搜索结果
找到约 458 项符合
Firmware Security 的查询结果
Java编程 hibernate annotation及acegi-security使用范例
hibernate annotation及acegi-security使用范例
汇编语言 this bulk loopback firmware based on the firmware frameworks. Loops back EP2OUT to EP6IN and EP4OU
this bulk loopback firmware based on the firmware frameworks.
Loops back EP2OUT to EP6IN and EP4OUT to EP8IN.
Building this example requires the full version of the Keil Tools.
汇编语言 bulk endpoint endless source/sink firmware. EP2OUT will always accept a bulk OUT EP4OUT will alw
bulk endpoint endless source/sink firmware.
EP2OUT will always accept a bulk OUT
EP4OUT will always accept a bulk OUT
EP6IN will always return a 512 byte packet. The packet contains an
incrementing byte starting at 0x02. Since EP6 always returns a 512
byte packet, this endpoint should never be acc ...
汇编语言 This directory contains the memtest 8051 firmware for the Anchor Chips EZ-USB chip. The purpose
This directory contains the memtest 8051 firmware
for the Anchor Chips EZ-USB chip.
The purpose of this software is to test the different
memory segments in the Ez-Usb chip.
This example will output the string "good" on the 7 segment
LED if the mem test passes, or it will output the first addres ...
其他书籍 CCISP考试指南与导读 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2
CCISP考试指南与导读
CISSP STUDY NOTES FROM CISSP PREP GUIDE 1
DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2
DOMAIN 2 – ACCESS CONTROL SYSTEMS 7
DOMAIN 3 – TELECOM AND NETWORK SECURITY 13
DOMAIN 4 – CRYPTOGRAPHY 34
DOMAIN 5 – SECURITY ARCHITECTURE AND MODELS 46
DOMAIN 6 – OPERATIONS SECURITY 56
DO ...
SCSI/ASPI 采用USB设计的数据采集系统, PC及FIRMWARE代码
采用USB设计的数据采集系统, PC及FIRMWARE代码
单片机开发 Cypress公司Cy7c6xxxx芯片的USB键盘及USB鼠标的firmware代码以及一些example代码。
Cypress公司Cy7c6xxxx芯片的USB键盘及USB鼠标的firmware代码以及一些example代码。
系统设计方案 Firmware Considerations for the Cypress Semiconductor CY7C63xxx USB Microcontroller Family
Firmware Considerations for the Cypress Semiconductor
CY7C63xxx USB Microcontroller Family
技术管理 The public key infrastructure (PKI) is the foundation and center of network security architecture no
The public key infrastructure (PKI) is the foundation and center of network security architecture now, can provide security services including confidentiality, authentication, dig2ital signatures and integrity.
其他书籍 Multimedia security: the 22nd century approach
Multimedia security: the 22nd century approach