搜索结果
找到约 239 项符合
security 的查询结果
按分类筛选
- 全部分类
- 其他书籍 (37)
- 书籍 (25)
- Java编程 (24)
- 其他 (15)
- 加密解密 (15)
- 电子书籍 (8)
- 软件设计/软件工程 (8)
- Java书籍 (8)
- Linux/Unix编程 (8)
- 技术资料 (7)
- 电源技术 (5)
- 文章/文档 (5)
- RFID编程 (5)
- 单片机开发 (5)
- 单片机编程 (4)
- 行业发展研究 (4)
- 软件工程 (4)
- 通讯编程文档 (4)
- 网络 (3)
- 书籍源码 (3)
- 数据库系统 (3)
- 模拟电子 (2)
- CA认证 (2)
- matlab例程 (2)
- SQL Server (2)
- 其他数据库 (2)
- Delphi控件源码 (2)
- 嵌入式/单片机编程 (2)
- 认证考试资料 (2)
- DSP编程 (1)
- 工控技术 (1)
- 数值算法/人工智能 (1)
- VC书籍 (1)
- 语音压缩 (1)
- 文件格式 (1)
- Windows Mobile (1)
- 技术管理 (1)
- Internet/网络编程 (1)
- JavaScript (1)
- 磁盘编程 (1)
- Applet (1)
- 其他嵌入式/单片机内容 (1)
- 系统设计方案 (1)
- 交通/航空行业 (1)
- MySQL数据库 (1)
- Symbian (1)
- 手机彩信(MMS)编程 (1)
- 家庭/个人应用 (1)
- 系统/网络安全 (1)
- 嵌入式综合 (1)
- 接口技术 (1)
- 源码 (1)
源码 The Universal Radio Hacker (URH)
The Universal Radio Hacker (URH) is a software for investigating unknown wireless protocols. Features include
* __hardware interfaces__ for common Software Defined Radios
* __easy demodulation__ of signals
* __assigning participants__ to keep overview of your data
* __customizable decodings__ to cr ...
书籍 Cyber-Physical Systems
This book provides an overview of recent innovations and achievements in the broad areas of cyber-physical systems (CPS), including architecture, networking, systems, applications, security, and privacy. The book discusses various new CPS technologies from diverse aspects to enable higher level of i ...
书籍 GSM 03.48
Digital cellular telecommunications system (Phase 2+);
Security mechanisms for SIM application toolkit;
Stage 2
(3GPP TS 03.48 version 8.8.0 Release 1999)
书籍 Fundamental Limits on a Class of Secure
Abstract—In the future communication applications, users
may obtain their messages that have different importance levels
distributively from several available sources, such as distributed
storage or even devices belonging to other users. This
scenario is the best modeled by the multilevel diversity ...
书籍 Active+and+Programmable+Networks
New applications such as video conferencing, video on demand, multi-
media transcoders, Voice-over-IP (VoIP), intrusion detection, distributed
collaboration, and intranet security require advanced functionality from
networks beyond simple forwarding congestion control techniques.
书籍 Short-range+Wireless+Communication
Developers, manufacturers and marketers of products incorporating short-
range radio systems are experts in their fields—security, telemetry,
medical care, to name a few. Often they add a wireless interface just to
eliminate wires on an existing wired product. They may adapt a wireless
subsystem, w ...
书籍 Telecommunications Essentials Global Source
In this updated and expanded edition of her excellent telecommunications primer,
Lili explains in just the right detail everything you need to know to become
fluent in this most important and fascinating industry. Besides including a
satisfying amount of expert technical detail, the book also dis ...
书籍 Service+Robotics+within+the+Digital+Home
Over the past few decades there has been an exponential growth in service robots
and smart home technologies, which has led to the development of exciting new
products in our daily lives. Service robots can be used to provide domestic aid for
the elderly and disabled, serving various functions rangi ...
书籍 Big+Data+Analytics+Strategies
This is a practical book, to be sure, but it is also a book about hope and posi-
tive change. I am quite sincere. The delivery of electricity is deeply rooted
in the principle of universal access; when clean, reliable energy is available it
contributes to poverty alleviation, improved social conditi ...
书籍 Computational+Intelligence
The large-scale deployment of the smart grid (SG) paradigm could play a strategic role in
supporting the evolution of conventional electrical grids toward active, flexible and self-
healing web energy networks composed of distributed and cooperative energy resources.
From a conceptual point of view, ...