搜索资源列表
Bulletproof Wireless Security - GSM, UMTS, 802.11, & Ad Hoc Security
- Wireless Security is a vast topic and any attempt to address all issues in a single book is a daunting task. It is almost impossible to explain each and every security algorithm that is used in wireless security in det
The Tao of Network Security Monitoring Beyond Intr
- The Tao of Network Security Monitoring Beyond Intrusion Detection
Securing Linux_A Survival Guide for Linux Security
- Securing Linux_A Survival Guide for Linux Security Version 1.0
acegi-security-1.0.0-RC1-src
- Acegi Security为Spring fr a mework提供一个兼容的安全认证服务(security services). -Acegi Security for the Spring fr a mework provides a compatible safety certification services (security services).
Cisco.Press.Network.Security.Fundamentals.Sep.2004
- This a book about network security and SNMP .-This a book about network security and SN MP.
p2p-security
- 这篇文章是关于P2P安全的,里面先介绍了P2P的原理,接着提出了一些解决网络安全的方法-This article is about the P2P security, which first introduced the principle of P2P, and then made a number of ways to solve the network security
Client-Server-based-Security-Comunication-Tool
- 自己用Java编的Client-Server聊天程序,结合了网络通信、数据安全、多线程的知识 1.使用RSA算法完成DES密钥的分配; 2.使用MD5结合RSA算法完成对消息的签名; 3.对原有消息及签名提供机密性保护(用DES算法加密); 4.能够解密并验证签名的合法性 -Their use of Java made the Client-Server chat program, a combination of
RFID-Security
- RFID Security - F. Thornton, B. Haines, A. Das, et al - Syngress - 2006-RFID Security- F. Thornton, B. Haines, A. Das, et al- Syngress- 2006
security
- 关于无线传感器网络安全性问题的研究进展和相关讨论的论文。-On wireless sensor network security research progress and related discussion papers.
RFID-Security
- Radio Frequency Identification [RFID] systems have become popular for automated identification and supply chain applications. This article describes the technical fundamentals of RFID systems and the associated
RFID-tags-security-and-the-individual
- RFID – An introduction RFID tags, security and the individual-When I lastwrote for CSLR, RFID tagswere but a glimmer in some scientist’s eye. The thought that by 2006 they would be in everyday use [even if we did n
USB.Disk.Security.V5.0.0.76
- USB disk security for usb disk virus kill removal tool.
designing.security.architecture
- This book is for systems architects who are interested in building security into their applications. The book is designed to be useful to architects in three ways: as an introduction to security architecture, as a
TMS.Security.System.v2.4.Full.Source.Delphi
- delphi组件,用于与操作系统安全有关的操作,控件中对底层的API函数,作了大量封装。哈哈,用起来就一个字“爽”-delphi components, with the operating system for security-related operations, controls on the bottom of the API function, made a large number of packages. Haha, t
SIP-Protocol-and-Security-Mechanism
- 详细介绍了SIP协议栈的原理与其中的安全加解密机制,对于设计实际的安全语音传输系统有一点的借鉴指导作用-Detailed introduces the principle of SIP protocol stack and encryption security mechanism, to design the actual safety voice transmission systems have a reference guide
acegi-security-1.0.4-src
- 非常强大的安全认证框架,具有很好的扩展性。-A very powerful security authentication fr a mework, with very good scalability.
spring-security-2.0.5
- Spring框架中涉及到安全配置所需要的包,分享一下-Spring\spring-security-2.0.5.zip Spring\spring-security-2.0.5.zip Spring\spring-security-2.0.5.zip
A-Fast-Voltage-Security-Assessment
- A Fast Voltage Security Assessment Method Using Adaptive Bounding
applicationContext-security
- spring security 用户数据库 配置-spring security configuration user database
Sensor-Network-Security-A-Survey
- 本文是一篇关于传感器网络安全的综述,详细地从各个层介绍了它的研究情况。-Wireless sensor networks(WSNs) use small nodes with constrained capabilities to sense,collect,and disseminate information in many types of applications.As sensor networks become wide