SECURITY
共 306 篇文章
SECURITY 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 306 篇文章,持续更新中。
The second edition of this popular book has been completely updated to add the new features of the J
The second edition of this popular book has been completely updated to add the new features of the Java Servlet API Version 2.2, and new chapters on servlet security and advanced communication. In add
this is the document for the secure development in java. It covers in very good details the aspect o
this is the document for the secure development in java. It covers in very good details the aspect of security programming in Java
RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digit
RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digital signature . Its security based on Integer Factorization Problem (IFP). RSA uses an asymetric key.
If you want to use the Struts Framework to its fullest potential, this is the book for you. Programm
If you want to use the Struts Framework to its fullest potential, this is the book for you. Programming Jakarta Struts, 2nd Edition covers everything the successful earlier edition did as well as plen
This program applies Message Digest (MD5) Algorithm Developed by Maimouna Al-ammar
This program applies Message Digest (MD5) Algorithm
Developed by Maimouna Al-ammar
5th Year, Computer Engineering Department, University of Damascus
Information a
This program applies Message Digest MD5 Algorithm Developed by Maimouna Al-ammar 5th Year, Compu
This program applies Message Digest MD5 Algorithm
Developed by Maimouna Al-ammar
5th Year, Computer Engineering Department, University of Damascus
Information and Network Security Material
A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digi
A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities
through digital certificates. A PKI includes components that issue digital certificates and
distribute certific
Steganography is the art of communicating a message by embedding it into multimedia data. It is desi
Steganography is the art of communicating a message by embedding it into multimedia data. It is desired to maximize the
amount of hidden information (embedding rate) while preserving security against
A Philosophy of Security Management
A Philosophy of Security Management
Concepts and Terminology for Computer Security
Concepts and Terminology for Computer Security
multimedia security development articles
multimedia security development articles
about encryption method of the quantom . this way is the new method for powerfull encrypting message
about encryption method of the quantom . this way is the new method for powerfull encrypting messages for security applets.
MD5的全称是Message-digest Algorithm 5(信息-摘要算法)
MD5的全称是Message-digest Algorithm 5(信息-摘要算法),在90年代初由MIT Laboratory for Computer Science和RSA Data Security Inc,的Ronald.L.Rivest开发出来,经MD2、MD3和MD4发展而来。
md5加密实现 C++ /* 使用方法: char Md5Buffer[33] CSecurity Security Security.MD5("a string",Md5Buffe
md5加密实现 C++
/*
使用方法:
char Md5Buffer[33]
CSecurity Security
Security.MD5("a string",Md5Buffer)
执行完成之后Md5Buffer中即存储了由"a string"计算得到的MD5值
*/
This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only b
This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security prog
Cisco E-DI supports perl scripting through the CLI. This feature automates many of the server and n
Cisco E-DI supports perl scripting through the CLI. This feature automates many of the server and
network administration tasks. This section explains how to enable and disable the perl scripting serv
LINUX SECURITY in PDF
LINUX SECURITY in PDF
An Introduction To Cryptography Chapter 1, “The Basics of Cryptography,” provides an overview of th
An Introduction To Cryptography
Chapter 1, “The Basics of Cryptography,” provides an overview of the
terminology and concepts you will encounter as you use PGP products.
Chapter 2, “Phil Zimmermann
Login Manager V3.0(LM3.0) is an authentication system which can integrate with any existing website
Login Manager V3.0(LM3.0) is an authentication system which can integrate with any existing website that meets the requirements. LM3.0 provides a gatekeeper where user must be authorized before enteri
"Hard to find" full description of ContactID protocol from Ademco used by many home security devices
"Hard to find" full description of ContactID protocol from Ademco used by many home security devices to send messages to CMS (Central Monitoring Station) about security events.
Has full technical