Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - encryption
Search - encryption - List
段纲的加密与解密(第二版)。PDF格式下载-program of the encryption and decryption (2nd edition). Download PDF format
Date : 2010-07-01 Size : 29.14mb User : 陈刚

最好的讲解加密解密的书籍-best on the encryption and decryption of books
Date : 2010-07-06 Size : 29.21mb User : 啊aaa

DL : 0
本书以循序渐进的方式介绍Samba的应用,使读者能够在24学时内掌握Samba的精髓。其主要内容有:Samba的基础,介绍怎样获取Samba的源代码、Samba的安装和测试;Samba的配置,涵盖smb.conf文件的分析、实现资源共享、安全保护和管理;Samba的使用,讨论Samba与UNIX、Windows 9x和Windows NT的综合应用;Samba的安全性,介绍口令加密和在Samba中使用SSL;另外,还有在广域网中实现Samba等高级内容。-the book on a gradual basis, Samba introduced the application so that readers can in 24 hours within the grasp of the essence of Samba. Its main contents are : Samba foundation on how to access the source code Samba, Samba installation and testing; Samba configuration, covering smb.conf file analysis, sharing resources, and security protection and management; The use of Samba, Samba discussions with the UNIX, Windows and Windows 9x NT integrated applications; Samba security, password encryption and introduced the use of SSL Samba; In addition, the wide-area network to achieve Samba senior content.
Date : 2025-12-23 Size : 18.69mb User : 黄金刚

SKIPJACK算法,可以进行普通加密解密,想必搞相关行业的朋友都知道-SKIPJACK algorithm that can be common encryption and decryption, must engage the relevant industry friends all know
Date : 2025-12-23 Size : 1.84mb User : 刘磊

北京大学信息安全学科的上课讲义,很详细的介绍了计算机领域的信息安全问题,以及各作加密算法的分析,这是第一部分-Beijing University information security disciplines class lectures, very detailed introduction to the field of computer information security, and the encryption algorithm for the analysis, this is the first part
Date : 2025-12-23 Size : 1.51mb User : 于跃

北京大学信息安全学科讲义,该讲义详细的介绍了目前世界上信息安全方面的问题,以及一些加密算法和安全策略,这是其中的第二部分-Beijing University information security disciplines lectures, the lectures detailed account of the world's information security problems, and some encryption algorithms and security strategy, which is the second part
Date : 2025-12-23 Size : 947kb User : 于跃

《加密与解密》第二版电子版 随书光盘(一)演示部分 2003年 本书在第一版的基础上,更新了第一版中的过时内容。 本书共分三个部分。 第一部分介绍与加密和解密技术相关的基础知识。 第二部分全面讲述各种最新的软件加密与解密技术及方法,如静态分析技术,动态分析技术,序列号,警告窗口,时间限制,加密算法MD5、SHA、RSA、ElGanal等。 第三部分主要介绍PE文件的知识,如增加文件功能、加壳与脱壳、补丁技术等。从光盘上拷贝文件到硬盘时,要注意改变文件属性,取消“只读”属性。-"encryption and decryption," the second edition of the electronic version of books on CD-ROM (a) demonstration of some 2003 in the first edition of the book, on the basis of the update of the first edition of outdated content. The book is divided into three parts. The first part gives with the encryption and decryption technology-related knowledge. The second part of a comprehensive picture of all the latest software encryption and decryption technology and methods, such as static analysis, dynamic analysis, serial number, a warning window of time constraints, encryption algorithm MD5, SHA, RSA, ElGanal so. The third part introduces the knowledge PE documents, such as increased document functions, shell and sabot, patch technology. From the CD copy files to the hard drive, the at
Date : 2025-12-23 Size : 15.6mb User : 张淼

《加密与解密》随书光盘(二)工具 本书在第一版的基础上,更新了第一版中的过时内容。 本书共分三个部分。 第一部分介绍与加密和解密技术相关的基础知识。 第二部分全面讲述各种最新的软件加密与解密技术及方法,如静态分析技术,动态分析技术,序列号,警告窗口,时间限制,加密算法MD5、SHA、RSA、ElGanal等。 第三部分主要介绍PE文件的知识,如增加文件功能、加壳与脱壳、补丁技术等。-"Encryption and decryption" CD with the book (2) tools in the first edition of the book, on the basis of the update of the first edition of outdated content. The book is divided into three parts. The first part gives with the encryption and decryption technology-related knowledge. The second part of a comprehensive picture of all the latest software encryption and decryption technology and methods, such as static analysis, dynamic analysis, serial number, a warning window of time constraints, encryption algorithm MD5, SHA, RSA, ElGanal so. The third part introduces the knowledge PE documents, such as increased document functions, shell and sabot, patch technology.
Date : 2025-12-23 Size : 13.81mb User : 张淼

《加密与解密》随书光盘(三)工具 本书在第一版的基础上,更新了第一版中的过时内容。 本书共分三个部分。 第一部分介绍与加密和解密技术相关的基础知识。 第二部分全面讲述各种最新的软件加密与解密技术及方法,如静态分析技术,动态分析技术,序列号,警告窗口,时间限制,加密算法MD5、SHA、RSA、ElGanal等。 第三部分主要介绍PE文件的知识,如增加文件功能、加壳与脱壳、补丁技术等。-"Encryption and decryption" CD with the book (3) tools in the first edition of the book, on the basis of the update of the first edition of outdated content. The book is divided into three parts. The first part gives with the encryption and decryption technology-related knowledge. The second part of a comprehensive picture of all the latest software encryption and decryption technology and methods, such as static analysis, dynamic analysis, serial number, a warning window of time constraints, encryption algorithm MD5, SHA, RSA, ElGanal so. The third part introduces the knowledge PE documents, such as increased document functions, shell and sabot, patch technology.
Date : 2025-12-23 Size : 10.66mb User : 张淼

《加密与解密》随书光盘(四)工具 本书在第一版的基础上,更新了第一版中的过时内容。 本书共分三个部分。 第一部分介绍与加密和解密技术相关的基础知识。 第二部分全面讲述各种最新的软件加密与解密技术及方法,如静态分析技术,动态分析技术,序列号,警告窗口,时间限制,加密算法MD5、SHA、RSA、ElGanal等。 第三部分主要介绍PE文件的知识,如增加文件功能、加壳与脱壳、补丁技术等。-"Encryption and decryption" CD with the book (4) tools in the first edition of the book, on the basis of the update of the first edition of outdated content. The book is divided into three parts. The first part gives with the encryption and decryption technology-related knowledge. The second part of a comprehensive picture of all the latest software encryption and decryption technology and methods, such as static analysis, dynamic analysis, serial number, a warning window of time constraints, encryption algorithm MD5, SHA, RSA, ElGanal so. The third part introduces the knowledge PE documents, such as increased document functions, shell and sabot, patch technology.
Date : 2025-12-23 Size : 18.48mb User : 张淼

《加密与解密》随书光盘(五)习题 本书在第一版的基础上,更新了第一版中的过时内容。 本书共分三个部分。 第一部分介绍与加密和解密技术相关的基础知识。 第二部分全面讲述各种最新的软件加密与解密技术及方法,如静态分析技术,动态分析技术,序列号,警告窗口,时间限制,加密算法MD5、SHA、RSA、ElGanal等。 第三部分主要介绍PE文件的知识,如增加文件功能、加壳与脱壳、补丁技术等。-"Encryption and decryption" CD with the book (5) Exercise of the first edition of the book, on the basis of the update of the first edition of outdated content. The book is divided into three parts. The first part gives with the encryption and decryption technology-related knowledge. The second part of a comprehensive picture of all the latest software encryption and decryption technology and methods, such as static analysis, dynamic analysis, serial number, a warning window of time constraints, encryption algorithm MD5, SHA, RSA, ElGanal so. The third part introduces the knowledge PE documents, such as increased document functions, shell and sabot, patch technology.
Date : 2025-12-23 Size : 11.67mb User : 张淼

DL : 0
gsm系统中话音加密技术的研究,gsm系统中话音加密技术的研究-gsm voice encryption systems research, gsm voice encryption systems research
Date : 2025-12-23 Size : 78kb User : 骆伯萍

DL : 0
DES( Data Encryption Standard)算法,于1977年得到美国政府的正式许可,是一种用56位密钥来加密64位数据的方法。DES算法以被应用于许多需要安全加密的场合。(如:UNIX的密码算法就是以DES算法为基础的)。-DES (Data Encryption Standard) algorithm, in 1977 the U.S. government' s official permission, is a 56 with 64-bit key to encrypt data. DES algorithm to be used in many occasions the necessary security encryption. (Such as: UNIX password algorithm is based on DES algorithm).
Date : 2025-12-23 Size : 6kb User : lindaqing

DL : 0
2007年硕士论文,基于混沌的数字图像和视频加密算法研究-Master' s thesis in 2007, based on the chaos of the digital image and video encryption algorithm
Date : 2025-12-23 Size : 3.96mb User : 小杜

DL : 0
2007年硕士论文,关于图像及视频序列的加密算法研究-Master' s thesis in 2007, about images and video sequences of the encryption algorithm
Date : 2025-12-23 Size : 7.07mb User : 小杜

Cryptography - New Encryption Technologies for Communications Designers
Date : 2025-12-23 Size : 4.94mb User : snake

Addison.Wesley.Secure.XML - The New Syntax for Signatures and Encryption
Date : 2025-12-23 Size : 1.39mb User : snake

DL : 0
a good paper on MPEG Video Encryption Algorithms
Date : 2025-12-23 Size : 330kb User : bright

a report about encryption and decryption by DES
Date : 2025-12-23 Size : 1.35mb User : phithong

A Survey on Image Encryption and Decryption using Blowfish & Watermarking
Date : 2025-12-23 Size : 318kb User : ashraf
« 12 3 4 5 6 7 8 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.