SECURITY
共 306 篇文章
SECURITY 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 306 篇文章,持续更新中。
Smart Grid Security
The field of cyber security, or information security, or information<br />
assurance, depending on your preference, is an interdisciplinary one.<br />
It is part computer science, part statistics, par
Security+and+Resiliency+Analytics
Driven by the rapid advancement of technology and the growing need of business<br />
requirements, cyber communications are embedded in many physical systems. The<br />
integration of cyber and physic
NIST Framework and Roadmap
Under the Energy Independence and Security Act of 2007 (EISA), the National Institute of<br />
Standards and Technology (NIST) was assigned “primary responsibility to coordinate<br />
development of a
Industrial Network Security
I would like to thank you for purchasing the second edition of “Industrial Network<br />
Security,” especially if you are one of the many supporters of the first edition.<br />
When the second edition
Dynamic Security
This book is written for engineers involved in the operation, control, and<br />
planning of electric power systems. In addition, the book provides information and<br />
tools for researchers working
Computational+Intelligence
The large-scale deployment of the smart grid (SG) paradigm could play a strategic role in<br />
supporting the evolution of conventional electrical grids toward active, flexible and self-<br />
healin
Big+Data+Analytics+Strategies
This is a practical book, to be sure, but it is also a book about hope and posi-<br />
tive change. I am quite sincere. The delivery of electricity is deeply rooted<br />
in the principle of universal
Service+Robotics+within+the+Digital+Home
Over the past few decades there has been an exponential growth in service robots<br />
and smart home technologies, which has led to the development of exciting new<br />
products in our daily lives.
Telecommunications Essentials Global Source
In this updated and expanded edition of her excellent telecommunications primer,
Lili explains in just the right detail everything you need to know to become
fluent in this most important and fascin
Short-range+Wireless+Communication
Developers, manufacturers and marketers of products incorporating short-<br />
range radio systems are experts in their fields—security, telemetry,<br />
medical care, to name a few. Often they add a
Physical Layer Security in Wireless Communications
The ever-increasing demand for private and sensitive data transmission over wireless net-<br />
works has made security a crucial concern in the current and future large-scale, dynamic,<br />
and hete
Active+and+Programmable+Networks
New applications such as video conferencing, video on demand, multi-<br />
media transcoders, Voice-over-IP (VoIP), intrusion detection, distributed<br />
collaboration, and intranet security require
Fundamental Limits on a Class of Secure
Abstract—In the future communication applications, users<br />
may obtain their messages that have different importance levels<br />
distributively from several available sources, such as distributed<
GSM 03.48
Digital cellular telecommunications system (Phase 2+);
Security mechanisms for SIM application toolkit;
Stage 2
(3GPP TS 03.48 version 8.8.0 Release 1999)
Cyber-Physical Systems
This book provides an overview of recent innovations and achievements in the broad areas of cyber-physical systems (CPS), including architecture, networking, systems, applications, security, and priva
The Universal Radio Hacker (URH)
The Universal Radio Hacker (URH) is a software for investigating unknown wireless protocols. Features include<br />
<br />
* __hardware interfaces__ for common Software Defined Radios<br />
* __easy d
8051 source code to be programmed to 51/52 for ez51 programmer device, can be used to unlock atmel s
8051 source code to be programmed to 51/52 for ez51 programmer device, can be used to unlock atmel security bit.
Complete coverage of all four CCNP exams: ? EIGRP, OSPF, IS-IS, and BGP ? Optimizing routing ? IP
Complete coverage of all four CCNP exams:
? EIGRP, OSPF, IS-IS, and BGP
? Optimizing routing
? IP multicast
? IPv6
? VLAN implementation
? Spanning Tree
? InterVLAN routing
? Layer 3 redundanc
An Overview of Smart Card Security. The smart card, an intelligent token, is a credit card sized
An Overview of Smart Card Security.
The smart card, an intelligent token, is a credit card sized plastic card embedded with an integrated circuit chip. It provides not only memory capacity, but com
md5 类实现了RSA Data Security, Inc.在提交给IETF 的RFC1321中的MD5 message-digest 算法。
md5 类实现了RSA Data Security, Inc.在提交给IETF
的RFC1321中的MD5 message-digest 算法。