Location:
Search - security
Search list
Description: Wireless Security is a vast topic and any attempt to address all issues in a single book
is a daunting task. It is almost impossible to explain each and every security algorithm
that is used in wireless security in detail in a single volume.
Platform: |
Size: 2599101 |
Author: yeahelton@hotmail.com |
Hits:
Description: The Tao of Network Security Monitoring Beyond Intrusion Detection
Platform: |
Size: 16211968 |
Author: 小云 |
Hits:
Description: Securing Linux_A Survival Guide for Linux Security Version 1.0
Platform: |
Size: 177152 |
Author: 小云 |
Hits:
Description: Acegi Security为Spring Framework提供一个兼容的安全认证服务(security services). -Acegi Security for the Spring Framework provides a compatible safety certification services (security services).
Platform: |
Size: 535552 |
Author: cxy |
Hits:
Description: This a book about network security and SNMP .-This a book about network security and SN MP.
Platform: |
Size: 19371008 |
Author: wangjia |
Hits:
Description: This book keeps the exposition as straightforward as possible and enables you to cut through the maze of acronyms, hacking tools, rumored weaknesses, and vague vendor security claims to make educated security decisions when purchasing or deploying WLAN."-This book keeps the exposition as straight forward as possible and enables you to cut throu gh the maze of acronyms, hacking tools, rumored weaknesses. and vague security vendor claims to make educat ed security decisions when purchasing or deplo ying WLAN. "
Platform: |
Size: 3066880 |
Author: 静水 |
Hits:
Description: Linux安全教程linux-security-Linux security tutorial linux-security
Platform: |
Size: 319488 |
Author: 王明勇 |
Hits:
Description: SQL Server Security Distilled, Second Edition
by Morris Lewis ISBN:1590592190
Apress © 2004 (352 pages)
This book takes an in-depth look at what you can do to secure data in SQL Server, shows how to authenticate access to data on the server, and authorizes what users can and can t do with that data, in versions 6.5, 7.0, and 2000.
Platform: |
Size: 2532352 |
Author: |
Hits:
Description: 这篇文章是关于P2P安全的,里面先介绍了P2P的原理,接着提出了一些解决网络安全的方法-This article is about the P2P security, which first introduced the principle of P2P, and then made a number of ways to solve the network security
Platform: |
Size: 243712 |
Author: 周林 |
Hits:
Description: Oreilly.Java.Security.2nd.rar,Oreilly丛书中对于Java安全的书-Oreilly.Java.Security.2nd.rar, Oreilly series of books for the Java security
Platform: |
Size: 953344 |
Author: yaojingjing |
Hits:
Description: The most up to date, comprehensive, and practical guide to Web services security, and the first to cover the final release of new standards SAML 1.1 and WS-Security.
Platform: |
Size: 3981312 |
Author: jasmine |
Hits:
Description: 自己用Java编的Client-Server聊天程序,结合了网络通信、数据安全、多线程的知识
1.使用RSA算法完成DES密钥的分配;
2.使用MD5结合RSA算法完成对消息的签名;
3.对原有消息及签名提供机密性保护(用DES算法加密);
4.能够解密并验证签名的合法性
-Their use of Java made the Client-Server chat program, a combination of network communications, data security, knowledge of multi-threaded one. RSA algorithm using the completion of the distribution of DES keys 2. RSA algorithm combines the use of MD5 message to complete the signature 3. The original message and signature to provide confidentiality protection (with DES encryption algorithm) 4. Able to decrypt and verify the legitimacy of the signature
Platform: |
Size: 8192 |
Author: Shadow |
Hits:
Description: RFID Security - F. Thornton, B. Haines, A. Das, et al - Syngress - 2006-RFID Security- F. Thornton, B. Haines, A. Das, et al- Syngress- 2006
Platform: |
Size: 4327424 |
Author: wfy |
Hits:
Description: 关于无线传感器网络安全性问题的研究进展和相关讨论的论文。-On wireless sensor network security research progress and related discussion papers.
Platform: |
Size: 128000 |
Author: 苏可 |
Hits:
Description: Radio Frequency Identification [RFID]
systems have become popular for
automated identification and supply chain
applications. This article describes the
technical fundamentals of RFID systems
and the associated standards. Specifically,
we address the security and privacy aspects
of this relatively new and heterogeneous
radio technology. We discuss the related
security requirements, the threats and the
implemented mechanisms. Then the current
security and privacy proposals and their
enhancements are presented. Finally we
discuss the role of this technology in
Ubiquitous Computing-The automated identification of objects
with electromagnetic fields is the major
purpose of the RFID [Radio Frequency
Identification] technology. An RFID system
basically consists of transponders [tags],
readers [scanners] and application systems
for further processing of the acquired data.
There is a large variety of different RFID
systems: they may use low, high or ultra
high frequencies, the transponder may emit
only a fixed identifier or possess
significant memory and processing
capabilities. Transponders may incorporate
no security features at all or realise
effective security protocols similar to
smartcards. Most transponders are
passively powered by the radio field
emitted by the reader but there are also
active tags with a separate power supply.
The transponder design is also little
uniform: there are e.g. tiny tags with a size
of several millimetres, very thin “smart
labels” or standard ID-1 cards
Platform: |
Size: 357376 |
Author: 胡利建 |
Hits:
Description: RFID – An introduction
RFID tags, security and the individual-When I lastwrote for CSLR, RFID tagswere but a glimmer in
some scientist’s eye. The thought that by 2006 they would be
in everyday use [even if we did not know it] was unthinkable.
However, the fact is that technology hasmoved on and RFID is
the next big thing – or rather the next very small thing, as the
major advances in technology relate to miniaturisation.
Platform: |
Size: 78848 |
Author: 胡利建 |
Hits:
Description: USB disk security for usb disk virus kill removal tool.
Platform: |
Size: 2082816 |
Author: naung |
Hits:
Description: This book is for systems architects
who are interested in building security into their applications. The book is designed to
be useful to architects in three ways: as an introduction to security architecture, as a
handbook on security issues for architecture review, and as a catalog of designs to look
for within a security product.
Platform: |
Size: 1585152 |
Author: eioruqoiu |
Hits:
Description: 本书系统地介绍了密码编码学与网络安全的基本原理和应用技术。全书主要包括下列四个部分:对称密码部分讨论了对称密码的算法和设计原理;公钥加密和散列函数部分讨论了公钥密码的算法和设计原理、报文鉴别码和散列函数的应用等;网络安全应用部分讨论了系统层的安全问题,包括电子邮件安全、IP安全以及Web 安全等;系统安全部分讨论了入侵者和病毒造成的威胁及相应的对策、防火墙和可信系统的应用等。-This book systematically describes encryption and network security study of the basic principles and application technology. Book include the following four parts: symmetric cryptography, symmetric cryptography, discussed some of the algorithms and design principles public-key encryption and hash function discussed some public key cryptography algorithms and design principles, message authentication code and the application of hash function etc. network security part of the system application layer security issues, including e-mail security, IP security and Web security system security is discussed in part caused by the intruder and virus threats and appropriate countermeasures, firewalls and trusted systems and so on.
Platform: |
Size: 12995584 |
Author: 秦中元 |
Hits:
Description: Java密码学基础资料 Java密码学基础资料 Java密码学基础资料 -JAVA SECURITY
Platform: |
Size: 432128 |
Author: chenfei |
Hits:
« 12
3
4
5
6
7
8
9
10
...
50
»