搜索资源列表
security-chats
- 用java写的,网络安全聊天,用des加密聊天内容、用rsa加密进行对消息摘要进行签名、用md5对消息生成摘要等等。-Written using java, network security, chat, chat with des encryption, rsa encryption used to sign the message digest using md5 generates a summary of the news and so on.
OReilly---Linux-Security-Cookbook
- O Reilly - Linux Security Cookbook.zip
CSharp-data-security-manual-
- C#数据安全手册PDF书籍,对.net中通信数据安全的技术讲解详尽-C# Data Security Handbook PDF books on. Net in communications technology to explain the detailed data security
RFID-security-key-technology
- 。重点研究了RFID 防伪体系中关键技术的设计,利用RFID 中间件实现射频标签 和读写器相互认证;-Focuses on key technologies in the RFID security system design, the use of RFID tags RFID middleware And the reader mutual authentication
linux-security
- the code describes Linux security threads and management-the code describes Linux security threads and management
computer-security
- 关于计算机通信网络安全与防护策略的几点思考-On computer security and communications network protection strategy Thoughts
5.Ensuring-Data-Storage-Security-in-Cloud-Computi
- Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application sof
network-security-simulation
- 包括OMNET++框架下的用于入侵检测的工具distack,以及agent-based工具JADE,和NESSI,对研究网络安全方面的有较大帮助。-Including OMNET++ framework for intrusion detection tools distack, and agent-based tools JADE, and NESSI, the study of network security are of great help
security-doc-from-taiwan
- 来自台湾的大学的信息安全讲稿,作者是一个大公司的安全主管。-Security document from taiwan. Author is a leader in big company
B---Hacking-Exposed---Windows-Security-Secrets-a-
- Windows security secrets and solutions against hacker attacks
RFID-Security---F.-Thornton--B.-Haines--A.-Das--e
- RFID Security - F. Thornton, B. Haines, A. Das, et al - Syngress - 2006
ACHIEVING-DATA-SECURITY-IN-CLOUD-COMPUTING
- Data security in cloud computing....how to achieve...abstract document-Data security in cloud computing....how to achieve...abstract document..
The-database-security-manual
- 数据库安全方面的资料,对从事计算机安全方面的非常有帮助-The database security manual
security
- 网络安全通讯协议--实现三个阶段1,协商阶段。2,通讯阶段,3,链路拆除阶段-security communication protocol
Transmission-security
- 数据安全传输控制规范,主要介绍加密的相关内容-Transmission Control specification of data security
security
- asp.net的防止网页盗链方法,这也是参考别人的写法-security url
DES-security
- DES基于简单的代替-置换网络,进行16轮迭代,完成了扩散和混合操作,形成密文;DES加密算法的处理细节:DES对64bit明文输入首先进行IP变换,分成左右各32位的分组,然后进行16轮迭代,最后经过逆IP置换,输出该分组加密后的结果;对于DES的每一轮迭代,又先后经过选择运算E、异或伦密钥、S盒混合、P置换等步骤; -DES composed and a good application to keep your files security .
Resident-security-video-system
- 住宅区及商户安全视频监控系统,用于远程监控系统的通信保障-Residential and commercial tenants security video surveillance system
security-code(database)v1.1
- 生成防伪码,保证无任何完全一致的code, 可以保存到数据库,可以保存到txt文件,可以读取txt文件。-Generate a security code, exactly the same code can be saved to the database, can be saved to txt file, you can read txt files.
Practice-of-network-security-a
- 本书的特色是网络安全理论知识与实例代码完美的结合,使读者不仅可以从理论深度上对网络安全有宏观的认识,而且可以根据实例代码对网络安全措施有更直观的把握。(一)-The book features network security theory of knowledge and example code is a perfect combination, so that readers not only from the theoretical depth network security macr