搜索资源列表
S6_1
- VC对位图的操作比较烦琐,要显示一个位图到对话框上去,很麻烦。我在开发的过程中走通了两条路:一是使用Kodak图象编辑控件;二是利用Microsoft提供的例子中的一个类,并稍加改造。两种方法各有优缺点。我把它写下来,以避免其他人多走弯路。-VC right bitmap comparison cumbersome, to show that a bitmap to boost dialog, a lot of trouble. In the development process, taki
A_Beginner1698821242004
- Encrypts and Decrypts a file. This is not an \"uncrackable\" type of encryption but once you can understand the basics of this type of file encryption you CAN make better ones than me. This is just a quick example of basic encryption. Highly commente
TPIWebSearchControl
- 用.net C#开发的检索的组件,对C#开发的程序类模块的很好实例-use. Net C# development of the retrieval of components for the development of the C# module type process is a good example
入侵检测技术
- 入侵检测技术ppt教案- Teaching plan of Intrusion Detection Technology.File type ppt
dminid
- 入侵检测中的数据挖掘方法研究.pdf-A Research into Data Mining Technology in Intrusion Detection. file type pdf
NatCheck
- 更加消息来对网络类型进行判断,目标网络是属于那种nat类型-More messages to determine the type of network, the target network is one of those types of nat
Main_Chens
- Chen式吸引子方法用于混沌时间序列的分析,懂得可以拿来参考一-Chen type attractor method is used to chaotic time series analysis, can be used to reference this week
xss
- 主要介绍web站点常遇到的跨站攻击种类和如何防御。-Describes the type of cross-site attack web sites and how often encountered defense.
uplod-1
- Constant k filters, also k-type filters, are a type of electronic filter designed using the image method. They are the original and simplest filters produced by this methodology and consist of a ladder network of identical sections of passive compone