EXPRESS CORPORATION.
Platform: | Size: 877568 | Author: Den | Hits:

[Crack HackDES

Description: 密码学的是算法,队东西进行保密,有很好的效果。-Cryptography is the algorithm, the team things confidential, have a good effect.
Platform: | Size: 77824 | Author: 仁山 | Hits:

[Crack HackRSA

Description: 密码学的是算法,队东西进行保密,有很好的效果。-Cryptography is the algorithm, the team things confidential, have a good effect.
Platform: | Size: 88064 | Author: 仁山 | Hits:

[Crack Hackjava-HUNXIAOQI

Description: 将源码混淆,是源码不仅具有保密性还能减少软件的大小。-The source confusion, is the source not only confidential but also to reduce the size of the software.
Platform: | Size: 267264 | Author: 折羽青鸟 | Hits:

[Communication-MobileA8000-HARDWARE-USER-GUIDE_V1

Description: Longsung GSM module A8000 Hardware User Guide Version: 1.0 Date: July 28, 2009 Doc ID: A8000_Hardware_User_Guide _V1.0 Status: Confidential / Released LONGSUNG GSM
Platform: | Size: 422912 | Author: Harley | Hits:

[OtherZeuS-2.0.8.9

Description: 曾经卖5000美元的ZeuS 2.0.8.9源码完整无密下载-5000 U.S. dollars was sold integrity of confidential source ZeuS 2.0.8.9 Download
Platform: | Size: 9644032 | Author: 力强 | Hits:

[Program docH2

Description: Hainan H2无线路由器电路图,公司机密文件,88E6083的Ethernet Switch控制芯片,工程部出图文件,-Hainan H2 wireless router circuit, the company confidential documents, 88E6083' s Ethernet Switch controller chip, the engineering drawing files,
Platform: | Size: 499712 | Author: 张生 | Hits:

[Program docH0

Description: Hainan H2无线路由器电路图(带USB无线),公司机密文件,88E6083的Ethernet Switch控制芯片,工程部出图文件,-Hainan H2 wireless router circuit (with USB wireless), the company confidential documents, 88E6083' s Ethernet Switch controller chip, the engineering drawing files,
Platform: | Size: 450560 | Author: 张生 | Hits:

[Otherjjff

Description: 若使用云计算,你的机密数据将由贵公司外面的人员来处理,所以可想而知:不是贵公司的员工完全可以访问这些数据。-The use of cloud computing, you will be your company' s confidential data outside of the staff to handle, so predictable: not your staff can access the data.
Platform: | Size: 304128 | Author: 黎明 | Hits:

[ARM-PowerPC-ColdFire-MIPSSC9800Pspecs

Description: 索智的cs9800芯片数据手册,保密的东西,外面下载不到的-Cable wise cs9800 chip data sheet, confidential things, not the outside download
Platform: | Size: 504832 | Author: 李锦龙 | Hits:

[OtherLabVIEW8

Description: 详细讲述了如何将labview8编写的文件转换为可执行文件,对保密源代码有用-Detail how to convert documents prepared labview8 executable file of the confidential source code useful
Platform: | Size: 131072 | Author: 新春 | Hits:

[Crack HackMD5

Description: MD5算法的作用是让大容量信息在用数字签名软件签署私人密匙前被"压缩"成一种保密的格式,很实用的哦。-Its role is to let the large capacity information in digital signature sign private key software before the "compression" into a confidential format.
Platform: | Size: 7168 | Author: hui | Hits:

[SCMST7100_DS_2005_September

Description: ST71XX Confidential for st40 / st231 ST DVB processors
Platform: | Size: 7299072 | Author: Senis | Hits:

[Special EffectsLSB

Description: 采用空域LSB算法实现秘密信息在24位真彩图象中的隐藏和提取-The use of airspace LSB algorithm of confidential information in 24-bit color images and extract the hidden
Platform: | Size: 3770368 | Author: longjianyu | Hits:
« 1 2 ... 5 6 7 8 9 1011 12 13 14 15 16 »

CodeBus www.codebus.net