data+security
data+security技术资料下载专区,收录1,059份相关技术文档、开发源码、电路图纸等优质工程师资源,全部免费下载。
data+security 全部资料 1,059 份
To write data to the FIFO, present the data to be written and assert the write enable. At the next r
To write data to the FIFO, present the data to be written and assert the write enable. At the next rising edge of the cl...
You can Creat SDF Database with the help of Code and you can insert data and Retrive the data in Win
You can Creat SDF Database with the help of Code and you can insert data and Retrive the data in Windows Mobile Device o...
Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in the
Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of ...
文件上传源码 Multiple stores supported (Folder, Zip, Database, Memory). Security features (Blacklist, Fil
文件上传源码 Multiple stores supported (Folder, Zip, Database, Memory). Security features (Blacklist, FileSizeLimit, Max. Upl...
New security and control protocol for VoIP based on steganography and digital watermarking (关于ip te
New security and control protocol for VoIP based on steganography and digital watermarking (关于ip telephone security的外文资...
Nemesis a complete Linux video security system. It s idea is a cheap replacement for your commercia
Nemesis a complete Linux video security system. It s idea is a cheap replacement for your commercial video system that ...
The world s bestselling computer security book--fully expanded and updated is one of the most succes
The world s bestselling computer security book--fully expanded and updated is one of the most successful security books ...
An Overview of Smart Card Security. The smart card, an intelligent token, is a credit card sized
An Overview of Smart Card Security. The smart card, an intelligent token, is a credit card sized plastic card embedde...
SSL and TLS book. you can learn Secured socket layer and transport layer security from this book
SSL and TLS book. you can learn Secured socket layer and transport layer security from this book