搜索结果
找到约 57 项符合
CRYPTOGRAPHY 的查询结果
按分类筛选
加密解密 Elliptic Curve Cryptography full working C code for encryption and decryprion.
Elliptic Curve Cryptography full working C code for encryption and decryprion.
加密解密 applied cryptography ebook by bruce scheneier
applied cryptography ebook by bruce scheneier
加密解密 Cryptography In C And C++
Cryptography In C And C++
加密解密 Bruce Shnayer "applied cryptography"
Bruce Shnayer "applied cryptography"
matlab例程 this is a matlab code of the method of visual cryptography based in the shadows method of Visual Cry
this is a matlab code of the method of visual cryptography based in the shadows method of Visual Cryptography, Moni Naor, Adi Shamir.
书籍 Cryptography in C and C++
Cryptography in C and C++第二版
工控技术 工业系统安全问题和解决办法
Abstract: As industrial control systems (ICSs) have become increasingly connected and use more off-the-shelfcomponents, new vulnerabilities to cyber attacks have emerged. This tutorial looks at three types of ICSs:programmable logic controllers (PLCs), supervisory control and data acquisition (SCA ...
软件设计/软件工程 This book offers 226 code recipes applicable to a variety of difficulties that may arise in the proc
This book offers 226 code recipes applicable to a variety of difficulties that may arise in the process of application development. Topics covered include XML processing, Windows forms, database access, networking, runtime security, cryptography and more.
VC书籍 Secure Programming Cookbook for C and C++ is an important new resource for developers serious about
Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, sy ...
其他书籍 CCISP考试指南与导读 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2
CCISP考试指南与导读
CISSP STUDY NOTES FROM CISSP PREP GUIDE 1
DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2
DOMAIN 2 – ACCESS CONTROL SYSTEMS 7
DOMAIN 3 – TELECOM AND NETWORK SECURITY 13
DOMAIN 4 – CRYPTOGRAPHY 34
DOMAIN 5 – SECURITY ARCHITECTURE AND MODELS 46
DOMAIN 6 – OPERATIONS SECURITY 56
DO ...