Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • securityGreenBook.pdf.tar.gz Security Green Book - Hacking - attack and defense
  • Man-in-the-middle.zip A typical man in the middle attack scenario
  • attack-0.0.rar File for Misuse AODV 2
  • attack-0.5.rar File for Misuse AODV 3
  • attack-1.0.rar File for Misuse AODV 4
  • attack-1.5.rar File for Misuse AODV 5
  • crapto1-v3.2.tar.gz Crapto1 sources for attack mifaree
  • DES.zip This particular algorithm is a brute force attack on the popular DES Encryption standard. The DES algorithm consists of 4 main classes which will be briefly discussed -The first class takes into consideration the assumption that the in the inputs are in ...
  • BEA_External_Why_TIBCO.rar BEA Attack Kit Why TIBCO? Why Customers Choose TIBCO over BEA Top Business Reasons Top Technical Reasons
  • 3.zip ... to capture any other using the standard chess queen s moves. The queens must be placed in such a way that no two queens attack each other. Thus, a solution requires that no two queens share the same row, column, or diagonal.This code is a solution for ...