Categories
Technical
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Archive by Date
2012-08-06
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
Search Tag
Claver
giude
Baulogistik
reJokingMr
losing
Paretos
Abbildungen
Summertime
TinTin
易简方
douglas
Klopka
Itinerary
Plevris
Applicazioni
Schnellkurs
便利店
Troposphere
Anner
Glogow
MEIN
Antiguos
Atrium
Auger
Boathouse
MERRY
skyhawk
Spagna
Scrambling
copias
ungdom
ritable
technische
Forsythe
filosofia
Groissbock
holidays
dreamin
Anatomisch
Decima
pooh
Maneuvering
Ampacity
Optima
胡雪岩
约翰尼
Debuts
sulfure
upper
Geistiges
Technical Security/Hacking ebook
Technical Security/Hacking ebook
Security/Hacking 硬件工程师面试试题集 |
|
1、下面是一些基本的数字电路知识问题,请简要回答之。(1) 什么是Setup 和Hold 时间?答:Setup/Hold Time 用于测试芯片对输入信号和时钟信号之间的时间要求。建立时间(Setup Time)是指触发器的时钟信号上升沿到来以前,数据能够保持稳定不变的时间。输入数据 ... Tags : 试题 硬件工程师 面试 , Posted on 2010-06-01 | |
Security/Hacking Der IT Security Manager |
|
Gerhard Klett, "Der IT Security Manager" Vieweg+Teubner Verlag; 2008; ISBN: 3834804290; 252 pages; PDF; 1,3 MB Profitieren Sie von den Erfahrungen der Autoren. Mit diesem Buch erhalten Sie das aktuelle und zuverlässige Praxiswisse ... Tags : Manager Security , Posted on 2010-05-30 | |
Security/Hacking Security Technology |
|
Dominik Slezak, Tai-Hoon Kim, Wai-chi Fang, Kirk P. Arnett, "Security Technology" Springer; 2010; ISBN: 3642108466; 308 pages; PDF; 5,9 MB This volume constitutes the selected papers of the International Conference on Security Tech ... Tags : Technology Security , Posted on 2010-05-30 | |
Security/Hacking Hospital and Healthcare Security, Fifth Edition |
|
Russell L. Colling, Tony W. York, "Hospital and Healthcare Security, Fifth Edition"Butterworth-Heinemann ; 2009-11-10 ; ISBN: 1856176134 ; 720 pages; PDF; 28 MBConcerns about healthcare security have proliferated in recent years, with ... Tags : Fifth Hospital Edition Security Healthcare , Posted on 2010-05-30 | |
Security/Hacking 上海贝尔TCP/IP培训资料 |
|
在网上的两个计算机要通信,最终要利用它们的物理地址来联系。在局域网的技术中,使用最普遍的物理地址是MAC地址(以太网卡标识),它在以太网中唯一地标识了每个对象。MAC地址是一个48bit的整数。一般写成:U:V:W:X:Y:Z或U-V-W-X-Y-Z,U到Z是0~255的整数(常 ... Tags : 上海贝尔 资料 培训 , Posted on 2010-05-28 | |
Security/Hacking Network Security Assessment: From Vulnerability to Patch {Repost} |
|
Network Security Assessment: From Vulnerability to Patch Publisher: Syngress Publishing; ISBN: 1597491012; edition 2006; PDF; 417 pages; 10,5 mbThis book will take readers from the discovery of vulnerabilities and the creation of the ... Tags : Repost Assessment Patch Network Security , Posted on 2010-05-28 | |
Security/Hacking Hacking Windows Vista: ExtremeTech+Hacking Windows XP - Extreme Tech (Repost) |
|
Hacking Windows Vista: ExtremeTech+Hacking Windows XP - Extreme Tech Publisher: Wiley; ISBN: 0470046872+0764577220; edition 2007-2004; CHM+PDF; 334-379 pages; 24 mbHacking Windows Vista: ExtremeTechVista is the most radical revamping ... Tags : Repost Vista Tech Hacking Windows , Posted on 2010-05-28 | |
Newest
Security/Hacking Хакеры
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)