Welcome![Sign In][Sign Up]
Location:
Search - network security

Search list

[3G developcoco

Description: 无线传感器网络QoS保证技术 无线传感器网络数据融合技术 无线传感器网络安全机制-Wireless sensor network to guarantee QoS technology wireless sensor network data fusion technology wireless sensor network security mechanisms
Platform: | Size: 141312 | Author: coco | Hits:

[ICQ-IM-ChatClient-Server-based-Security-Comunication-Tool

Description: 自己用Java编的Client-Server聊天程序,结合了网络通信、数据安全、多线程的知识 1.使用RSA算法完成DES密钥的分配; 2.使用MD5结合RSA算法完成对消息的签名; 3.对原有消息及签名提供机密性保护(用DES算法加密); 4.能够解密并验证签名的合法性 -Their use of Java made the Client-Server chat program, a combination of network communications, data security, knowledge of multi-threaded one. RSA algorithm using the completion of the distribution of DES keys 2. RSA algorithm combines the use of MD5 message to complete the signature 3. The original message and signature to provide confidentiality protection (with DES encryption algorithm) 4. Able to decrypt and verify the legitimacy of the signature
Platform: | Size: 8192 | Author: Shadow | Hits:

[Internet-NetworkScan

Description: 用java写的一个端口扫描器源码 使用了swing和thread 学习网络安全的人值得一读-Using java to write a port scanner source thread using the swing and learning network security worth reading
Platform: | Size: 2048 | Author: lucifer | Hits:

[Othercomputer--network

Description: 计算机网络课件(qos机制、网络安全、网络基础知识)-Courseware for computer networks (qos mechanisms, network security, network basic knowledge)
Platform: | Size: 2885632 | Author: 辛强 | Hits:

[OtherCryptographyandNetworkSecurity4thEdition

Description: 本书系统地介绍了密码编码学与网络安全的基本原理和应用技术。全书主要包括下列四个部分:对称密码部分讨论了对称密码的算法和设计原理;公钥加密和散列函数部分讨论了公钥密码的算法和设计原理、报文鉴别码和散列函数的应用等;网络安全应用部分讨论了系统层的安全问题,包括电子邮件安全、IP安全以及Web 安全等;系统安全部分讨论了入侵者和病毒造成的威胁及相应的对策、防火墙和可信系统的应用等。第四版与第三版相比,新增了Whirlpool、CMAC、 DDoS以及CCITSE等内容,并对简化的AES、PKI等内容做了扩充。此外,对于基本内容的讲述方法也有许多变化和更新,并新加了100多道习题。  这本教材继荣膺了1999年计算机科学与工程教材TAA奖之后,在本版中又进行了大幅度的更新以反映最新的领域发展趋势,重新组织内容以提供更优的课堂指导和自学顺序。 -In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. This solid, up-to-date tutorial is a comprehensive treatment of cryptography and network security is ideal for self-study. Explores the basic issues to be addressed by a network security capability through a tutorial and survey of cryptography and network security technology. Examines the practice of network security via practical applications that have been implemented and are in use today. Provides a simplified AES (Advanced Encryption Standard) that enables readers to grasp the essentials of AES more easily. Features block cipher modes of operation, including the CMAC mode for authentication and the CCM mode for authenticated encryption. Includes an expanded, updated treatment of intruders and malicious software. A useful reference for system engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists.
Platform: | Size: 12995584 | Author: 秦中元 | Hits:

[Internet-NetworkPortScanner

Description: VB快速端口扫描器的源代码,能快速扫描计算机或局域网中所有存在安全隐患的端口。程序中附带特洛伊和后门程序信息的数据库,主要特色是扫描速度快,扫描32,000个端口仅仅需要一分钟不到。你可以更新数据库中的特洛伊和后门程序信息以便进行比对和查找可疑打开的端口。程序代码还有一些比较好的IP转换为域名以及互相转换的函数,对VB网络编程的朋友有一定参考价值。-Fast port scanner VB source code, can quickly scan your computer or local area network security risks exist in all the ports. Proceedings incidental to backdoor Trojan and information database, the main features of the scanning speed, scan 32,000 ports only need less than a minute. You can update the database of Troy and the back door in order to process the information to compare and find suspicious open ports. Some code is converted to a better domain name and IP conversion function with each other on network programming VB friends have a certain reference value.
Platform: | Size: 147456 | Author: Rhode | Hits:

[OS programSolutions-Crypto4e

Description: 《密码学与网络安全》 第四版 的习题解答,英文版-Cryptography and Network Security to answer the fourth edition of the exercise
Platform: | Size: 838656 | Author: ucvvf | Hits:

[Internet-Networkjsjwllw

Description: 计算机网络安全分析与防范策略论文 本文,将综合概括一些过去、现有的网络和系统漏洞,就几种常见的和最新出现的漏洞及其特征进行详细的说明,并就此进一步展开对这些漏洞的防范措施的具体介绍,使大家认识并了解这些漏洞的危害,从而更好的保护自己的计算机。通过对计算机网络面临威胁的分析,该文提出了网络安全方面的一些具体防范措施,提高了计算机网络的安全性。-Computer network security analysis and prevention strategy papers in this article will summarize some of the past, the existing network and system vulnerabilities, and on the latest of several common loopholes and a detailed description of the characteristics and to further these loopholes specific preventive measures introduced, so that we can recognize and understand the dangers of these loopholes in order to better protect their computers. Through the computer network threat analysis, the paper presents aspects of network security to guard against a number of specific measures to improve the security of computer networks.
Platform: | Size: 26624 | Author: 余祖澔 | Hits:

[Windows Developcryptography_and_network_security_william_stallin

Description: solution of network security
Platform: | Size: 215040 | Author: kang | Hits:

[Othernet

Description: 网络安全课件共十章 第一章 计算机网络安全技术概论 第二章 实体安全与硬件防护技术 第三章 计算机软件安全技术 第四章 网络安全防护技术 第五章 备份技术 第六章 密码技术与压缩技术 第七章 数据库系统安全 第八章 计算机病毒及防治 第九章 防火墙技术 第十章 系统平台与网络站点的安全 -Total network security courseware Chapter 10 Chapter Introduction to computer network security technology chapter hardware physical security protection technology and computer software in Chapter III Chapter IV Network Security Technology Security Technology Technology Chapter V Chapter VI password backup technology and compression technology section Chapter VII Chapter VIII of the database system security and control of computer viruses Chapter IX Chapter X system firewall technology platform and Web site security
Platform: | Size: 1418240 | Author: 巴恒星 | Hits:

[Crack Hackcryptography.tar

Description: Cryptography and Network Security, 4th Ed.-Stallings ebook. free to download
Platform: | Size: 12966912 | Author: kavitha | Hits:

[OS programanswer_for_Cryptography_and_Network_Security

Description: 密码编码学宇网络安全的答案 密码编码学宇网络安全的答案-answer for Cryptography and Network Security
Platform: | Size: 842752 | Author: 冯伟 | Hits:

[Othernetwork_security

Description: network security book
Platform: | Size: 12995584 | Author: rihannaiu | Hits:

[Documentsintroduction-to-cryptology.pdf

Description: Introduction to cryptology. This presentation provides and overview of cryptography and how it fits within the framework of network security.
Platform: | Size: 449536 | Author: athar | Hits:

[Internet-NetworkNetwork_Performance_Monitoring_and_Traffic_Statist

Description: 网络性能监控与流量统计系统,做网络安全的初学者的至宝。-Network performance monitoring and traffic statistical systems, do the treasure of network security for beginners.
Platform: | Size: 158720 | Author: shentian | Hits:

[Communication-MobileWSNSecurityDemo

Description: Wireless Sensor Network SEcurity demo
Platform: | Size: 336896 | Author: jax | Hits:

[Othernetwork.tar

Description: UNIX_Network_Programming_Vol_1_Richard_Stevens.djvu //本来还有2是关于进程的,不过那个电子书文件太大了,作罢。 POSIX Multithread Programming Primer.pdf //介绍pthread很不错的一本书,比如说介绍cancellation,它同时会对照win32,OS/2等实现的区别。 OReilly - Network Security with OpenSSL Ebook.pdf //对信息敏感的数据传输必须用ssl加密,配上openssl的源代码看书很不错。 mysql_MySQL Cookbook - Solutions and Examples for MySQL Database Developers (MySQL 4.01) [O Reilly, 2002, Paul DuBois].pdf nginx-0.7.63.tar.gz //一个不错的webserver.和apache 类似。不过效率比apache好。 fourier_mellin.pdf // 关于fouriermellin算法的文件。 -UNIX_Network_Programming_Vol_1_Richard_Stevens.djvu //Richard_Stevens!!! POSIX Multithread Programming Primer.pdf OReilly- Network Security with OpenSSL Ebook.pdf mysql_MySQL Cookbook- Solutions and Examples for MySQL Database Developers (MySQL 4.01) [O Reilly, 2002, Paul DuBois].pdf fourier_mellin.pdf //optical flow estimation using fourier mellin transform nginx-0.7.63.tar.gz //a efficient web server
Platform: | Size: 18493440 | Author: tomt | Hits:

[Crack HackCryptographyAndNetworkSecurity2005

Description: Cryptography and network security
Platform: | Size: 37888 | Author: minhchau | Hits:

[Otheranswers_to_cryptographyAndnetwork

Description: behrouz forouzan的cryptography and network security 的课后习题答案-cryptography and network security of behrouz forouzan. answers to Exercise in after every chapter
Platform: | Size: 4895744 | Author: xyh | Hits:

[Othermanaging-cisco-network-security.9781931836562.240

Description: Managing Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.
Platform: | Size: 5405696 | Author: kinomira | Hits:
« 1 23 4 5 6 7 8 9 10 ... 50 »

CodeBus www.codebus.net