搜索结果
找到约 239 项符合
security 的查询结果
按分类筛选
- 全部分类
- 其他书籍 (37)
- 书籍 (25)
- Java编程 (24)
- 其他 (15)
- 加密解密 (15)
- 电子书籍 (8)
- 软件设计/软件工程 (8)
- Java书籍 (8)
- Linux/Unix编程 (8)
- 技术资料 (7)
- 电源技术 (5)
- 文章/文档 (5)
- RFID编程 (5)
- 单片机开发 (5)
- 单片机编程 (4)
- 行业发展研究 (4)
- 软件工程 (4)
- 通讯编程文档 (4)
- 网络 (3)
- 书籍源码 (3)
- 数据库系统 (3)
- 模拟电子 (2)
- CA认证 (2)
- matlab例程 (2)
- SQL Server (2)
- 其他数据库 (2)
- Delphi控件源码 (2)
- 嵌入式/单片机编程 (2)
- 认证考试资料 (2)
- DSP编程 (1)
- 工控技术 (1)
- 数值算法/人工智能 (1)
- VC书籍 (1)
- 语音压缩 (1)
- 文件格式 (1)
- Windows Mobile (1)
- 技术管理 (1)
- Internet/网络编程 (1)
- JavaScript (1)
- 磁盘编程 (1)
- Applet (1)
- 其他嵌入式/单片机内容 (1)
- 系统设计方案 (1)
- 交通/航空行业 (1)
- MySQL数据库 (1)
- Symbian (1)
- 手机彩信(MMS)编程 (1)
- 家庭/个人应用 (1)
- 系统/网络安全 (1)
- 嵌入式综合 (1)
- 接口技术 (1)
- 源码 (1)
RFID编程 RFID, the wireless technology that has helped millions of people around the world to protect their
RFID, the wireless technology that has helped
millions of people around the world to protect their property and
make their workplaces safer is now in danger of being viewed as a
security risk. Ray Stanton examines the love-hate relationship
between people and Radio Frequency Identification [RFID] ta ...
其他书籍 The secret cipher that secures Mifare Classic RFID tags used in access control systems, subway tick
The secret cipher that secures Mifare Classic RFID tags used in access control systems, subway
tickets, and various other security-related applications has recently been disclosed
Linux/Unix编程 在网络安全中经常会遇到rootkit
在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor in ...
Delphi控件源码 1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click
1. It is located in the root directory - SecurityBuilderDemo.exe. Leave password box blank and click on Security button
in order to Add/Remove users and set user rights. Once you entered Security dialog you may select your Supervisor password.
2. Click OK when finished configuring users. Don t forg ...
Linux/Unix编程 Ksplice is practical technology for updating the Linux kernel without rebooting. It enables you to a
Ksplice is practical technology for updating the Linux kernel without rebooting. It enables you to avoid the disruptive process of rebooting for kernel security updates and bugfixes. By making it easy to keep your systems up to date, Ksplice helps you avoid the security and stability risks of runnin ...
其他 The W78E58B is an 8-bit microcontroller which has an in-system programmable Flash EPROM for firmwa
The W78E58B is an 8-bit microcontroller which has an in-system programmable Flash EPROM for
firmware updating. The instruction set of the W78E58B is fully compatible with the standard 8052. The
W78E58B contains a 32K bytes of main ROM and a 4K bytes of auxiliary ROM which allows the
contents of t ...
单片机开发 写号步骤: 1、将手机连通CDMA Workshop 2.7
写号步骤:
1、将手机连通CDMA Workshop 2.7,在security选项卡里的 spc中点击读取,将000000填入spc里的方框,点击spc钮选择send, 于是显示spc解锁成功。
2、点击“nam”选项卡,将min填入10位码(就是imsi码去掉46003剩下的),将mcc填入460,mnc填入03,填入imsi15位码,banner填入你想填的字符(我填的中国电信),点 ...
Java编程 google的开源项目
google的开源项目,关于Spring Security
MySQL数据库 Login Manager V3.0(LM3.0) is an authentication system which can integrate with any existing website
Login Manager V3.0(LM3.0) is an authentication system which can integrate with any existing website that meets the requirements. LM3.0 provides a gatekeeper where user must be authorized before entering the membership secured areas.
Features:
1. Flexibility
LM3.0 allows administrator to integrate i ...
加密解密 An Introduction To Cryptography Chapter 1, “The Basics of Cryptography,” provides an overview of th
An Introduction To Cryptography
Chapter 1, “The Basics of Cryptography,” provides an overview of the
terminology and concepts you will encounter as you use PGP products.
Chapter 2, “Phil Zimmermann on PGP,” written by PGP’s creator, contains
discussions of security, privacy, and the vulnerabili ...