搜索资源列表
security
- 说明: 1、里面有什么: 1.1、org.bouncycastle.*下的所有软件是bouncycastle组织开发的软件包 1.2、org.infosecurity.*下的软件包括: DES_CBC算法的实现 RSA算法的实现(包括:密钥生成、公钥加密和私钥解密、数字签名及签名验证) 数字信封的实现 利用数字信封实现大文件的加密、解密。 2、有什么用: 2.1 研究、学习信息安全中的密码学设计与实现技术。 2
kill360.rar
- 破坏S360安全卫士的云查杀 点一下就可以实现 这个代码感觉很简单 但是很实用,S360 destruction killing the security guards of the cloud can be achieved by clicking on the feeling of this code is very simple but very practical
information-security-ppt
- 北京邮电大学计算机学院信息安全基础课课件(最新)。-Beijing University of Posts and Telecommunications Computer Science and Information Security Basic Course courseware (the latest).
opencsp
- 微软CSP实现源码。 CSP:密码服务提供者。 微软的CryptoAPI是PKI推荐使用的加密 API。其功能是为应用程序开发者提供在Win32环境下使用加密、验证等安全服务时的标准加密接口。CryptoAPI处于应用程序和CSP(cryptographic service provider)之间 。 -Microsoft CSP achieve source. CSP: Cryptographic Service Provider. Microsoft' s CryptoAP
security
- 一篇介绍网络安全的文档,内容详细,含有习题-a document contains the exercise, which is about the internet security
RSA
- This program applies Message Digest MD5 Algorithm Developed by Maimouna Al-ammar 5th Year, Computer Engineering Department, University of Damascus Information and Network Security Material
file_transfer
- 这是网络信息安全课程写的一个给文件加密传输的源代码,可以在局域网中进行文件传输,文件可以选择是否加密,很好的学习DES加密的源代码程序。-This is the network information security courses to write a file encryption to transfer the source code can be carried out in the local area network file transfer, file encryption c
Solutions-Crypto4e
- 《密码学与网络安全》 第四版 的习题解答,英文版-Cryptography and Network Security to answer the fourth edition of the exercise
linux_rootkits_for_beginners_from_prevention_to_r
- Linux rootkits basics for the beginners. Very good information for the newbiies in the security world.
ccrypt-1.9
- ccrypt is a command line utility for encrypting and decrypting files and streams. It was designed as a replacement for the standard Unix crypt utility, which is notorious for using a very weak encryption algorithm. ccrypt is based on the Rijndael cip
cryptography.tar
- Cryptography and Network Security, 4th Ed.-Stallings ebook. free to download
answer_for_Cryptography_and_Network_Security
- 密码编码学宇网络安全的答案 密码编码学宇网络安全的答案-answer for Cryptography and Network Security
winstadacl
- Good program example that works with the Windows Station and Desktop Security Editor. Contains good programming samples for working with Window Stations and Desktop Security, SACL, DACL and ACL in Windows
0-day-Security
- 0 day安全:软件漏洞分析技术.rar Source code-0 day security
Introduction-Ip-Security
- Cisco Press - An Introduction To Ip Security (Ipsec) Encryption (2003)
CryptographyAndNetworkSecurity2005
- Cryptography and network security
Caeseer
- Caseer: security algorithm Used for security of strings , messages and etc.
132
- Reliable communication is mission critical to Emergency and Rescue operations. MANET technology allowing communication where fixed infrastructure is not available is very attractive for this setting. Emergency and Rescue operations may take place
crypoprocessor
- This paper presents the design and implementation of a crypto processor, a special-purpose microprocessor optimized for the execution of cryptography algorithms. This crypto processor can be used for various security applications such as stor
FIDO Security Reference-20150514
- FIDO Security Reference-20150514