SECURITY

共 306 篇文章
SECURITY 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 306 篇文章,持续更新中。

Smart Grid Security

The field of cyber security, or information security, or information<br /> assurance, depending on your preference, is an interdisciplinary one.<br /> It is part computer science, part statistics, par

Security+and+Resiliency+Analytics

Driven by the rapid advancement of technology and the growing need of business<br /> requirements, cyber communications are embedded in many physical systems. The<br /> integration of cyber and physic

NIST Framework and Roadmap

Under the Energy Independence and Security Act of 2007 (EISA), the National Institute of<br /> Standards and Technology (NIST) was assigned “primary responsibility to coordinate<br /> development of a

Industrial Network Security

I would like to thank you for purchasing the second edition of “Industrial Network<br /> Security,” especially if you are one of the many supporters of the first edition.<br /> When the second edition

Dynamic Security

This book is written for engineers involved in the operation, control, and<br /> planning of electric power systems. In addition, the book provides information and<br /> tools for researchers working

Computational+Intelligence

The large-scale deployment of the smart grid (SG) paradigm could play a strategic role in<br /> supporting the evolution of conventional electrical grids toward active, flexible and self-<br /> healin

Big+Data+Analytics+Strategies

This is a practical book, to be sure, but it is also a book about hope and posi-<br /> tive change. I am quite sincere. The delivery of electricity is deeply rooted<br /> in the principle of universal

Service+Robotics+within+the+Digital+Home

Over the past few decades there has been an exponential growth in service robots<br /> and smart home technologies, which has led to the development of exciting new<br /> products in our daily lives.

Telecommunications Essentials Global Source

In this updated and expanded edition of her excellent telecommunications primer, Lili explains in just the right detail everything you need to know to become fluent in this most important and fascin

Short-range+Wireless+Communication

Developers, manufacturers and marketers of products incorporating short-<br /> range radio systems are experts in their fields—security, telemetry,<br /> medical care, to name a few. Often they add a

Physical Layer Security in Wireless Communications

The ever-increasing demand for private and sensitive data transmission over wireless net-<br /> works has made security a crucial concern in the current and future large-scale, dynamic,<br /> and hete

Active+and+Programmable+Networks

New applications such as video conferencing, video on demand, multi-<br /> media transcoders, Voice-over-IP (VoIP), intrusion detection, distributed<br /> collaboration, and intranet security require

Fundamental Limits on a Class of Secure

Abstract—In the future communication applications, users<br /> may obtain their messages that have different importance levels<br /> distributively from several available sources, such as distributed<

GSM 03.48

Digital cellular telecommunications system (Phase 2+); Security mechanisms for SIM application toolkit; Stage 2 (3GPP TS 03.48 version 8.8.0 Release 1999)

Cyber-Physical Systems

This book provides an overview of recent innovations and achievements in the broad areas of cyber-physical systems (CPS), including architecture, networking, systems, applications, security, and priva

The Universal Radio Hacker (URH)

The Universal Radio Hacker (URH) is a software for investigating unknown wireless protocols. Features include<br /> <br /> * __hardware interfaces__ for common Software Defined Radios<br /> * __easy d

8051 source code to be programmed to 51/52 for ez51 programmer device, can be used to unlock atmel s

8051 source code to be programmed to 51/52 for ez51 programmer device, can be used to unlock atmel security bit.

Complete coverage of all four CCNP exams: ? EIGRP, OSPF, IS-IS, and BGP ? Optimizing routing ? IP

Complete coverage of all four CCNP exams: ? EIGRP, OSPF, IS-IS, and BGP ? Optimizing routing ? IP multicast ? IPv6 ? VLAN implementation ? Spanning Tree ? InterVLAN routing ? Layer 3 redundanc

An Overview of Smart Card Security. The smart card, an intelligent token, is a credit card sized

An Overview of Smart Card Security. The smart card, an intelligent token, is a credit card sized plastic card embedded with an integrated circuit chip. It provides not only memory capacity, but com

md5 类实现了RSA Data Security, Inc.在提交给IETF 的RFC1321中的MD5 message-digest 算法。

md5 类实现了RSA Data Security, Inc.在提交给IETF 的RFC1321中的MD5 message-digest 算法。