Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • NIST SP800-45.pdf ... technology that underpins email is ubiquitous, it is well understood and attackers are able to develop attack methods to exploit the technology. Mail servers are also targeted because they (and public Web servers) must communicate to some degree with ...
  • NIST SP800-45v2.pdf ... technologies that underlie email are ubiquitous and well-understood by many, attackers are able to develop attack methods to exploit security weaknesses. Mail servers are also targeted because they (and public Web servers) must communicate to some degree ...
  • NIST SP800-81-2.pdf ... access to the resources whose domain names are handled by the attacked DNS components. This document presents guidelines for configuring DNS deployments to prevent many denial-of-service attacks that exploit vulnerabilities in various DNS components.
  • lssvm工具箱1_8.pdf ... . LS-SVMs are closely related to regularization networks [10] and Gaussian processes [51] but additionally emphasize and exploit primal-dual interpretations. Links between kernel versions of classical pattern recognition algorithms such as kernel Fisher ...
  • debian_ssh_rsa_2048_x86.tar.bz2 Debian OpenSSL Predictable PRNG Bruteforce SSH Exploit 解开Debian OpenSSL内的ssh钥匙只有65.536 ...
  • drozer-install-2.3.4.zip drozer是一款针对Android系统的安全检测框架,Drozer可以通过与Dalivik VM,其它应用程序的IPC断电以及底层操作系统的交互,避免正处于开发阶段,或者部署于你的组织的Android应用程序和设备暴露出不可接受的安全风险。 drozer提供了很多Android平台下的渗透测试exploit供你使用和分享
  • 01.Is-Your-New-App-a-Candidate-for-Cloud-Native-Development_-5x8... As architects and engineers have sought to exploit cloud computing, the essential drivers of cloud native architecture have become the following:Although the Cloud has its benefits, for many large organizations, it’s difficult to lift and shift all ...
  • 人脸识别、行人ReID图像分割 ... parsing model to bridge the cross-domain differences in terms of visual appearance and environment conditions and fully exploit commonalities across domains. Our proposed model explicitly learns a feature compensation network, which is specialized for ...
  • CVPR2019-ocr.zip ... and variable-length input sequences. In this paper, we exploit the outstanding capability of path signature to translate ... fully convolutional recurrent network (MC-FCRN) is proposed to exploit the multiple spatial contexts from the signature feature maps ...
  • CISSP 认证详细知识点总结-中英文对照翻译.docx ... 弱点)。 ■ A threat is the possibility that someone or something would exploit a vulnerability, intentionally or accidentally, and cause harm to an asset. ■ 威胁 ...