搜索结果
找到约 239 项符合
security 的查询结果
按分类筛选
- 全部分类
- 其他书籍 (37)
- 书籍 (25)
- Java编程 (24)
- 其他 (15)
- 加密解密 (15)
- 电子书籍 (8)
- 软件设计/软件工程 (8)
- Java书籍 (8)
- Linux/Unix编程 (8)
- 技术资料 (7)
- 电源技术 (5)
- 文章/文档 (5)
- RFID编程 (5)
- 单片机开发 (5)
- 单片机编程 (4)
- 行业发展研究 (4)
- 软件工程 (4)
- 通讯编程文档 (4)
- 网络 (3)
- 书籍源码 (3)
- 数据库系统 (3)
- 模拟电子 (2)
- CA认证 (2)
- matlab例程 (2)
- SQL Server (2)
- 其他数据库 (2)
- Delphi控件源码 (2)
- 嵌入式/单片机编程 (2)
- 认证考试资料 (2)
- DSP编程 (1)
- 工控技术 (1)
- 数值算法/人工智能 (1)
- VC书籍 (1)
- 语音压缩 (1)
- 文件格式 (1)
- Windows Mobile (1)
- 技术管理 (1)
- Internet/网络编程 (1)
- JavaScript (1)
- 磁盘编程 (1)
- Applet (1)
- 其他嵌入式/单片机内容 (1)
- 系统设计方案 (1)
- 交通/航空行业 (1)
- MySQL数据库 (1)
- Symbian (1)
- 手机彩信(MMS)编程 (1)
- 家庭/个人应用 (1)
- 系统/网络安全 (1)
- 嵌入式综合 (1)
- 接口技术 (1)
- 源码 (1)
Linux/Unix编程 Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the rela
Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the related architecture. HIP is a proposal to change the TCP/IP stack to securely support mobility and multi-homing. Additionally, it provides for enhanced security and privacy and advanced network concepts, ...
其他书籍 Linux Bible: 介紹包括 Fedora, KNOPPIX, Debian, SUSE, Ubuntu , 及其他 7 種 Linux * Ideal for users planning
Linux Bible: 介紹包括 Fedora, KNOPPIX, Debian, SUSE, Ubuntu , 及其他 7 種 Linux
* Ideal for users planning the transition to Linux who want to sample different distributions to see which one best meets their needs
* Includes sections on practical uses for Linux, multimedia apps, instant messaging, ...
其他书籍 IEEE 802.11i-2004 Amendment to IEEE Std 802.11, 1999 Edition (Reaff 2003). IEEE Standard for Informa
IEEE 802.11i-2004 Amendment to IEEE Std 802.11, 1999 Edition (Reaff 2003). IEEE Standard for Information technology--Telecommunications and information exchange between system--Local and metropolitan area networks?Specific requirements--Part 11: Wireless LAN Medium Access Control (MAC) and Physical ...
磁盘编程 版本更新了一下
版本更新了一下,到5.84了,需要用VS.net平台进行编译运行,介绍与原来的一样!
磁盘文件的安全删除,我们通常所执行的删除操作并不是真正的删除只是清除了文件的fat表内容,文件数据还在磁盘上,可以恢复,所以不安全。-disk deletion of the security document, we usually enforced by the delete operation does not re ...
软件设计/软件工程 浅谈VB.NET的密码算法及其在信息安全中的应用 Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Inf
浅谈VB.NET的密码算法及其在信息安全中的应用
Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Information Secuirity
,介绍了Microsoft的最新开发工具Visual Basic 2005(简称VB.NET)中与密码算法相关的System.Security.Cryptography命名空间(简称SSC).举例说明了利用SSC提供的类编写信息安全程 ...
其他 MySQL claims to be the world s most popular open source database, and with good reason. It is free
MySQL claims to be the world s most popular open source database, and with good
reason. It is free, runs on a wide variety of platforms, is relatively simple, easy to
configure and performs well even under significant load. By comparison to some other
popular database management systems, configur ...
其他书籍 rhce linux learning guide 1.01 Basic Linux Knowledge 1.02 Linux Filesystem Hierarchy and Structur
rhce linux learning guide
1.01 Basic Linux Knowledge
1.02 Linux Filesystem Hierarchy
and Structure
1.03 Basic Commands
1.04 Printing
1.05 The Linux/Unix Shell
1.06 Basic Security
1.07 Linux/Unix System Administration
1.08 Basic TCP/IP Networking
1.09 Standard Network Services
1.10 Basic Network Secu ...
其他书籍 Fully revised to cover the latest standards and technologies, XML and Java(TM), Second Edition provi
Fully revised to cover the latest standards and technologies, XML and Java(TM), Second Edition provides the practical solutions developers need to design powerful and portable Web-based applications. Featuring step-by-step examples, this book focuses on harnessing the power of Java(TM) and XML toget ...
其他 Description The art galleries of the new and very futuristic building of the Center for Balkan Coop
Description
The art galleries of the new and very futuristic building of the Center for Balkan Cooperation have the form of polygons (not necessarily convex). When a big exhibition is organized, watching over all of the pictures is a big security concern. Your task is that for a given gallery to wri ...
单片机开发 This product has been manufactured to your company’s specifications a part for use in your company’
This product has been manufactured to your company’s specifications a part for use in your
company’s general electronic products. It is guaranteed to perform according to delivery
specifications. For any other use apart from general electronic equipment, we cannot take
responsibility if the produc ...