"Hard to find" full description of ContactID protocol from Ademco used by many home security devices
"Hard to find" full description of ContactID protocol from Ademco used by many home security devices to send messages to...
Java+security技术资料下载专区,收录10,000份相关技术文档、开发源码、电路图纸等优质工程师资源,全部免费下载。
"Hard to find" full description of ContactID protocol from Ademco used by many home security devices to send messages to...
该程序包提供了三种加解密算法的源代码:DES、AES和RSA。程序没有使用Java的security库,完全是自己根据加解密算法流程手工编写的。适用于密码学加解密算法的学习和研究。 由于运行速度慢,不推荐用于实用项目。
Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of ...
文件上传源码 Multiple stores supported (Folder, Zip, Database, Memory). Security features (Blacklist, FileSizeLimit, Max. Upl...
New security and control protocol for VoIP based on steganography and digital watermarking (关于ip telephone security的外文资...
Nemesis a complete Linux video security system. It s idea is a cheap replacement for your commercial video system that ...
The world s bestselling computer security book--fully expanded and updated is one of the most successful security books ...
An Overview of Smart Card Security. The smart card, an intelligent token, is a credit card sized plastic card embedde...
SSL and TLS book. you can learn Secured socket layer and transport layer security from this book
Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to imp...