搜索结果

找到约 458 项符合 Firmware Security 的查询结果

加密解密 An Introduction To Cryptography Chapter 1, “The Basics of Cryptography,” provides an overview of th

An Introduction To Cryptography Chapter 1, “The Basics of Cryptography,” provides an overview of the terminology and concepts you will encounter as you use PGP products. Chapter 2, “Phil Zimmermann on PGP,” written by PGP’s creator, contains discussions of security, privacy, and the vulnerabili ...
https://www.eeworm.com/dl/519/452104.html
下载: 79
查看: 1077

通讯编程文档 The SL11RIDE is a low cost, high speed Universal Serial Bus RISC based Controller board. It contains

The SL11RIDE is a low cost, high speed Universal Serial Bus RISC based Controller board. It contains a 16-bit RISC processor with built in SL11RIDE ROM to greatly reduce firmware development efforts. Its serial flash EEPROM interface offers low cost storage for USB device configuration and customer ...
https://www.eeworm.com/dl/646/454685.html
下载: 25
查看: 1062

行业发展研究 During the past four years, most of our research activities have been focused on image but also vide

During the past four years, most of our research activities have been focused on image but also video and 3-D objects processing for security applications (watermarking and biometrics) and communications (talking heads, interfaces), with a special emphasis on facial images. More about our work can b ...
https://www.eeworm.com/dl/692/455778.html
下载: 139
查看: 1084

通讯/手机编程 Wishbone to LPC (Low-Pin Count) Bridge, includes master and slave modules. Supports 8-bit I/O Read a

Wishbone to LPC (Low-Pin Count) Bridge, includes master and slave modules. Supports 8-bit I/O Read and Write cycles, 8-bit Memory Read/Write cycles, DMA cycles, and up to 32-bit Firmware memory read/write cycles. Serial IRQ support is also provided. None of this has been tested (yet) with a third-p ...
https://www.eeworm.com/dl/527/457359.html
下载: 33
查看: 1101

其他书籍 Cisco E-DI supports perl scripting through the CLI. This feature automates many of the server and n

Cisco E-DI supports perl scripting through the CLI. This feature automates many of the server and network administration tasks. This section explains how to enable and disable the perl scripting service, and how to use Cisco E-DI Perl API for daily tasks. When a perl script is implemented by an admi ...
https://www.eeworm.com/dl/542/461785.html
下载: 125
查看: 1029

软件工程 This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only b

This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It s detailed, well researched and the technical information is excellent. The level of tech ...
https://www.eeworm.com/dl/540/463102.html
下载: 129
查看: 1030

加密解密 MD5的全称是Message-digest Algorithm 5(信息-摘要算法)

MD5的全称是Message-digest Algorithm 5(信息-摘要算法),在90年代初由MIT Laboratory for Computer Science和RSA Data Security Inc,的Ronald.L.Rivest开发出来,经MD2、MD3和MD4发展而来。
https://www.eeworm.com/dl/519/464336.html
下载: 61
查看: 1048

行业发展研究 about encryption method of the quantom . this way is the new method for powerfull encrypting message

about encryption method of the quantom . this way is the new method for powerfull encrypting messages for security applets.
https://www.eeworm.com/dl/692/465417.html
下载: 73
查看: 1077

软件设计/软件工程 Steganography is the art of communicating a message by embedding it into multimedia data. It is desi

Steganography is the art of communicating a message by embedding it into multimedia data. It is desired to maximize the amount of hidden information (embedding rate) while preserving security against detection by unauthorized parties. An appropriate information-theoretic model for steganography has ...
https://www.eeworm.com/dl/684/471185.html
下载: 51
查看: 1049

行业发展研究 A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digi

A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digital certificates. A PKI includes components that issue digital certificates and distribute certificate status information. PKI users select one or more certificate issuers as trust anchors, and establi ...
https://www.eeworm.com/dl/692/472180.html
下载: 89
查看: 1060