Welcome![Sign In][Sign Up]
Location:
Search - Security

Search list

[OtherBulletproof Wireless Security - GSM, UMTS, 802.11, & Ad Hoc Security

Description: Wireless Security is a vast topic and any attempt to address all issues in a single book is a daunting task. It is almost impossible to explain each and every security algorithm that is used in wireless security in detail in a single volume.
Platform: | Size: 2599101 | Author: yeahelton@hotmail.com | Hits:

[BooksThe Tao of Network Security Monitoring Beyond Intr

Description: The Tao of Network Security Monitoring Beyond Intrusion Detection
Platform: | Size: 16211968 | Author: 小云 | Hits:

[BooksSecuring Linux_A Survival Guide for Linux Security

Description: Securing Linux_A Survival Guide for Linux Security Version 1.0
Platform: | Size: 177152 | Author: 小云 | Hits:

[JSP/Javaacegi-security-1.0.0-RC1-src

Description: Acegi Security为Spring Framework提供一个兼容的安全认证服务(security services). -Acegi Security for the Spring Framework provides a compatible safety certification services (security services).
Platform: | Size: 535552 | Author: cxy | Hits:

[SNMPCisco.Press.Network.Security.Fundamentals.Sep.2004

Description: This a book about network security and SNMP .-This a book about network security and SN MP.
Platform: | Size: 19371008 | Author: wangjia | Hits:

[OtherReal.802.11.Security.Wi.Fi.Protected.Access.And.80

Description: This book keeps the exposition as straightforward as possible and enables you to cut through the maze of acronyms, hacking tools, rumored weaknesses, and vague vendor security claims to make educated security decisions when purchasing or deploying WLAN."-This book keeps the exposition as straight forward as possible and enables you to cut throu gh the maze of acronyms, hacking tools, rumored weaknesses. and vague security vendor claims to make educat ed security decisions when purchasing or deplo ying WLAN. "
Platform: | Size: 3066880 | Author: 静水 | Hits:

[Otherlinux-security

Description: Linux安全教程linux-security-Linux security tutorial linux-security
Platform: | Size: 319488 | Author: 王明勇 | Hits:

[JSPApress.SQL.Server.Security.Distilled.Second.Editio

Description: SQL Server Security Distilled, Second Edition by Morris Lewis ISBN:1590592190 Apress © 2004 (352 pages) This book takes an in-depth look at what you can do to secure data in SQL Server, shows how to authenticate access to data on the server, and authorizes what users can and can t do with that data, in versions 6.5, 7.0, and 2000.
Platform: | Size: 2532352 | Author: | Hits:

[P2Pp2p-security

Description: 这篇文章是关于P2P安全的,里面先介绍了P2P的原理,接着提出了一些解决网络安全的方法-This article is about the P2P security, which first introduced the principle of P2P, and then made a number of ways to solve the network security
Platform: | Size: 243712 | Author: 周林 | Hits:

[JSPOreilly.Java.Security.2nd

Description: Oreilly.Java.Security.2nd.rar,Oreilly丛书中对于Java安全的书-Oreilly.Java.Security.2nd.rar, Oreilly series of books for the Java security
Platform: | Size: 953344 | Author: yaojingjing | Hits:

[JSPSecuringWebServiceswithWS-Security

Description: The most up to date, comprehensive, and practical guide to Web services security, and the first to cover the final release of new standards SAML 1.1 and WS-Security.
Platform: | Size: 3981312 | Author: jasmine | Hits:

[ICQ-IM-ChatClient-Server-based-Security-Comunication-Tool

Description: 自己用Java编的Client-Server聊天程序,结合了网络通信、数据安全、多线程的知识 1.使用RSA算法完成DES密钥的分配; 2.使用MD5结合RSA算法完成对消息的签名; 3.对原有消息及签名提供机密性保护(用DES算法加密); 4.能够解密并验证签名的合法性 -Their use of Java made the Client-Server chat program, a combination of network communications, data security, knowledge of multi-threaded one. RSA algorithm using the completion of the distribution of DES keys 2. RSA algorithm combines the use of MD5 message to complete the signature 3. The original message and signature to provide confidentiality protection (with DES encryption algorithm) 4. Able to decrypt and verify the legitimacy of the signature
Platform: | Size: 8192 | Author: Shadow | Hits:

[RFIDRFID-Security

Description: RFID Security - F. Thornton, B. Haines, A. Das, et al - Syngress - 2006-RFID Security- F. Thornton, B. Haines, A. Das, et al- Syngress- 2006
Platform: | Size: 4327424 | Author: wfy | Hits:

[SCMsecurity

Description: 关于无线传感器网络安全性问题的研究进展和相关讨论的论文。-On wireless sensor network security research progress and related discussion papers.
Platform: | Size: 128000 | Author: 苏可 | Hits:

[WEB CodeRFID-Security

Description: Radio Frequency Identification [RFID] systems have become popular for automated identification and supply chain applications. This article describes the technical fundamentals of RFID systems and the associated standards. Specifically, we address the security and privacy aspects of this relatively new and heterogeneous radio technology. We discuss the related security requirements, the threats and the implemented mechanisms. Then the current security and privacy proposals and their enhancements are presented. Finally we discuss the role of this technology in Ubiquitous Computing-The automated identification of objects with electromagnetic fields is the major purpose of the RFID [Radio Frequency Identification] technology. An RFID system basically consists of transponders [tags], readers [scanners] and application systems for further processing of the acquired data. There is a large variety of different RFID systems: they may use low, high or ultra high frequencies, the transponder may emit only a fixed identifier or possess significant memory and processing capabilities. Transponders may incorporate no security features at all or realise effective security protocols similar to smartcards. Most transponders are passively powered by the radio field emitted by the reader but there are also active tags with a separate power supply. The transponder design is also little uniform: there are e.g. tiny tags with a size of several millimetres, very thin “smart labels” or standard ID-1 cards
Platform: | Size: 357376 | Author: 胡利建 | Hits:

[RFIDRFID-tags-security-and-the-individual

Description: RFID – An introduction RFID tags, security and the individual-When I lastwrote for CSLR, RFID tagswere but a glimmer in some scientist’s eye. The thought that by 2006 they would be in everyday use [even if we did not know it] was unthinkable. However, the fact is that technology hasmoved on and RFID is the next big thing – or rather the next very small thing, as the major advances in technology relate to miniaturisation.
Platform: | Size: 78848 | Author: 胡利建 | Hits:

[DocumentsUSB.Disk.Security.V5.0.0.76

Description: USB disk security for usb disk virus kill removal tool.
Platform: | Size: 2082816 | Author: naung | Hits:

[Software Engineeringdesigning.security.architecture

Description: This book is for systems architects who are interested in building security into their applications. The book is designed to be useful to architects in three ways: as an introduction to security architecture, as a handbook on security issues for architecture review, and as a catalog of designs to look for within a security product.
Platform: | Size: 1585152 | Author: eioruqoiu | Hits:

[Firewall-SecurityCryptography.and.Network.Security.4th.Edition

Description: 本书系统地介绍了密码编码学与网络安全的基本原理和应用技术。全书主要包括下列四个部分:对称密码部分讨论了对称密码的算法和设计原理;公钥加密和散列函数部分讨论了公钥密码的算法和设计原理、报文鉴别码和散列函数的应用等;网络安全应用部分讨论了系统层的安全问题,包括电子邮件安全、IP安全以及Web 安全等;系统安全部分讨论了入侵者和病毒造成的威胁及相应的对策、防火墙和可信系统的应用等。-This book systematically describes encryption and network security study of the basic principles and application technology. Book include the following four parts: symmetric cryptography, symmetric cryptography, discussed some of the algorithms and design principles public-key encryption and hash function discussed some public key cryptography algorithms and design principles, message authentication code and the application of hash function etc. network security part of the system application layer security issues, including e-mail security, IP security and Web security system security is discussed in part caused by the intruder and virus threats and appropriate countermeasures, firewalls and trusted systems and so on.
Platform: | Size: 12995584 | Author: 秦中元 | Hits:

[JSPjava-security-base

Description: Java密码学基础资料 Java密码学基础资料 Java密码学基础资料 -JAVA SECURITY
Platform: | Size: 432128 | Author: chenfei | Hits:
« 12 3 4 5 6 7 8 9 10 ... 50 »

CodeBus www.codebus.net