搜索结果
找到约 1,074 项符合
Embedded Security 的查询结果
其他书籍 This book keeps the exposition as straightforward as possible and enables you to cut through the maz
This book keeps the exposition as straightforward as possible and enables you to cut through the maze of acronyms, hacking tools, rumored weaknesses, and vague vendor security claims to make educated security decisions when purchasing or deploying WLAN."
电子书籍 信息安全与保密的一些PPT文件
信息安全与保密的一些PPT文件,对初学者可以了解概况,Information security and confidentiality of PPT document for beginners can understand Profiles.
软件工程 Software Testing, Second Edition provides practical insight into the world of software testing and q
Software Testing, Second Edition provides practical insight into the world of software testing and quality assurance. Learn how to find problems in any computer program, how to plan an effective test approach and how to tell when software is ready for release. Updated from the previous edition in 20 ...
其他书籍 The ability to write efficient, high-speed arithmetic routines ultimately depends upon your knowled
The ability to write efficient, high-speed arithmetic routines ultimately depends
upon your knowledge of the elements of arithmetic as they exist on a computer. That
conclusion and this book are the result of a long and frustrating search for
information on writing arithmetic routines for real-time ...
其他嵌入式/单片机内容 Protothreads are extremely lightweight stackless threads designed for severely memory constrained s
Protothreads are extremely lightweight stackless threads designed for
severely memory constrained systems such as small embedded systems or
sensor network nodes.
其他嵌入式/单片机内容 Contiki is an open source, highly portable, multi-tasking operating system for memory-constrained n
Contiki is an open source, highly portable, multi-tasking operating
system for memory-constrained networked embedded systems
J2ME First of all, the Applet-phone is a SIP User-Agent with audio and text messaging capabilities. But
First of all, the Applet-phone is a SIP User-Agent
with audio and text messaging capabilities. But i s also embedded in
an applet where you can use it as usual if your firewall allow you to
use the UDP transport. If not, you can use TCP to carry your voice in a
voice messaging fashion. Your voice is ...
通讯编程文档 Abstract: By using gateway systems on large 32-bit platforms, networks of small, 8- and 16-bit mic
Abstract:
By using gateway systems on large 32-bit platforms, networks of small, 8- and 16-bit
microcontrollers can be monitored and controlled over the Internet. With embedded Linux, these
gateways are easily moved from full-blown host PCs to embedded platforms like the PC104. In
this class you wil ...
SQL Server B/S版ERP安装方法 1、安装IIS5.0、Microsoft .NET Framework 1.1及SQL Server2000 2、将目录Copy_of_ERP和webctrl_clie
B/S版ERP安装方法
1、安装IIS5.0、Microsoft .NET Framework 1.1及SQL Server2000
2、将目录Copy_of_ERP和webctrl_client复制到C:/Inetpub/wwwroot下,并将Copy_of_ERP目录设置成IIS虚拟目录
3、在SQL Server2000中新建一个Storage用户和LXTXERP数据库,然后将Data目录中的LXTXERP.BAK数据库备份文件还原
4、修改Copy_of_E ...
书籍源码 //*** *** *** *** *** *** *** *** *** *** *** *** *** // MSP430x1xx Demo - Software Toggle P1.0 /
//*** *** *** *** *** *** *** *** *** *** *** *** ***
// MSP430x1xx Demo - Software Toggle P1.0
//
// Description Toggle P1.0 by xor ing P1.0 inside of a software loop.
// ACLK = n/a, MCLK = SMCLK = default DCO
//
// MSP430x1xx
// -----------------
// /|\| XIN|-
// | | |
// --|RST XOUT|-
// | |
// ...