搜索资源列表
security
- 说明: 1、里面有什么: 1.1、org.bouncycastle.*下的所有软件是bouncycastle组织开发的软件包 1.2、org.infosecurity.*下的软件包括: DES_CBC算法的实现 RSA算法的实现(包括:密钥生成、公钥加密和私钥解密、数字签名及签名验证) 数字信封的实现 利用数字信封实现大文件的加密、解密。 2、有什么用: 2.1 研究、学习信息安全中的密码学设计与实现技术。 2
Syngress.RFID.Security.Apr.2006.eBook-DDU
- RFID.Security指南 安全性是rfid的重要因素,本书详细探讨了rfid的安全性问题,英文-RFID.Security Guide rfid safety is an important factor, The book explored in detail the rfid security issue, English
Cisco.Press.Network.Security.Fundamentals.Sep.2004
- This a book about network security and SNMP .-This a book about network security and SN MP.
OReilly[1].Network.Security.Tools.Apr.2005.eBook-L
- security tools 介绍了各种安全工具,很好的书-security tools introduced various security tools, very good book
Security.aspx
- 登陆的安全设置,主要防止没有登陆就进入其他界面-landing the security settings, mainly to prevent any landing on to other interface
Windows-Vista-Kernel-Security-[EN]
- Windows Vista Kernel Security, 对象了解系统底层以及系统安全的人很有帮助
RFID-tags-security-and-the-individual
- RFID – An introduction RFID tags, security and the individual-When I lastwrote for CSLR, RFID tagswere but a glimmer in some scientist’s eye. The thought that by 2006 they would be in everyday use [even if we did not know it] was unthinkable.
TMS.Security.System.v2.4.Full.Source.Delphi
- delphi组件,用于与操作系统安全有关的操作,控件中对底层的API函数,作了大量封装。哈哈,用起来就一个字“爽”-delphi components, with the operating system for security-related operations, controls on the bottom of the API function, made a large number of packages. Haha, to use one word on the " Sm
SIP-Protocol-and-Security-Mechanism
- 详细介绍了SIP协议栈的原理与其中的安全加解密机制,对于设计实际的安全语音传输系统有一点的借鉴指导作用-Detailed introduces the principle of SIP protocol stack and encryption security mechanism, to design the actual safety voice transmission systems have a reference guide effect
Sensor-Network-Security-A-Survey
- 本文是一篇关于传感器网络安全的综述,详细地从各个层介绍了它的研究情况。-Wireless sensor networks(WSNs) use small nodes with constrained capabilities to sense,collect,and disseminate information in many types of applications.As sensor networks become wide-spread,security issues become
1-Security-Issues-in-Wireless-Sensor-Networks---I
- Wireless sensor network in security
WebDemo_spring-security
- 初学spring security权限管理时自己跑通的源码,使用了oracle作为数据库.工程架构是ibatis+spring+struts-Beginners spring security through rights management to run their own source code when using the oracle as the database. Engineering framework is ibatis+ spring+ struts
Five-Essential-Elements-of-WiMAX-Security
- Five Essential Elements of WiMAX Security
Cyber-Security-and-Power-System
- 在智能电网方面的论文 智能电网的网络安全方面的 希望对大家有帮助-The introduction of “smart grid” solutions imposes that cyber security and power system communication systems must be dealt with extensively. These parts together are essential for proper electricity transmissio
Android Security Internals.pdf
- ANDROID SECURITY INTERNALS An In-Depth Guide to android's security architecture
4. Information Forensics & Security
- Base Papers for Network Security
5G evolution of user mobile security
- In this paper they have discussed various security issues of 4G with respect to Wi-max and long term evolution. These issues are discussed at MAC and physical layer level. The security issues are seen in terms of possible attacks, system vulnerabili
(App) Delphi Component - Tms Security System
- TMS Security system pack delphi 7 source code
security
- Approach: NS-2 is an open source system that is developed using C++ and Tool Control Language TCL. Researchers can freely add new components to the system to server their own purposes. The latest version of NS-2 is version 2.28. Within this version,
FIDO Security Reference-20150514
- FIDO Security Reference-20150514