资源列表
afr
- 1. Create the Virus Program. * * 2. The Virus Modifies IDT to Get Ring0 Privilege.-1. Create the Virus Program.** 2. The Virus Modifies IDT to Get Ring0 Privilege.
一
- 计算机组成原理,模拟实现计算机指令系统的功能-computer composition theory, the computer simulation of the instruction function
supplementaryFigures
- 叙述了多种matting算法 包括贝叶斯 泊松 closed-form spectral matting等-Described a variety of matting algorithm including the Bayesian Poisson closed-form spectral matting on, etc.
C++ Coding Standard
- 这是关于c++语言的一些定义和标准 对了解怎样设计语言非常有帮助 -This the language of c definitions and standards for understanding how the language is very helpful
使用vsftpd架设FTP服务器
- 使用vsftpd架设FTP服务器(使用vsftpd架设FTP服务器.pdf)-erecting use vsftpd FTP server (using vsftpd FTP server set up. Pdf)
遗传算法原程序
- 源程序,遗传算法源程序-source, genetic algorithm source!
含边界变异的粒子群算法
- 含边界变异的粒子群算法 PDF文件-border variation with the PSO algorithm PDF files!
zz00
- 哈夫曼编码的C程序代码 不知道是不是正确的 是我转载别人的程序-Huffman coding in C code do not know if I am correct procedures reproduced others
JVT-C028
- 这里都是264的文档,自己看了后就能看懂,还有参考代码一起看可以进步快。-documents themselves will be able to understand after reading them, reference code can be read together faster progress.
JVT12
- 这里都是264的文档,自己看了后就能看懂,还有参考代码一起看可以进步快。-documents themselves will be able to understand after reading them, reference code can be read together faster progress.
VIIP2005
- 这里都是264的文档,自己看了后就能看懂,还有参考代码一起看可以进步快。-documents themselves will be able to understand after reading them, reference code can be read together faster progress.
Hacking-techniques-complete-set
- 黑客攻击技术一整套,很好地讲述了黑客攻击的技术,很值得细细学习。-A complete set of hacking techniques, well about the technology of hacker attacks, is worthy of careful study.