PROTECTION

共 157 篇文章
PROTECTION 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 157 篇文章,持续更新中。

lcd with protection circuit for select

lcd with protection circuit for select

Part4 of CPRM data document, CPRM is for copyright protection in SD system

Part4 of CPRM data document, CPRM is for copyright protection in SD system

Part3 of CPRM data document, CPRM is for copyright protection in SD system

Part3 of CPRM data document, CPRM is for copyright protection in SD system

Part2 of CPRM data document, CPRM is for copyright protection in SD system

Part2 of CPRM data document, CPRM is for copyright protection in SD system

Java programming on optical network protection and restroation algorithms

Java programming on optical network protection and restroation algorithms

TIMER.ASM ********* [ milindhp@tifrvax.tifr.res.in ] Set Processor configuration word as = 000

TIMER.ASM ********* [ milindhp@tifrvax.tifr.res.in ] Set Processor configuration word as = 0000 0000 1010 b. a] -MCLR tied to VDD (internally). b] Code protection off. c] WDT disabled. d

Exeinfope

Simple delphi app to show pe info along with its protection<br />

XMail is an Internet and intranet mail server featuring an SMTP server, POP3 server, finger server,

XMail is an Internet and intranet mail server featuring an SMTP server, POP3 server, finger server, multiple domains, no need for users to have a real system account, SMTP relay checking, RBL/RSS/ORBS

微电脑型热电偶隔离双输出传送器

特点(FEATURES) 精确度0.2%满刻度&plusmn;0.5℃(冷接点补偿)(Accuracy 0.2%F.S.&plusmn;0.5℃(CJC)) 高精确度冷接点温度补偿(CJC traceability<&plusmn;0.5℃(0-70℃)) 热电偶误差补偿,与断线保护功能(Sensor error compensation(offset) and burnout protectio

Part1 of CPRM association document, CPRM is used in copyright protection, which is necessary in SD s

Part1 of CPRM association document, CPRM is used in copyright protection, which is necessary in SD system

TION ESD (electrostatic discharge) sensitive device. Electrostatic charges as high as 4000 V readil

TION ESD (electrostatic discharge) sensitive device. Electrostatic charges as high as 4000 V readily accumulate on the human body and test equipment and can discharge without detection. WARNING! A

英文名为:《Data.Protection.and.Information.Lifecycle.Management》内容为:数据维护计划的统一框架

英文名为:《Data.Protection.and.Information.Lifecycle.Management》内容为:数据维护计划的统一框架,数据维护的策略标准,使用政策驱动(policy-driven)数据维护及数据生命周期(DLM)管理来提高安全、降低成本等。

using judgement on average power overflow or too small to implement the protection on amplifier

using judgement on average power overflow or too small to implement the protection on amplifier

保护模式教程源码 The source code of protection mode in dos

保护模式教程源码 The source code of protection mode in dos

The IA-32 Software Developer’s Manual, Volume 3: System Programming Guide (Order Number 245472), is

The IA-32 Software Developer’s Manual, Volume 3: System Programming Guide (Order Number 245472), is part of a three-volume set that describes the architecture and programming environment of all IA-3

利用FaxModem通过串口或TAPI接口直接发送和接收传真 一套非常不错的传真库(稳定

利用FaxModem通过串口或TAPI接口直接发送和接收传真 一套非常不错的传真库(稳定,高速),几乎支持所有的FaxModem,出自Symantec公司 Winfax 中国作者之手。 一 .Some of the standard features: 1.Comes with Class1, Class1.0, Class2 and Class 2.0 Fax Drivers 2

Automatic protection in Multicast networks

Automatic protection in Multicast networks

This is an example how one could hide a process on Windows based operation systems from task viewer

This is an example how one could hide a process on Windows based operation systems from task viewers like ProcDump (G-RoM, Lorian & Stone) or ProcessExplorer (SysInternals). It could e.g. be used a

LPC2214 Chip Protection

LPC2214 Chip Protection

Watermarking schemes evaluation Abstract鈥擠igital watermarking has been presented as a solution to c

Watermarking schemes evaluation Abstract鈥擠igital watermarking has been presented as a solution to copy protection of multimedia objects and dozens of schemes and algorithms have been proposed. Two ma