SECURITY

共 306 篇文章
SECURITY 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 306 篇文章,持续更新中。

The second edition of this popular book has been completely updated to add the new features of the J

The second edition of this popular book has been completely updated to add the new features of the Java Servlet API Version 2.2, and new chapters on servlet security and advanced communication. In add

this is the document for the secure development in java. It covers in very good details the aspect o

this is the document for the secure development in java. It covers in very good details the aspect of security programming in Java

RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digit

RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digital signature . Its security based on Integer Factorization Problem (IFP). RSA uses an asymetric key.

If you want to use the Struts Framework to its fullest potential, this is the book for you. Programm

If you want to use the Struts Framework to its fullest potential, this is the book for you. Programming Jakarta Struts, 2nd Edition covers everything the successful earlier edition did as well as plen

This program applies Message Digest (MD5) Algorithm Developed by Maimouna Al-ammar

This program applies Message Digest (MD5) Algorithm Developed by Maimouna Al-ammar 5th Year, Computer Engineering Department, University of Damascus Information a

This program applies Message Digest MD5 Algorithm Developed by Maimouna Al-ammar 5th Year, Compu

This program applies Message Digest MD5 Algorithm Developed by Maimouna Al-ammar 5th Year, Computer Engineering Department, University of Damascus Information and Network Security Material

A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digi

A Public Key Infrastructure (PKI) binds cryptographic public keys to physical entities through digital certificates. A PKI includes components that issue digital certificates and distribute certific

Steganography is the art of communicating a message by embedding it into multimedia data. It is desi

Steganography is the art of communicating a message by embedding it into multimedia data. It is desired to maximize the amount of hidden information (embedding rate) while preserving security against

A Philosophy of Security Management

A Philosophy of Security Management

Concepts and Terminology for Computer Security

Concepts and Terminology for Computer Security

multimedia security development articles

multimedia security development articles

about encryption method of the quantom . this way is the new method for powerfull encrypting message

about encryption method of the quantom . this way is the new method for powerfull encrypting messages for security applets.

MD5的全称是Message-digest Algorithm 5(信息-摘要算法)

MD5的全称是Message-digest Algorithm 5(信息-摘要算法),在90年代初由MIT Laboratory for Computer Science和RSA Data Security Inc,的Ronald.L.Rivest开发出来,经MD2、MD3和MD4发展而来。

md5加密实现 C++ /* 使用方法: char Md5Buffer[33] CSecurity Security Security.MD5("a string",Md5Buffe

md5加密实现 C++ /* 使用方法: char Md5Buffer[33] CSecurity Security Security.MD5("a string",Md5Buffer) 执行完成之后Md5Buffer中即存储了由"a string"计算得到的MD5值 */

This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only b

This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security prog

Cisco E-DI supports perl scripting through the CLI. This feature automates many of the server and n

Cisco E-DI supports perl scripting through the CLI. This feature automates many of the server and network administration tasks. This section explains how to enable and disable the perl scripting serv

LINUX SECURITY in PDF

LINUX SECURITY in PDF

An Introduction To Cryptography Chapter 1, “The Basics of Cryptography,” provides an overview of th

An Introduction To Cryptography Chapter 1, “The Basics of Cryptography,” provides an overview of the terminology and concepts you will encounter as you use PGP products. Chapter 2, “Phil Zimmermann

Login Manager V3.0(LM3.0) is an authentication system which can integrate with any existing website

Login Manager V3.0(LM3.0) is an authentication system which can integrate with any existing website that meets the requirements. LM3.0 provides a gatekeeper where user must be authorized before enteri

"Hard to find" full description of ContactID protocol from Ademco used by many home security devices

"Hard to find" full description of ContactID protocol from Ademco used by many home security devices to send messages to CMS (Central Monitoring Station) about security events. Has full technical