搜索结果
找到约 91 项符合
Secure 的查询结果
按分类筛选
- 全部分类
- 书籍 (10)
- 加密解密 (9)
- Java编程 (7)
- 其他书籍 (4)
- 软件设计/软件工程 (4)
- 软件工程 (4)
- 技术资料 (4)
- 学术论文 (3)
- 文章/文档 (3)
- Linux/Unix编程 (3)
- 电子书籍 (3)
- 电源技术 (2)
- Java书籍 (2)
- VC书籍 (2)
- 网络 (2)
- 其他 (2)
- Internet/网络编程 (2)
- Symbian (2)
- 行业发展研究 (2)
- CA认证 (2)
- 资料/手册 (1)
- 单片机编程 (1)
- 嵌入式综合 (1)
- 无线通信 (1)
- 汇编语言 (1)
- USB编程 (1)
- 单片机开发 (1)
- 通讯编程文档 (1)
- 嵌入式/单片机编程 (1)
- MTK (1)
- 手机短信编程 (1)
- Jsp/Servlet (1)
- matlab例程 (1)
- 通讯/手机编程 (1)
- 书籍源码 (1)
- 认证考试资料 (1)
- 系统/网络安全 (1)
- 源码 (1)
- VIP专区 (1)
加密解密 RSA算法是第一个能同时用于加密和数字签名的算法
RSA算法是第一个能同时用于加密和数字签名的算法,也易于理解和操作。 RSA是被研究得最广泛的公钥算法,从提出到现在已近二十年,经历了各种攻击的考验,逐渐为人们接受,普遍认为是目前最优秀的公钥方案之一。RSA的安全性依赖于大数的因子分解,但并没有从理论上证明破译RSA的难度与大数分解难度等价。即RSA的重大缺陷是无 ...
通讯/手机编程 QualNet Sensor Networks Library QualNet’s new Sensor Networks Library is a much awaited feature
QualNet
Sensor Networks
Library
QualNet’s new Sensor Networks Library is a much
awaited feature set that supports the IEEE 802.15.4
standard, otherwise known as Zigbee. Zigbee
networks are Wireless Personal Area Networks
(WPANs) that are defi ned by a low data rate,
long battery life, and secure ne ...
行业发展研究 A certification path is an ordered list of certificates starting with a certificate issued by the re
A certification path is an ordered list of certificates starting with a certificate issued by the relying
party s trust root, and ending with the target certificate that needs to be validated. Certification
path validation procedures are based on the algorithm supplied in ITU-T Recommendation X.509
...
文章/文档 What happens with your machine when you need to move away from the computer for 10 or more minutes?
What happens with your machine when you need to move away from the computer for 10 or more minutes? How secure is your data? Can someone sit on your chair while you are at a coworkers office and play with your data?
Maybe you need a computer locking tool that is small and easy to use yet powerful ...
Java编程 Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the N
Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
认证考试资料 What you always wanted to know about networking but were afraid to ask! * How networks and the In
What you always wanted to know about networking but were afraid to ask!
* How networks and the Internet work
* How to build coherent, cost-effective network infrastructures
* How to design networks for maximum reliability and availability
* What you need to know about data center and application ne ...
系统/网络安全 openssl源码
openssl源码
The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS) protocols as well as a full-strength general purpose cryptography library. The ...
源码 libnids-Win32
V1.16 Win32 July 2012
- Ported to Win32 C++
- Allow multiple instances of libnids to coexist in the same process
- Incorporate unofficial patch to track established TCP connections
- Migration of calls to secure versions (i.e. strcpy to strcpy_s)
- Compiles under Visual Studio 2010 with no warnings ...
书籍 MCF5223XFS
Connecting 32-bit controlled applications
in the industrial, commercial and consumer
markets is fast becoming a necessity rather
than an option. Many new applications, such
as remote data collection, home automation
and networked appliances, require secure,
high-performance connectivity at an
econom ...
书籍 Enablers for Smart Cities
The concept of smart cities emerged few years ago as a new vision for urban
development that aims to integrate multiple information and communication
technology (ICT) solutions in a secure fashion to manage a city’s assets. Modern ICT
infrastructure and e-services should fuel sustainable growth and ...