搜索结果
找到约 124 项符合
Cyber-Physical 的查询结果
工控技术 工业系统安全问题和解决办法
Abstract: As industrial control systems (ICSs) have become increasingly connected and use more off-the-shelfcomponents, new vulnerabilities to cyber attacks have emerged. This tutorial looks at three types of ICSs:programmable logic controllers (PLCs), supervisory control and data acquisition (SCA ...
网络 total是最后的版本。包括的全是最新的物理层和数据链路层。另外还有pro1和pro2的打包程序和调用它们形成的各自的界面程序
total是最后的版本。包括的全是最新的物理层和数据链路层。另外还有pro1和pro2的打包程序和调用它们形成的各自的界面程序,以及最后调用各个界面形成的总界面程序。由于时间匆忙,对数据链路层协议的界面化工作只做到了pro2,总界面上已经留了所有6个程序的地方。PhysicalLayer包中包含了所有的物理层的程序的版本,以及它 ...
其他书籍 Attributes, Constraints, and Carry Logic Overview Information for Mentor Customers Schematic S
Attributes,
Constraints,
and Carry Logic
Overview
Information for Mentor
Customers
Schematic Syntax
UCF/NCF File Syntax
Attributes/Logical
Constraints
Placement Constraints
Relative Location (RLOC)
Constraints
Timing Constraints
Physical Constraints
Relationally Placed Macros
(RPM)
Carry Logic in XC ...
网络 Linux 虚拟网络接口 实例 In the Linux (or Unix) world, most network interfaces, such as eth0 and ppp0, are a
Linux 虚拟网络接口 实例
In the Linux (or Unix) world, most network interfaces, such as eth0 and ppp0, are associated with a physical device that is in charge of transmitting and receiving data packets. However, some logical network interfaces don t feature any physical packet transmission. The most ...
USB编程 Writing an Input Module The sample module introduced here is called idiom (Input Device for Interc
Writing an Input Module
The sample module introduced here is called idiom (Input Device for Intercepting Output of Mice), The sample module registers itself with the USB kernel subsystem as a mouse driver and with the input management subsystem as a keyboard driver. idiom translates mouse movement ...
汇编语言 可在系统引导时工作的RootKit,较简单 1) It s very small.The basic framework is just about 100 lines of assembly
可在系统引导时工作的RootKit,较简单
1) It s very small.The basic framework is just about 100 lines of assembly code.It supports 2000,XP,2003
2) It patches the kernel at runtime(no files are patched on disk).(basic version has this code removed , so as others could understand it easily).
3) BOOT KIT ...
通讯编程文档 红外线开发资料
红外线开发资料,红外线协议,Infrared Data Association
Serial Infrared Physical Layer
Measurement Guidelines
书籍源码 《DCOM入门》随书源码 Chapter 1 (Distributed Computing) N/A Chapter 2 (DCOM Overview) N/A Chapter 3 (Objec
《DCOM入门》随书源码
Chapter 1 (Distributed Computing) N/A
Chapter 2 (DCOM Overview) N/A
Chapter 3 (Objects) Basics
Chapter 4 (Components) Basics
Chapter 5 (Infrastructure) Infrastructure
Chapter 6 (Building Components with ATL) OCRServer
Chapter 7 (Using COM Objects) OCRClient
Chapter 8 (COM in Cyb ...
VC书籍 This paper presents an interactive technique that produces static hairstyles by generating individu
This paper presents an interactive technique that
produces static hairstyles by generating individual hair strands
of the desired shape and color, subject to the presence of gravity
and collisions. A variety of hairstyles can be generated by
adjusting the wisp parameters, while the deformation is so ...
其他书籍 CCISP考试指南与导读 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2
CCISP考试指南与导读
CISSP STUDY NOTES FROM CISSP PREP GUIDE 1
DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2
DOMAIN 2 – ACCESS CONTROL SYSTEMS 7
DOMAIN 3 – TELECOM AND NETWORK SECURITY 13
DOMAIN 4 – CRYPTOGRAPHY 34
DOMAIN 5 – SECURITY ARCHITECTURE AND MODELS 46
DOMAIN 6 – OPERATIONS SECURITY 56
DO ...