找到约 773 条结果
www.eeworm.com

Adaptive Splitting Protocols for RFID tag Collision Arbitration 防碰撞算法的程序

Adaptive Splitting Protocols for RFID tag Collision Arbitration 防碰撞算法的程序
2014-01-25 10:40:14 下载 56 查看 1,055
www.eeworm.com

description of evoting protocols to be implemented via very secure codes and its bugs and full revie

description of evoting protocols to be implemented via very secure codes and its bugs and full reviews
2017-04-13 20:01:01 下载 168 查看 1,069
www.eeworm.com

An e-book on wireless ad-hoc and sensor networks introduction to protocols and platforms

An e-book on wireless ad-hoc and sensor networks introduction to protocols and platforms
2017-09-12 10:46:02 下载 20 查看 1,096
www.eeworm.com

Securing Linux_A Survival Guide for Linux Security Version 1.0

Securing Linux_A Survival Guide for Linux Security Version 1.0
2013-12-19 16:11:09 下载 112 查看 1,110
www.eeworm.com

我的security 的学习笔记.可以看看卡

我的security 的学习笔记.可以看看卡
2015-11-30 10:11:02 下载 88 查看 1,046
www.eeworm.com

The public key infrastructure (PKI) is the foundation and center of network security architecture no

The public key infrastructure (PKI) is the foundation and center of network security architecture now
2014-01-23 21:38:02 下载 35 查看 1,074
www.eeworm.com

this is e -book that could bring you to understand more about security

this is e -book that could bring you to understand more about security
2013-12-19 19:23:02 下载 61 查看 1,117
www.eeworm.com

压控振荡器.ms9 (Security copy)

压控振荡器.ms9 (Security copy)

2022-10-06 05:30:02 下载 3 查看 5,830
www.eeworm.com

射极跟随器.ms9 (Security copy)

射极跟随器.ms9 (Security copy),模拟电路仿真实验资料

2022-10-13 08:50:01 下载 9 查看 9,639
www.eeworm.com

屏幕保护程序是什么

屏幕保护程序是什么,相信大家都用过,但对于它的结构也许就不那么熟悉了。
2015-09-09 20:15:01 下载 117 查看 1,103
www.eeworm.com

Suitable for small RS projects and test protocols for

Suitable for small RS projects and test protocols for hardware developing.
2014-01-25 10:04:01 下载 188 查看 1,124
www.eeworm.com

Telecontrol equipent and systems Part5:Transmission protocols Section 103 Companion standard for t

Telecontrol equipent and systems Part5:Transmission protocols Section 103 Companion standard for the
2016-01-24 20:18:02 下载 164 查看 1,076
www.eeworm.com

JRed is a 100% Java implementation of the IrDA infrared communications protocols. JRed lets you beam

JRed is a 100% Java implementation of the IrDA infrared communications protocols.
2013-12-11 13:10:02 下载 35 查看 1,087
www.eeworm.com

Auerbach.Wireless.Mesh.Networking.Architectures.Protocols.and.Standards.Dec.2006 无线Mesh 网络

Auerbach.Wireless.Mesh.Networking.Architectures.Protocols.and.Standards.Dec.2006 无线Mesh 网络
2014-01-24 06:50:01 下载 138 查看 1,066
www.eeworm.com

Maximum Security (First Edition) 网络安全 英文版

Maximum Security (First Edition) 网络安全 英文版
2015-07-23 10:11:01 下载 69 查看 1,054
www.eeworm.com

ServerU Security Serv-U软件密码加密函数.

ServerU Security Serv-U软件密码加密函数.
2013-12-11 08:54:02 下载 37 查看 1,067
www.eeworm.com

In this paper, we provide an overview of the security concerns introduced by wireless LANs, current

In this paper, we provide an overview of the security concerns introduced by wireless LANs, current approaches
2015-11-02 00:08:01 下载 25 查看 1,069
www.eeworm.com

An Immunological Model of Distributed Detection and its Application to Computer Security(PhD thesis)

An Immunological Model of Distributed Detection and its Application to Computer Security(PhD thesis)
2015-11-25 10:51:02 下载 189 查看 1,091
www.eeworm.com

EMV v4.2 Book2:Security and Key Management

EMV v4.2 Book2:Security and Key Management
2013-12-26 00:00:12 下载 178 查看 1,085
www.eeworm.com

USB disk security for usb disk virus kill removal tool.

USB disk security for usb disk virus kill removal tool.
2013-12-28 08:12:01 下载 86 查看 1,127
‹ 上一页 1 2 3 4 5 6 7 8 9 10 11 12 ... 39 下一页 ›