搜索结果
找到约 1,074 项符合
Embedded Security 的查询结果
嵌入式/单片机编程 The software and hardware development fields evolved along separate paths through the end of the 20t
The software and hardware development fields evolved along separate paths through the end of the 20th century. We seem to have come full circle, however. The previously rigid hardware on which our programs run is softening in many ways. Embedded systems are largely responsible for this softening. Th ...
Java编程 If you want to use the Struts Framework to its fullest potential, this is the book for you. Programm
If you want to use the Struts Framework to its fullest potential, this is the book for you. Programming Jakarta Struts, 2nd Edition covers everything the successful earlier edition did as well as plenty more: now fully up to date with Struts 1.1, this edition covers the latest material on tag librar ...
其他书籍 This book was developed for information technology (IT) professionals who plan to take the related
This book was developed for information technology (IT) professionals who plan to
take the related Microsoft Certified Professional Exam 70-299, Implementing and
Administering Security in a Microsoft Windows Server 2003 Network, and for IT professionals
who implement and manage software solutions fo ...
加密解密 The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfi ...
加密解密 RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digit
RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digital signature . Its security based on Integer Factorization Problem (IFP). RSA uses an asymetric key. RSA was created by Rivest, Shamir, and Adleman in 1977. Every user have a pair of key, public key a ...
Java编程 Servlets and JavaServer Pages is the first complete guide to building dynamic Java-based Web applica
Servlets and JavaServer Pages is the first complete guide to building dynamic Java-based Web applications using the new JavaServer Pages 2.0 and Servlets 2.4. Servlets and JavaServer Pages (JSP) provide a robust solution to developing large, complex Web applications, including multiserver projects. ...
嵌入式/单片机编程 Memory allocation in C Dynamic memory allocation and the structures that implement it in C are so u
Memory allocation in C
Dynamic memory allocation and the structures that implement it in C are so universal that they re sometimes treated as a black box. In the real world of embedded systems, that may not be desirable or even possible.
软件设计/软件工程 When C++ was first introduced many benefits such as code reuse, portability and scalability were pro
When C++ was first introduced many benefits such as code reuse, portability and scalability were promised, but somehow these benefits failed to eventuate. It didn’t take too long before most people in the embedded world decided that the promises were just hype, and settled down to using C++ as a sl ...
Java编程 this is the document for the secure development in java. It covers in very good details the aspect o
this is the document for the secure development in java. It covers in very good details the aspect of security programming in Java
Java编程 this is the document for the secure development in java. It covers in very good details the aspect o
this is the document for the secure development in java. It covers in very good details the aspect of security programming in Java