搜索结果
找到约 239 项符合
security 的查询结果
按分类筛选
- 全部分类
- 其他书籍 (37)
- 书籍 (25)
- Java编程 (24)
- 其他 (15)
- 加密解密 (15)
- 电子书籍 (8)
- 软件设计/软件工程 (8)
- Java书籍 (8)
- Linux/Unix编程 (8)
- 技术资料 (7)
- 电源技术 (5)
- 文章/文档 (5)
- RFID编程 (5)
- 单片机开发 (5)
- 单片机编程 (4)
- 行业发展研究 (4)
- 软件工程 (4)
- 通讯编程文档 (4)
- 网络 (3)
- 书籍源码 (3)
- 数据库系统 (3)
- 模拟电子 (2)
- CA认证 (2)
- matlab例程 (2)
- SQL Server (2)
- 其他数据库 (2)
- Delphi控件源码 (2)
- 嵌入式/单片机编程 (2)
- 认证考试资料 (2)
- DSP编程 (1)
- 工控技术 (1)
- 数值算法/人工智能 (1)
- VC书籍 (1)
- 语音压缩 (1)
- 文件格式 (1)
- Windows Mobile (1)
- 技术管理 (1)
- Internet/网络编程 (1)
- JavaScript (1)
- 磁盘编程 (1)
- Applet (1)
- 其他嵌入式/单片机内容 (1)
- 系统设计方案 (1)
- 交通/航空行业 (1)
- MySQL数据库 (1)
- Symbian (1)
- 手机彩信(MMS)编程 (1)
- 家庭/个人应用 (1)
- 系统/网络安全 (1)
- 嵌入式综合 (1)
- 接口技术 (1)
- 源码 (1)
行业发展研究 During the past four years, most of our research activities have been focused on image but also vide
During the past four years, most of our research activities have been focused on image but also video
and 3-D objects processing for security applications (watermarking and biometrics) and communications
(talking heads, interfaces), with a special emphasis on facial images. More about our work can b ...
其他书籍 Cisco E-DI supports perl scripting through the CLI. This feature automates many of the server and n
Cisco E-DI supports perl scripting through the CLI. This feature automates many of the server and
network administration tasks. This section explains how to enable and disable the perl scripting service,
and how to use Cisco E-DI Perl API for daily tasks.
When a perl script is implemented by an admi ...
软件工程 This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only b
This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It s detailed, well researched and the technical information is excellent. The level of tech ...
加密解密 MD5的全称是Message-digest Algorithm 5(信息-摘要算法)
MD5的全称是Message-digest Algorithm 5(信息-摘要算法),在90年代初由MIT Laboratory for Computer Science和RSA Data Security Inc,的Ronald.L.Rivest开发出来,经MD2、MD3和MD4发展而来。
行业发展研究 about encryption method of the quantom . this way is the new method for powerfull encrypting message
about encryption method of the quantom . this way is the new method for powerfull encrypting messages for security applets.
软件设计/软件工程 Steganography is the art of communicating a message by embedding it into multimedia data. It is desi
Steganography is the art of communicating a message by embedding it into multimedia data. It is desired to maximize the
amount of hidden information (embedding rate) while preserving security against detection by unauthorized parties. An appropriate
information-theoretic model for steganography has ...
行业发展研究 A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digi
A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities
through digital certificates. A PKI includes components that issue digital certificates and
distribute certificate status information. PKI users select one or more certificate issuers as
trust anchors, and establi ...
加密解密 This program applies Simplified DES (S-DES) Ciphering Algorithm Developed by Maimouna Al-ammar 5t
This program applies Simplified DES (S-DES) Ciphering Algorithm
Developed by Maimouna Al-ammar
5th Year, Computer Engineering Department, University of Damascus
Information and Network Security Material
加密解密 This program applies Message Digest MD5 Algorithm Developed by Maimouna Al-ammar 5th Year, Compu
This program applies Message Digest MD5 Algorithm
Developed by Maimouna Al-ammar
5th Year, Computer Engineering Department, University of Damascus
Information and Network Security Material
加密解密 This program applies Message Digest (MD5) Algorithm Developed by Maimouna Al-ammar
This program applies Message Digest (MD5) Algorithm
Developed by Maimouna Al-ammar
5th Year, Computer Engineering Department, University of Damascus
Information and Network Security Material