PROTECTION
共 157 篇文章
PROTECTION 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 157 篇文章,持续更新中。
lcd with protection circuit for select
lcd with protection circuit for select
Part4 of CPRM data document, CPRM is for copyright protection in SD system
Part4 of CPRM data document, CPRM is for copyright protection in SD system
Part3 of CPRM data document, CPRM is for copyright protection in SD system
Part3 of CPRM data document, CPRM is for copyright protection in SD system
Part2 of CPRM data document, CPRM is for copyright protection in SD system
Part2 of CPRM data document, CPRM is for copyright protection in SD system
Java programming on optical network protection and restroation algorithms
Java programming on optical network protection and restroation algorithms
TIMER.ASM ********* [ milindhp@tifrvax.tifr.res.in ] Set Processor configuration word as = 000
TIMER.ASM
*********
[ milindhp@tifrvax.tifr.res.in ]
Set Processor configuration word as = 0000 0000 1010 b.
a] -MCLR tied to VDD (internally).
b] Code protection off.
c] WDT disabled.
d
Exeinfope
Simple delphi app to show pe info along with its protection<br />
XMail is an Internet and intranet mail server featuring an SMTP server, POP3 server, finger server,
XMail is an Internet and intranet mail server featuring an SMTP server, POP3 server, finger server, multiple domains, no need for users to have a real system account, SMTP relay checking, RBL/RSS/ORBS
微电脑型热电偶隔离双输出传送器
特点(FEATURES) 精确度0.2%满刻度±0.5℃(冷接点补偿)(Accuracy 0.2%F.S.±0.5℃(CJC)) 高精确度冷接点温度补偿(CJC traceability<±0.5℃(0-70℃)) 热电偶误差补偿,与断线保护功能(Sensor error compensation(offset) and burnout protectio
Part1 of CPRM association document, CPRM is used in copyright protection, which is necessary in SD s
Part1 of CPRM association document, CPRM is used in copyright protection, which is necessary in SD system
TION ESD (electrostatic discharge) sensitive device. Electrostatic charges as high as 4000 V readil
TION
ESD (electrostatic discharge) sensitive device. Electrostatic charges as high as 4000 V readily
accumulate on the human body and test equipment and can discharge without detection.
WARNING!
A
英文名为:《Data.Protection.and.Information.Lifecycle.Management》内容为:数据维护计划的统一框架
英文名为:《Data.Protection.and.Information.Lifecycle.Management》内容为:数据维护计划的统一框架,数据维护的策略标准,使用政策驱动(policy-driven)数据维护及数据生命周期(DLM)管理来提高安全、降低成本等。
using judgement on average power overflow or too small to implement the protection on amplifier
using judgement on average power overflow or too small to implement the protection on amplifier
保护模式教程源码 The source code of protection mode in dos
保护模式教程源码
The source code of protection mode in dos
The IA-32 Software Developer’s Manual, Volume 3: System Programming Guide (Order Number 245472), is
The IA-32 Software Developer’s Manual, Volume 3: System Programming Guide (Order
Number 245472), is part of a three-volume set that describes the architecture and programming
environment of all IA-3
利用FaxModem通过串口或TAPI接口直接发送和接收传真 一套非常不错的传真库(稳定
利用FaxModem通过串口或TAPI接口直接发送和接收传真 一套非常不错的传真库(稳定,高速),几乎支持所有的FaxModem,出自Symantec公司 Winfax 中国作者之手。
一 .Some of the standard features:
1.Comes with Class1, Class1.0, Class2 and Class 2.0 Fax Drivers
2
Automatic protection in Multicast networks
Automatic protection in Multicast networks
This is an example how one could hide a process on Windows based operation systems from task viewer
This is an example how one could hide a process on Windows based
operation systems from task viewers like ProcDump (G-RoM, Lorian
& Stone) or ProcessExplorer (SysInternals).
It could e.g. be used a
LPC2214 Chip Protection
LPC2214 Chip Protection
Watermarking schemes evaluation Abstract鈥擠igital watermarking has been presented as a solution to c
Watermarking schemes evaluation
Abstract鈥擠igital watermarking has been presented as a solution to copy protection of multimedia objects and dozens of schemes and algorithms have been proposed. Two ma