搜索结果
找到约 458 项符合
Firmware Security 的查询结果
加密解密 An Introduction To Cryptography Chapter 1, “The Basics of Cryptography,” provides an overview of th
An Introduction To Cryptography
Chapter 1, “The Basics of Cryptography,” provides an overview of the
terminology and concepts you will encounter as you use PGP products.
Chapter 2, “Phil Zimmermann on PGP,” written by PGP’s creator, contains
discussions of security, privacy, and the vulnerabili ...
通讯编程文档 The SL11RIDE is a low cost, high speed Universal Serial Bus RISC based Controller board. It contains
The SL11RIDE is a low cost, high speed Universal Serial Bus RISC based Controller board. It contains a
16-bit RISC processor with built in SL11RIDE ROM to greatly reduce firmware development efforts. Its
serial flash EEPROM interface offers low cost storage for USB device configuration and customer ...
行业发展研究 During the past four years, most of our research activities have been focused on image but also vide
During the past four years, most of our research activities have been focused on image but also video
and 3-D objects processing for security applications (watermarking and biometrics) and communications
(talking heads, interfaces), with a special emphasis on facial images. More about our work can b ...
通讯/手机编程 Wishbone to LPC (Low-Pin Count) Bridge, includes master and slave modules. Supports 8-bit I/O Read a
Wishbone to LPC (Low-Pin Count) Bridge, includes master and slave modules. Supports 8-bit I/O Read and Write cycles, 8-bit Memory Read/Write cycles, DMA cycles, and up to 32-bit Firmware memory read/write cycles. Serial IRQ support is also provided.
None of this has been tested (yet) with a third-p ...
其他书籍 Cisco E-DI supports perl scripting through the CLI. This feature automates many of the server and n
Cisco E-DI supports perl scripting through the CLI. This feature automates many of the server and
network administration tasks. This section explains how to enable and disable the perl scripting service,
and how to use Cisco E-DI Perl API for daily tasks.
When a perl script is implemented by an admi ...
软件工程 This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only b
This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It s detailed, well researched and the technical information is excellent. The level of tech ...
加密解密 MD5的全称是Message-digest Algorithm 5(信息-摘要算法)
MD5的全称是Message-digest Algorithm 5(信息-摘要算法),在90年代初由MIT Laboratory for Computer Science和RSA Data Security Inc,的Ronald.L.Rivest开发出来,经MD2、MD3和MD4发展而来。
行业发展研究 about encryption method of the quantom . this way is the new method for powerfull encrypting message
about encryption method of the quantom . this way is the new method for powerfull encrypting messages for security applets.
软件设计/软件工程 Steganography is the art of communicating a message by embedding it into multimedia data. It is desi
Steganography is the art of communicating a message by embedding it into multimedia data. It is desired to maximize the
amount of hidden information (embedding rate) while preserving security against detection by unauthorized parties. An appropriate
information-theoretic model for steganography has ...
行业发展研究 A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digi
A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities
through digital certificates. A PKI includes components that issue digital certificates and
distribute certificate status information. PKI users select one or more certificate issuers as
trust anchors, and establi ...