搜索结果
找到约 458 项符合
Firmware Security 的查询结果
Java编程 this is the document for the secure development in java. It covers in very good details the aspect o
this is the document for the secure development in java. It covers in very good details the aspect of security programming in Java
Java编程 this is the document for the secure development in java. It covers in very good details the aspect o
this is the document for the secure development in java. It covers in very good details the aspect of security programming in Java
电子书籍 The second edition of this popular book has been completely updated to add the new features of the J
The second edition of this popular book has been completely updated to add the new features of the Java Servlet API Version 2.2, and new chapters on servlet security and advanced communication. In addition to completely covering the 2.2 specification, we have included bonus material on the new 2.3 v ...
其他 Decompilation Dos Program is a technique that allows you to recover lost source code. It is also nee
Decompilation Dos Program is a technique that allows you to recover lost source code. It is also needed in some cases for computer security.
加密解密 MD5的全称是Message-digest Algorithm 5(信息-摘要算法)
MD5的全称是Message-digest Algorithm 5(信息-摘要算法),用于确保信息传输完整一致。在90年代初由MIT Laboratory for Computer Science和RSA Data Security Inc,的Ronald L. Rivest开发出来,经MD2、MD3和MD4发展而来。它的作用是让大容量信息在用数字签名软件签署私人密钥前被"压缩"成一种保密的格式(就是把一个任意长 ...
Java编程 Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the N
Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
家庭/个人应用 The STi7141 is a highly integrated SoC (systemon- chip) designed to meet the demanding needs of th
The STi7141 is a highly integrated SoC (systemon-
chip) designed to meet the demanding needs of
the interactive cable set top box market place. The
STi7141 integrates all the major system functions
into a single device, and provides world leading,
multi-layer, advanced security technologies to
prote ...
认证考试资料 Complete coverage of all four CCNP exams: ? EIGRP, OSPF, IS-IS, and BGP ? Optimizing routing ? IP
Complete coverage of all four CCNP exams:
? EIGRP, OSPF, IS-IS, and BGP
? Optimizing routing
? IP multicast
? IPv6
? VLAN implementation
? Spanning Tree
? InterVLAN routing
? Layer 3 redundancy
? Wireless LANs
? VoIP in campus networks
? Campus network security
? Frame-mode MPLS
? IPsec
? Cisco devi ...
认证考试资料 What you always wanted to know about networking but were afraid to ask! * How the Internet work
What you always wanted to know about networking but were afraid to ask!
* How the Internet works
* How e-mail, e-learning, and telephony work on the Internet
* What makes a network safe
* How traffic gets from here to there
* Disaster recovery and other ways to keep a network running
* How busines ...
嵌入式/单片机编程 8051 source code to be programmed to 51/52 for ez51 programmer device, can be used to unlock atmel s
8051 source code to be programmed to 51/52 for ez51 programmer device, can be used to unlock atmel security bit.