搜索结果
找到约 1,074 项符合
Embedded Security 的查询结果
软件设计/软件工程 C语言嵌入式编程修炼
C语言嵌入式编程修炼,这个嵌入式编程论坛的集合版本,做成PDF,方便阅读。里边有不少嵌入式编程的技巧和实例,值得参考。【EVC、VS2005、Wince、Winmobile、Embedded】
Linux/Unix编程 PXA270开发板+GPRS
PXA270开发板+GPRS,采用嵌入式Linux系统,Qt/Embedded图像用户界面编程,实现电话拨打和短信功能。
其他 Description The art galleries of the new and very futuristic building of the Center for Balkan Coop
Description
The art galleries of the new and very futuristic building of the Center for Balkan Cooperation have the form of polygons (not necessarily convex). When a big exhibition is organized, watching over all of the pictures is a big security concern. Your task is that for a given gallery to wri ...
单片机开发 This product has been manufactured to your company’s specifications a part for use in your company’
This product has been manufactured to your company’s specifications a part for use in your
company’s general electronic products. It is guaranteed to perform according to delivery
specifications. For any other use apart from general electronic equipment, we cannot take
responsibility if the produc ...
Applet Fingerprint Verification System an easy to use library that allows programmers to integrate fingerp
Fingerprint Verification System an easy to use library that allows programmers to integrate fingerprint technology into their software without specific know-how. Fast, easy to use, and small great for embedded systems.
软件设计/软件工程 Java technology is both a programming language and a platform. The Java programming language origina
Java technology is both a programming language and a platform. The Java programming language originated as part of a research project to develop advanced software for a wide variety of network devices and embedded systems. The goal was to develop a small, reliable, portable, distributed, real-time o ...
RFID编程 RFID, the wireless technology that has helped millions of people around the world to protect their
RFID, the wireless technology that has helped
millions of people around the world to protect their property and
make their workplaces safer is now in danger of being viewed as a
security risk. Ray Stanton examines the love-hate relationship
between people and Radio Frequency Identification [RFID] ta ...
其他书籍 The secret cipher that secures Mifare Classic RFID tags used in access control systems, subway tick
The secret cipher that secures Mifare Classic RFID tags used in access control systems, subway
tickets, and various other security-related applications has recently been disclosed
其他 Introduction Sometimes you may collide with the following problem: a third-party binary component o
Introduction
Sometimes you may collide with the following problem: a third-party binary component or control embedded into your application displays windows (usually message boxes) that hang your code until they are closed.
If you do not have the source code of this binary and one does not have a g ...
Linux/Unix编程 在网络安全中经常会遇到rootkit
在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor in ...