搜索结果
找到约 239 项符合
security 的查询结果
按分类筛选
- 全部分类
- 其他书籍 (37)
- 书籍 (25)
- Java编程 (24)
- 其他 (15)
- 加密解密 (15)
- 电子书籍 (8)
- 软件设计/软件工程 (8)
- Java书籍 (8)
- Linux/Unix编程 (8)
- 技术资料 (7)
- 电源技术 (5)
- 文章/文档 (5)
- RFID编程 (5)
- 单片机开发 (5)
- 单片机编程 (4)
- 行业发展研究 (4)
- 软件工程 (4)
- 通讯编程文档 (4)
- 网络 (3)
- 书籍源码 (3)
- 数据库系统 (3)
- 模拟电子 (2)
- CA认证 (2)
- matlab例程 (2)
- SQL Server (2)
- 其他数据库 (2)
- Delphi控件源码 (2)
- 嵌入式/单片机编程 (2)
- 认证考试资料 (2)
- DSP编程 (1)
- 工控技术 (1)
- 数值算法/人工智能 (1)
- VC书籍 (1)
- 语音压缩 (1)
- 文件格式 (1)
- Windows Mobile (1)
- 技术管理 (1)
- Internet/网络编程 (1)
- JavaScript (1)
- 磁盘编程 (1)
- Applet (1)
- 其他嵌入式/单片机内容 (1)
- 系统设计方案 (1)
- 交通/航空行业 (1)
- MySQL数据库 (1)
- Symbian (1)
- 手机彩信(MMS)编程 (1)
- 家庭/个人应用 (1)
- 系统/网络安全 (1)
- 嵌入式综合 (1)
- 接口技术 (1)
- 源码 (1)
通讯编程文档 GSM Security and the protocols involves in a mobile environment authentication process
GSM Security and the protocols involves in a mobile environment authentication process
Java编程 Spring Security 2.0.x中文参考文档
Spring Security 2.0.x中文参考文档
数据库系统 SQL Security with Visual Basic 6.0
SQL Security with Visual Basic 6.0
其他书籍 The world s bestselling computer security book--fully expanded and updated is one of the most succes
The world s bestselling computer security book--fully expanded and updated is one of the most successful security books ever written. Leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company to fight cyber-crime.
其他书籍 SSL and TLS book. you can learn Secured socket layer and transport layer security from this book
SSL and TLS book. you can learn Secured socket layer and transport layer security from this book
其他书籍 Payment Card Industry Data Security Standard Handbook
Payment
Card Industry
Data Security
Standard
Handbook
加密解密 Its about cryptography example. useful for chatting with some sort of security
Its about cryptography example. useful for chatting with some sort of security
Java编程 spring security的中文学习文档,很好用的
spring security的中文学习文档,很好用的
CA认证 Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2
Playfair Cipher
1.not even the large number of keys in a monoalphabetic cipher provides security
2.one approach to improving security was to encrypt multiple letters
3.the Playfair Cipher is an example
4.invented by Charles Wheatstone in 1854,but named after his friend Baron Playfair
Playfair Key M ...
通讯编程文档 "Hard to find" full description of ContactID protocol from Ademco used by many home security devices
"Hard to find" full description of ContactID protocol from Ademco used by many home security devices to send messages to CMS (Central Monitoring Station) about security events.
Has full technical description and can be used to easy make CMS communication module that sends info from your alarm syst ...