Welcome![Sign In][Sign Up]
Location:
Search - cyber

Search list

[WinSock-NDIScyber cafe management.zip

Description: 一个完整的网吧管理程序,美国人写的.
Platform: | Size: 69939 | Author: | Hits:

[ComboBoxCyber_KeyBoard

Description: cyber keyboard for windows all version-cyber all keyboard for windows version
Platform: | Size: 76393 | Author: osman | Hits:

[Other resourceDCOMrumencode

Description: 《DCOM入门》随书源码 Chapter 1 (Distributed Computing) N/A Chapter 2 (DCOM Overview) N/A Chapter 3 (Objects) Basics Chapter 4 (Components) Basics Chapter 5 (Infrastructure) Infrastructure Chapter 6 (Building Components with ATL) OCRServer Chapter 7 (Using COM Objects) OCRClient Chapter 8 (COM in Cyberspace) Cyber Chapter 9 (Applying Security) Security Chapter 10 (Connecting Objects) Chat -"DCOM Easy" book with a source Chapter (Distributed Comp uting) N / A Chapter 2 (DCOM Overview) N / A Chapte r 3 (Objects) Basics Chapter 4 (Components) Bas ics Chapter 5 (Infrastructure) Infrastructur e Chapter 6 (Building Components with ATL) OCRS Chapter 7 servers (Using COM Objects) OCRClient C hapter 8 (COM in Cyberspace) Cyber Chapter 9 (Ap plying Security) Security Chapter 10 (Connect ing Objects) Chat
Platform: | Size: 656795 | Author: xiaoguang | Hits:

[Internet-Networkcyber cafe management

Description: 一个完整的网吧管理程序,美国人写的.-A complete Internet cafe management procedures, the Americans wrote.
Platform: | Size: 69632 | Author: ahe | Hits:

[Telnet Server(vc)

Description: 这是个黑客工具,可以进行。。。。。。。。。。。。网上攻击的哦-This a hacking tool that can be. . . . . . . . . . . . Oh, the cyber-attacks. .
Platform: | Size: 4806656 | Author: 李华柳 | Hits:

[ComboBoxCyber_KeyBoard

Description: cyber keyboard for windows all version-cyber all keyboard for windows version
Platform: | Size: 75776 | Author: osman | Hits:

[ERP-EIP-OA-Portal20078814258886

Description: 一个用vb实现的网吧管理系统,是一个vb的课程设计.-Using vb to achieve a cyber cafe management system, is a curriculum design vb.
Platform: | Size: 624640 | Author: 王晓宁 | Hits:

[Windows DevelopCyber-Time_6.0xxx_Server

Description: Billing system-cyber cafe management system
Platform: | Size: 18432 | Author: bhavesh | Hits:

[Software EngineeringCyber-Security

Description: Security Wireless security cyber security
Platform: | Size: 167936 | Author: hp | Hits:

[Software Engineeringcyber-cafe-management-PROPORSAL

Description: cyber cafe management PROPORSAL
Platform: | Size: 15360 | Author: NHAY | Hits:

[Internet-NetworkCyber-Security-and-Power-System

Description: 在智能电网方面的论文 智能电网的网络安全方面的 希望对大家有帮助-The introduction of “smart grid” solutions imposes that cyber security and power system communication systems must be dealt with extensively. These parts together are essential for proper electricity transmission, where the information infrastructure is critical. The development of communication capabilities, moving power control systems from “islands of automation” to totally integrated computer environments, have opened up new possibilities and vulnerabilities. Since several power control systems have been procured with “openness” requirements, cyber security threats become evident. For refurbishment of a SCADA/EMS system, a separation of the operational and administrative computer systems must be obtained. The paper treats cyber security issues, and it highlights access points in a substation. Also, information security domain modeling is treated. Cyber security issues are important for “smart grid” solutions. Broadband communications open up for smart meters, and the
Platform: | Size: 579584 | Author: hahavi | Hits:

[OtherA-perceptually-relevant-model-based-cyber-threat-

Description: Cyber attacks remain elusive and are increasingly effective. Information security professionals regularly monitor network resources and cyber security websites with an interest in understanding how such threats expose their enterprise’s vulnerabilities and dependencies. However, information must be persistently and purposefully examined from a multitude of resources in order to establish context and situational awareness. This in turn, enables organizations to perceive, anticipate and counteract threats before they occur and helps assure their ability to accomplish their missions. Global information must be transformed into timely and local actionable knowledge.
Platform: | Size: 551936 | Author: ahmed | Hits:

[ConsoleCyber-Management-System

Description: Mini Project in C Cyber Management System. This mini project in C Cyber Management System utilizes various features of C like Socket, Multithreading, and more. It can prove to be very useful for C languages learners who are beginners in the programming field. File handling has been used as to store records. Understanding this project will help you create management softwares or your own mini projects like employee record, bank management, library management, etc. The whole project is divided into two programs, one for the client and one for the server.-Mini Project in C Cyber Management System. This mini project in C Cyber Management System utilizes various features of C like Socket, Multithreading, and more. It can prove to be very useful for C languages learners who are beginners in the programming field. File handling has been used as to store records. Understanding this project will help you create management softwares or your own mini projects like employee record, bank management, library management, etc. The whole project is divided into two programs, one for the client and one for the server.
Platform: | Size: 62464 | Author: | Hits:

[OtherCyber-Shell

Description: it belongs to cybernetworking which helps people to become aware of the novel cyber shells and how the portal exits
Platform: | Size: 10240 | Author: Bhargava | Hits:

[Otherwhite-paper-of-cyber-physical-system

Description: 信息物理系统白皮书,中国工信部于2017年3月份发布,对信息物理系统的含义进行了界定,并且提供了当前的一些实例-Cyber physical system
Platform: | Size: 3475456 | Author: 曾阿牛 | Hits:

[Crack HackCyber Security W S

Description: cyber security material-programmes and documents
Platform: | Size: 24026112 | Author: nena | Hits:

[Other2 cyber crime-Lect 2- 120117

Description: Basics of cyber learning
Platform: | Size: 71680 | Author: Pikudi | Hits:

[Othercyber_resilience_paper_2014

Description: Paper on Cyber SEcurity Resilience
Platform: | Size: 195584 | Author: SanthoshKumarC | Hits:

[OtherAnt-Based Cyber Security

Description: 蚂蚁算法的安全问题,运用蚂蚁算法,解决黑客,防盗等安全问题(ant-based cyber--describe a swarming-agent-based, mixedinitiative approach to infrastructure defense where teams of humans and software agents defend cooperating organizations in tandem by sharing insights and solutions without violating proprietary boundaries.)
Platform: | Size: 1520640 | Author: asjs333 | Hits:

[Network DevelopCyber Arms_ Security in Cyberspace

Description: Cyber Arms_ Security in Cyberspace PDF
Platform: | Size: 3412586 | Author: delta@deltalab.dev | Hits:
« 12 3 4 5 6 »

CodeBus www.codebus.net