Welcome![Sign In][Sign Up]
Location:
Search - network security

Search list

[OtherCPCNA-640-80-2-2.95

Description: Complete coverage of all four CCNP exams: ? EIGRP, OSPF, IS-IS, and BGP ? Optimizing routing ? IP multicast ? IPv6 ? VLAN implementation ? Spanning Tree ? InterVLAN routing ? Layer 3 redundancy ? Wireless LANs ? VoIP in campus networks ? Campus network security ? Frame-mode MPLS ? IPsec ? Cisco device hardening ? Cisco IOS? threat defenses ? Cisco VoIP ? QoS and AutoQoS ? Wireless scalability
Platform: | Size: 5065728 | Author: Pankaj Joshi | Hits:

[Special EffectsArnold

Description: 本方法可以将图像或水印置乱,保护水印图像在网络中安全传送!-This method can be image or watermark scrambling to protect the watermark image transmission in the network security!
Platform: | Size: 1024 | Author: 代江艳 | Hits:

[Internet-Networkstrobe-1.06.tar

Description: is a network/security tool that locates and describes all listening tcp ports on a (remote) host or on many hosts in a bandwidth utilisation maximising, and process resource minimising manner.
Platform: | Size: 35840 | Author: rebbe | Hits:

[Otherant.wsn

Description: Wireless Sensor Networks are wireless networks where every nodes recolects surrounding information. WSNs have several aplications such as militar survival, traffic control, building security, scientific research in other planets, etc. This project presents a communication protocol for wireless sensor networks based on the ant colony optimization metaheuristic, which uses artificial ant agents that recolects data from all sensor nodes of the network. Every ants fuzes data from a node and sends it to every other sensor and then to the base station. All ants look for a way to go where there is an energy eficient path.
Platform: | Size: 60416 | Author: rodrigo | Hits:

[source in ebook17

Description: 在社会信息化的推动下,作为其核心的数字化技术已步入研究开发阶段。为了实现粮库的温湿度自动检测,提高粮库储粮的安全性是粮库管理实现自动化、智能化。我们提出基于ZigBee多点粮库温湿度检测的方案。为此论文开展于无线传感器网络技术的温湿度数据采集系统的研制工作。ZigBee无线传感器网络是一种新兴的传输技术,将其应用于室内温度和湿度的采集,进而构成无线温湿度采集系统。论文介绍了无线传感器网络系统的体系结构及关键技术。-In society, driven by information technology, as part of its core digital technology has entered a stage of research and development. Depot in order to achieve automatic detection of the temperature and humidity to enhance the security of grain storage grain depot management is automated, intelligent. ZigBee Based on our multi-point detection of grain temperature and humidity program. Carried out for this thesis in the wireless sensor network technology, temperature and humidity data acquisition system development. ZigBee wireless sensor networks is a new transmission technology, will be applied to the indoor temperature and humidity of the collection, which constitutes a collection system of wireless temperature and humidity. This paper introduces wireless sensor network system architecture and key technologies.
Platform: | Size: 149504 | Author: hithdjsj | Hits:

[OtherSecurity_in_WSN

Description: Document for design security protocol in wireless sensor network
Platform: | Size: 5908480 | Author: nes | Hits:

[Other2006issc

Description: Security in wireless sensor networks is currently provided through symmetric key cryptography. Although the low computational complexity involved in private key algorithms is advantageous, session keys must be embedded in the sensor nodes before the nodes can be deployed. Protocols are also necessary to ensure synchronization of keys between the devices on a network. These protocols require significant communication and storage overhead. The limitation of such a cryptosystem is that it is not possible to guarantee the confidentiality of the session keys
Platform: | Size: 179200 | Author: yared | Hits:

[OtherCisco.Press.Cisco.Network.Design.Solutions.for.Sm

Description: Maximize the potential of your small-medium business network with effective design solutions that cover network security, IP telephony, unified communications, wireless networks, and CRM. Design and implement effective network solutions by mastering the design process that is used by successful networking professionals Understand the diversity of solutions for the SMB environment, avoiding the pitfalls of the one-size-fits-all approach Create effective and customizable security solutions across the spectrum of SMB types and sizes Exploit the trend of universal communications convergence by expanding into the VoIP market with the Cisco IP Telephony and unified communication solutions Break into the fast-growing CRM marketplace with the Cisco CRM integration solutions Implement wireless LAN solutions that facilitate productivity and workforce optimization-Maximize the potential of your small-medium business network with effective design solutions that cover network security, IP telephony, unified communications, wireless networks, and CRM. Design and implement effective network solutions by mastering the design process that is used by successful networking professionals Understand the diversity of solutions for the SMB environment, avoiding the pitfalls of the one-size-fits-all approach Create effective and customizable security solutions across the spectrum of SMB types and sizes Exploit the trend of universal communications convergence by expanding into the VoIP market with the Cisco IP Telephony and unified communication solutions Break into the fast-growing CRM marketplace with the Cisco CRM integration solutions Implement wireless LAN solutions that facilitate productivity and workforce optimization
Platform: | Size: 1599488 | Author: Ivan | Hits:

[Internet-Network802.11Security

Description: O Reilly出版的有关802.11无线网络安全方面的权威著作,是研究无线网络安全技术人员重要的参考书籍-Reilly published on 802.11 wireless network security authority of the book is to study the wireless network security and technical personnel an important reference book
Platform: | Size: 835584 | Author: matt | Hits:

[Software Engineeringlinux

Description: 《linux操作员》 linux 网络安全 LAMP系统工程师 嵌入式工程 操作系统维护 程序员-" Linux Operator" linux network security systems engineer LAMP programmers to maintain an embedded operating system works
Platform: | Size: 968704 | Author: 李斌 | Hits:

[Internet-NetworkInformation-Security

Description: 密码学部分 数据库,操作系统安全部分 网络安全部分-Cryptography, part of the database, operating system, part of the security part of the network security
Platform: | Size: 8505344 | Author: 李新 | Hits:

[Crack Hackcrypoprocessor

Description: This paper presents the design and implementation of a crypto processor, a special-purpose microprocessor optimized for the execution of cryptography algorithms. This crypto processor can be used for various security applications such as storage devices, embedded systems, network routers, etc.
Platform: | Size: 452608 | Author: dudeafroz | Hits:

[Otherhhh1

Description: Cognitive radios sense spectrum activity and apply spectrum policies in order to make decisions on when and in what bands they may communicate. These activities go beyond what is done when traditional radios communicate. This paper examines the denial of service vulnerabilities that are opened by these additional activities and explores potential protection remedies that can be applied. An analysis of how vulnerable are victim cognitive radios to potential denial of service attacks is presented along different axis, namely the network architecture employed, the spectrum access technique used and the spectrum awareness model. The goal is to assist cognitive radio designers to incorporate effective security measures now in the early stages of cognitive radio developmen.
Platform: | Size: 121856 | Author: mohammedo | Hits:

[OtherWiley.Interscience.Information.Security.Principle

Description: Basic theory of privacy - the basis of cryptography and privacy certified mountain base year, is a theory - software security, theory and practice of network security - protecting the actual information system development case study examples
Platform: | Size: 4388864 | Author: bk | Hits:

[OtherOnBroadcastAuthenticationinWirelessSensorNetworks.

Description: 无线传感器网络中的广播认证 摘要:广播认证是无线传感器网络安全服务的关键(WSNs)。-Wireless sensor network broadcast authentication Abstract: broadcast authentication in wireless sensor network security services, key (WSNs).
Platform: | Size: 145408 | Author: zj | Hits:

[OS programnetwork

Description: 网络安全一直是我们头痛的问题,这个是老师的课件,希望能有很大的帮助-Network security has always been our headache, this is the teacher' s courseware, hoping to be very helpful
Platform: | Size: 11480064 | Author: 王健松 | Hits:

[OtherNetwork-Algorithmics-An-Interdisciplinary-Approach

Description: 交换技术经典外文教材,适用于电脑网络,通信技术-In designing a network device, you make dozens of decisions that affect the speed with which it will performsometimes for better, but sometimes for worse. Network Algorithmics provides a complete, coherent methodology for maximizing speed while meeting your other design goals.Author George Varghese begins by laying out the implementation bottlenecks that are most often encountered at four disparate levels of implementation: protocol, OS, hardware, and architecture. He then derives 15 solid principlesranging from the commonly recognized to the groundbreakingthat are key to breaking these bottlenecks.The rest of the book is devoted to a systematic application of these principles to bottlenecks found specifically in endnodes, interconnect devices, and specialty functions such as security and measurement that can be located anywhere along the network. This immensely practical, clearly presented information will benefit anyone involved with network implementation, as well as students who ha
Platform: | Size: 2243584 | Author: opaque | Hits:

[OtherSecurityforWirelessSensorNetworks

Description: 无线传感器网络的一本书籍,介绍无线传感器网络安全的一本较新英文书籍,介绍了目前最新的一些无线传感器网络安全的一些算法。-Wireless sensor networks a book to introduce the wireless sensor network security, a relatively new books, introduces the latest of a number of wireless sensor network security, some algorithms.
Platform: | Size: 41047040 | Author: liangzhimao | Hits:

[Firewall-Securitynetwork

Description: 网络安全方面较为详细的资料,包括数据加密,数据认证,网络安全工程等。-Network security is more detailed information, including data encryption, data authentication, network security engineering.
Platform: | Size: 1404928 | Author: just | Hits:

[Crack Hackcryptography

Description: 网络安全中的几种重要的加密算法, CBC,CFB, message digest, etc.-important cryptography algorithm in network security, like CBC, CFB, message digest, etc.
Platform: | Size: 7168 | Author: Hechen Liu | Hits:
« 1 2 3 4 5 6 78 9 10 11 12 ... 50 »

CodeBus www.codebus.net