搜索结果
找到约 1,074 项符合
Embedded Security 的查询结果
电子书籍 The second edition of this popular book has been completely updated to add the new features of the J
The second edition of this popular book has been completely updated to add the new features of the Java Servlet API Version 2.2, and new chapters on servlet security and advanced communication. In addition to completely covering the 2.2 specification, we have included bonus material on the new 2.3 v ...
其他 Decompilation Dos Program is a technique that allows you to recover lost source code. It is also nee
Decompilation Dos Program is a technique that allows you to recover lost source code. It is also needed in some cases for computer security.
Java书籍 Java technology has evolved from a programming language designed to create machine-independent embe
Java technology has evolved from a programming language designed to create
machine-independent embedded systems into a robust, vendor-independent,
machine-independent, server-side technology, enabling the corporate community
to realize the full potential of web-centric applications.
Java began with ...
加密解密 MD5的全称是Message-digest Algorithm 5(信息-摘要算法)
MD5的全称是Message-digest Algorithm 5(信息-摘要算法),用于确保信息传输完整一致。在90年代初由MIT Laboratory for Computer Science和RSA Data Security Inc,的Ronald L. Rivest开发出来,经MD2、MD3和MD4发展而来。它的作用是让大容量信息在用数字签名软件签署私人密钥前被"压缩"成一种保密的格式(就是把一个任意长 ...
Java编程 Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the N
Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
家庭/个人应用 The STi7141 is a highly integrated SoC (systemon- chip) designed to meet the demanding needs of th
The STi7141 is a highly integrated SoC (systemon-
chip) designed to meet the demanding needs of
the interactive cable set top box market place. The
STi7141 integrates all the major system functions
into a single device, and provides world leading,
multi-layer, advanced security technologies to
prote ...
嵌入式/单片机编程 ARM_Star 仿真器是一款为广大ARM工作者设计的高性能仿真器
ARM_Star 仿真器是一款为广大ARM工作者设计的高性能仿真器,ARM_Star仿真器完全实现ARM RDI 1.5和RDI 1.51协议,与ARM Multi-ICE&#8482 兼容,支持所有含有Embedded-ICE Logic的ARM 内核CPU, 在调试软件的控制下,ARM_Star仿真器可以停止、启动ARM CPU的运行,用户通过ARM_Star仿真器察看、修改寄存器,存储器,设置断点、 ...
嵌入式/单片机编程 This is a very good book on self learning electronics from Wiley publications and is very useful to
This is a very good book on self learning electronics from Wiley publications and is very useful to understand basics of electronics for some one shifting from computer science to embedded system development
认证考试资料 Complete coverage of all four CCNP exams: ? EIGRP, OSPF, IS-IS, and BGP ? Optimizing routing ? IP
Complete coverage of all four CCNP exams:
? EIGRP, OSPF, IS-IS, and BGP
? Optimizing routing
? IP multicast
? IPv6
? VLAN implementation
? Spanning Tree
? InterVLAN routing
? Layer 3 redundancy
? Wireless LANs
? VoIP in campus networks
? Campus network security
? Frame-mode MPLS
? IPsec
? Cisco devi ...
认证考试资料 What you always wanted to know about networking but were afraid to ask! * How the Internet work
What you always wanted to know about networking but were afraid to ask!
* How the Internet works
* How e-mail, e-learning, and telephony work on the Internet
* What makes a network safe
* How traffic gets from here to there
* Disaster recovery and other ways to keep a network running
* How busines ...