找到约 773 条结果
www.eeworm.com
Adaptive Splitting Protocols for RFID tag Collision Arbitration 防碰撞算法的程序
2014-01-25 10:40:14
下载 56
查看 1,055
www.eeworm.com
description of evoting protocols to be implemented via very secure codes and its bugs and full reviews
2017-04-13 20:01:01
下载 168
查看 1,069
www.eeworm.com
An e-book on wireless ad-hoc and sensor networks introduction to protocols and platforms
2017-09-12 10:46:02
下载 20
查看 1,096
www.eeworm.com
Securing Linux_A Survival Guide for Linux Security Version 1.0
2013-12-19 16:11:09
下载 112
查看 1,110
www.eeworm.com
我的security 的学习笔记.可以看看卡
2015-11-30 10:11:02
下载 88
查看 1,046
www.eeworm.com
The public key infrastructure (PKI) is the foundation and center of network security architecture now
2014-01-23 21:38:02
下载 35
查看 1,074
www.eeworm.com
this is e -book that could bring you to understand more about security
2013-12-19 19:23:02
下载 61
查看 1,117
www.eeworm.com
压控振荡器.ms9 (Security copy)
2022-10-06 05:30:02
下载 3
查看 5,830
www.eeworm.com
射极跟随器.ms9 (Security copy),模拟电路仿真实验资料
2022-10-13 08:50:01
下载 9
查看 9,639
www.eeworm.com
屏幕保护程序是什么,相信大家都用过,但对于它的结构也许就不那么熟悉了。
2015-09-09 20:15:01
下载 117
查看 1,103
www.eeworm.com
Suitable for small RS projects and test protocols for hardware developing.
2014-01-25 10:04:01
下载 188
查看 1,124
www.eeworm.com
Telecontrol equipent and systems
Part5:Transmission protocols
Section 103 Companion standard for the
2016-01-24 20:18:02
下载 164
查看 1,076
www.eeworm.com
JRed is a 100% Java implementation of the IrDA infrared communications protocols.
2013-12-11 13:10:02
下载 35
查看 1,087
www.eeworm.com
Auerbach.Wireless.Mesh.Networking.Architectures.Protocols.and.Standards.Dec.2006
无线Mesh 网络
2014-01-24 06:50:01
下载 138
查看 1,066
www.eeworm.com
Maximum Security (First Edition) 网络安全 英文版
2015-07-23 10:11:01
下载 69
查看 1,054
www.eeworm.com
ServerU Security Serv-U软件密码加密函数.
2013-12-11 08:54:02
下载 37
查看 1,067
www.eeworm.com
In this paper, we provide an overview of the security concerns introduced by wireless LANs, current approaches
2015-11-02 00:08:01
下载 25
查看 1,069
www.eeworm.com
An Immunological Model of Distributed Detection and its Application to Computer Security(PhD thesis)
2015-11-25 10:51:02
下载 189
查看 1,091
www.eeworm.com
EMV v4.2 Book2:Security and Key Management
2013-12-26 00:00:12
下载 178
查看 1,085
www.eeworm.com
USB disk security for usb disk virus kill removal tool.
2013-12-28 08:12:01
下载 86
查看 1,127