搜索结果

找到约 91 项符合 SECURE 的查询结果

汇编语言 Base64 demonstrates how easy it is to decipher plaintext usernames and passwords. Never login to a

Base64 demonstrates how easy it is to decipher plaintext usernames and passwords. Never login to a public network resource unless some type of encryption is being used, secure socket layer is one example. Most FTP sites also use plaintext passwords.
https://www.eeworm.com/dl/644/147981.html
下载: 173
查看: 1073

USB编程 pic mcu code:This application note describes the design and implementation of a USB Mass Storage De

pic mcu code:This application note describes the design and implementation of a USB Mass Storage Device (MSD) using a Secure Digital card, which should prove useful to developers of USB mass storage solutions. This application may be used as a stand-alone MSD or as a Secure Digital/Multimedia Card ( ...
https://www.eeworm.com/dl/643/148200.html
下载: 35
查看: 1090

CA认证 PeerSec Networks MatrixSSL?is an embedded SSL implementation designed for small footprint applicatio

PeerSec Networks MatrixSSL?is an embedded SSL implementation designed for small footprint applications and devices. PeerSec Networks offers a fully supported, commercial version as well as an open source version that is available for download. PeerSec MatrixSSL allows secure management of remote dev ...
https://www.eeworm.com/dl/640/201809.html
下载: 100
查看: 1076

Java书籍 SQL Server Security Distilled, Second Edition by Morris Lewis ISBN:1590592190 Apress &copy 2004

SQL Server Security Distilled, Second Edition by Morris Lewis ISBN:1590592190 Apress &copy 2004 (352 pages) This book takes an in-depth look at what you can do to secure data in SQL Server, shows how to authenticate access to data on the server, and authorizes what users can and can t do with tha ...
https://www.eeworm.com/dl/656/238122.html
下载: 59
查看: 1021

其他书籍 《为Windows Vista编写安全的代码》

《为Windows Vista编写安全的代码》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. ...
https://www.eeworm.com/dl/542/243577.html
下载: 162
查看: 1029

加密解密 IDEA v2.2 IDEA encryption for dos. IDEA stands for International Data Encryption Algorithm it

IDEA v2.2 IDEA encryption for dos. IDEA stands for International Data Encryption Algorithm it was invented by Xuejia Lai and James Massey in Switzerland its a private key block algorithm, and is thought to be very secure.
https://www.eeworm.com/dl/519/270493.html
下载: 184
查看: 1100

加密解密 Digital Signature Algorithm (DSA)是Schnorr和ElGamal签名算法的变种

Digital Signature Algorithm (DSA)是Schnorr和ElGamal签名算法的变种,被美国NIST作为DSS(DigitalSignature Standard)。算法中应用了下述参数: p:L bits长的素数。L是64的倍数,范围是512到1024; q:p - 1的160bits的素因子; g:g = h^((p-1)/q) mod p,h满足h < p - 1, h^((p-1)/q) mod p > 1; x:x < q,x为私 ...
https://www.eeworm.com/dl/519/320611.html
下载: 123
查看: 1133

软件设计/软件工程 Atmel’s AT91SAM7FP105 is a low pincount FingerChip processor based on the 32-bit ARM RISC processor

Atmel’s AT91SAM7FP105 is a low pincount FingerChip processor based on the 32-bit ARM RISC processor. It features a on-chip biometric engine performing enrollment verification and identification, an internal record cache of up to 25 records and a secure command protocol over USB, SPI, UART. This pro ...
https://www.eeworm.com/dl/684/331000.html
下载: 145
查看: 1075

网络 xl2tpd is an implementation of the Layer 2 Tunnelling Protocol (RFC 2661). L2TP allows you to tunne

xl2tpd is an implementation of the Layer 2 Tunnelling Protocol (RFC 2661). L2TP allows you to tunnel PPP over UDP. Some ISPs use L2TP to tunnel user sessions from dial-in servers (modem banks, ADSL DSLAMs) to back-end PPP servers. Another important application is Virtual Private Networks where the I ...
https://www.eeworm.com/dl/635/337447.html
下载: 91
查看: 1062

Linux/Unix编程 Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the rela

Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the related architecture. HIP is a proposal to change the TCP/IP stack to securely support mobility and multi-homing. Additionally, it provides for enhanced security and privacy and advanced network concepts, ...
https://www.eeworm.com/dl/619/340403.html
下载: 118
查看: 1064