SECURITY
共 306 篇文章
SECURITY 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 306 篇文章,持续更新中。
Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2
Playfair Cipher
1.not even the large number of keys in a monoalphabetic cipher provides security
2.one approach to improving security was to encrypt multiple letters
3.the Playfair Cipher is an exa
Its about cryptography example. useful for chatting with some sort of security
Its about cryptography example. useful for chatting with some sort of security
google的开源项目
google的开源项目,关于Spring Security
The world s bestselling computer security book--fully expanded and updated is one of the most succes
The world s bestselling computer security book--fully expanded and updated is one of the most successful security books ever written. Leverage the valuable insights Hacking Exposed 6 provides to help
GSM Security and the protocols involves in a mobile environment authentication process
GSM Security and the protocols involves in a mobile environment authentication process
To Calculate QOS and how it affects Security
To Calculate QOS and how it affects Security
The W78E58B is an 8-bit microcontroller which has an in-system programmable Flash EPROM for firmwa
The W78E58B is an 8-bit microcontroller which has an in-system programmable Flash EPROM for
firmware updating. The instruction set of the W78E58B is fully compatible with the standard 8052. The
W7
在网络安全中经常会遇到rootkit
在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a compute
This file is about the computer security and its interface.
This file is about the computer security and its interface.
The secret cipher that secures Mifare Classic RFID tags used in access control systems, subway tick
The secret cipher that secures Mifare Classic RFID tags used in access control systems, subway
tickets, and various other security-related applications has recently been disclosed
RFID, the wireless technology that has helped millions of people around the world to protect their
RFID, the wireless technology that has helped
millions of people around the world to protect their property and
make their workplaces safer is now in danger of being viewed as a
security risk. Ray
RFID – An introduction RFID tags, security and the individual
RFID – An introduction
RFID tags, security and the individual
该程序包提供了三种加解密算法的源代码:DES、AES和RSA。程序没有使用Java的security库
该程序包提供了三种加解密算法的源代码:DES、AES和RSA。程序没有使用Java的security库,完全是自己根据加解密算法流程手工编写的。适用于密码学加解密算法的学习和研究。 由于运行速度慢,不推荐用于实用项目。
This product has been manufactured to your company’s specifications a part for use in your company’
This product has been manufactured to your company’s specifications a part for use in your
company’s general electronic products. It is guaranteed to perform according to delivery
specifications. Fo
Description The art galleries of the new and very futuristic building of the Center for Balkan Coop
Description
The art galleries of the new and very futuristic building of the Center for Balkan Cooperation have the form of polygons (not necessarily convex). When a big exhibition is organized, watc
MySQL claims to be the world s most popular open source database, and with good reason. It is free
MySQL claims to be the world s most popular open source database, and with good
reason. It is free, runs on a wide variety of platforms, is relatively simple, easy to
configure and performs well e
Vostro-3560指纹驱动
戴尔Vostro-3560指纹驱动,Vostro-3560_Security_Driver_37TR0_WN_4.3.215.0_A02
If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction dis
If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction disallowing scripts to run in files opened on your local machine. When you first try to run the example
版本更新了一下
版本更新了一下,到5.84了,需要用VS.net平台进行编译运行,介绍与原来的一样!
磁盘文件的安全删除,我们通常所执行的删除操作并不是真正的删除只是清除了文件的fat表内容,文件数据还在磁盘上,可以恢复,所以不安全。-disk deletion of the security document, we usually enforced by the delete operation does
clean all the event log, include Application, Security, System
clean all the event log, include Application, Security, System