找到约 10,000 条结果
www.eeworm.com

RFID Security protocols

RFID Security protocols
2013-12-20 08:26:08 下载 70 查看 1,040
www.eeworm.com

GSM Security and the protocols involves in a mobile environment authentication process

GSM Security and the protocols involves in a mobile environment authentication process
2017-05-01 20:16:01 下载 95 查看 1,078
www.eeworm.com

Linux安全教程linux-security

Linux安全教程linux-security
2013-12-29 15:57:06 下载 135 查看 1,048
www.eeworm.com

Wireless security Wireless security

Wireless security Wireless security
2014-01-17 09:58:02 下载 53 查看 1,038
www.eeworm.com

php security all about security

php security all about security
2013-12-21 09:57:07 下载 141 查看 1,058
www.eeworm.com

Modeling Wireless Protocols

Modeling Wireless Protocols
2017-04-02 10:27:02 下载 83 查看 1,042
www.eeworm.com

Mobile Telecommunications Protocols

Mobile telecommunications emerged as a technological marvel allowing for access to
personal and other services, devices, computation and communication, in any place and
at any time through
2020-05-30 08:40:08 查看 168
www.eeworm.com

Protocols, Algorithms, and Source Code

Protocols, Algorithms, and Source Code
2015-01-09 10:10:02 下载 108 查看 1,146
www.eeworm.com

Dynamic Security

the book provides information and
tools for researchers working in the fields of power system security
2020-06-07 02:49:47 下载 1 查看 77
www.eeworm.com

NETWORK ASSOCIATES GUIDE TO COMMUNICATIONS PROTOCOLS

NETWORK ASSOCIATES GUIDE TO COMMUNICATIONS PROTOCOLS
2015-11-10 00:39:01 下载 111 查看 1,158
www.eeworm.com

Designing Wireless Protocols Methodology and Applications

Designing Wireless Protocols Methodology and Applications
2013-12-19 19:38:09 下载 160 查看 1,048
www.eeworm.com

Radio+Protocols+for+LTE+and+LTE-A

It was only a few years ago that “ubiquitous connectivity” was recognized as the future of
wireless communication systems. In the era of ubiquitous connectivity, it was expected that
the b
2020-06-01 02:50:52 下载 1 查看 47
www.eeworm.com

example for security of meikuang

example for security of meikuang
2013-12-14 21:02:02 下载 117 查看 1,069
www.eeworm.com

spring security demo

spring security demo
2013-12-17 13:16:09 下载 43 查看 1,012
www.eeworm.com

LINUX SECURITY in PDF

LINUX SECURITY in PDF
2017-06-19 00:25:02 下载 31 查看 1,111
www.eeworm.com

A Philosophy of Security Management

A Philosophy of Security Management
2017-07-27 20:53:02 下载 57 查看 1,052
www.eeworm.com

example of security system

example of security system
2014-01-01 02:59:09 下载 43 查看 1,127
www.eeworm.com

Industrial Network Security

I would like to thank you for purchasing the second edition of “Industrial Network
Security,” especially
2020-06-07 04:56:47 下载 1 查看 160
www.eeworm.com

Smart Grid Security

The field of cyber security, or information security, or information
assurance, depending on your
2020-06-07 08:56:48 下载 1 查看 170
www.eeworm.com

RFID+Security

Radio frequency identification (RFID) is a type of automatic identification systems
which has gained popularity in recent years for being fast and reliable in keeping
track of the individu
2020-06-08 19:47:05 下载 1 查看 70
1 2 3 4 5 6 ... 500 下一页 ›