SECURITY

共 306 篇文章
SECURITY 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 306 篇文章,持续更新中。

Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2

Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides security 2.one approach to improving security was to encrypt multiple letters 3.the Playfair Cipher is an exa

Its about cryptography example. useful for chatting with some sort of security

Its about cryptography example. useful for chatting with some sort of security

google的开源项目

google的开源项目,关于Spring Security

The world s bestselling computer security book--fully expanded and updated is one of the most succes

The world s bestselling computer security book--fully expanded and updated is one of the most successful security books ever written. Leverage the valuable insights Hacking Exposed 6 provides to help

GSM Security and the protocols involves in a mobile environment authentication process

GSM Security and the protocols involves in a mobile environment authentication process

To Calculate QOS and how it affects Security

To Calculate QOS and how it affects Security

The W78E58B is an 8-bit microcontroller which has an in-system programmable Flash EPROM for firmwa

The W78E58B is an 8-bit microcontroller which has an in-system programmable Flash EPROM for firmware updating. The instruction set of the W78E58B is fully compatible with the standard 8052. The W7

在网络安全中经常会遇到rootkit

在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a compute

This file is about the computer security and its interface.

This file is about the computer security and its interface.

The secret cipher that secures Mifare Classic RFID tags used in access control systems, subway tick

The secret cipher that secures Mifare Classic RFID tags used in access control systems, subway tickets, and various other security-related applications has recently been disclosed

RFID, the wireless technology that has helped millions of people around the world to protect their

RFID, the wireless technology that has helped millions of people around the world to protect their property and make their workplaces safer is now in danger of being viewed as a security risk. Ray

RFID – An introduction RFID tags, security and the individual

RFID – An introduction RFID tags, security and the individual

该程序包提供了三种加解密算法的源代码:DES、AES和RSA。程序没有使用Java的security库

该程序包提供了三种加解密算法的源代码:DES、AES和RSA。程序没有使用Java的security库,完全是自己根据加解密算法流程手工编写的。适用于密码学加解密算法的学习和研究。 由于运行速度慢,不推荐用于实用项目。

This product has been manufactured to your company’s specifications a part for use in your company’

This product has been manufactured to your company’s specifications a part for use in your company’s general electronic products. It is guaranteed to perform according to delivery specifications. Fo

Description The art galleries of the new and very futuristic building of the Center for Balkan Coop

Description The art galleries of the new and very futuristic building of the Center for Balkan Cooperation have the form of polygons (not necessarily convex). When a big exhibition is organized, watc

MySQL claims to be the world s most popular open source database, and with good reason. It is free

MySQL claims to be the world s most popular open source database, and with good reason. It is free, runs on a wide variety of platforms, is relatively simple, easy to configure and performs well e

Vostro-3560指纹驱动

戴尔Vostro-3560指纹驱动,Vostro-3560_Security_Driver_37TR0_WN_4.3.215.0_A02

If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction dis

If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction disallowing scripts to run in files opened on your local machine. When you first try to run the example

版本更新了一下

版本更新了一下,到5.84了,需要用VS.net平台进行编译运行,介绍与原来的一样! 磁盘文件的安全删除,我们通常所执行的删除操作并不是真正的删除只是清除了文件的fat表内容,文件数据还在磁盘上,可以恢复,所以不安全。-disk deletion of the security document, we usually enforced by the delete operation does

clean all the event log, include Application, Security, System

clean all the event log, include Application, Security, System