Location:
Search - security book
Search list
Description: A book describle in detail about the system security and usability technology. It is a system book on security.
Platform: |
Size: 7935735 |
Author: Myron Tan |
Hits:
Description: RFID.Security指南
安全性是rfid的重要因素,本书详细探讨了rfid的安全性问题,英文-RFID.Security Guide rfid safety is an important factor, The book explored in detail the rfid security issue, English
Platform: |
Size: 4349642 |
Author: lilin |
Hits:
Description: This a book about network security and SNMP .-This a book about network security and SN MP.
Platform: |
Size: 19371325 |
Author: wangjia |
Hits:
Description: security tools 介绍了各种安全工具,很好的书-security tools introduced various security tools, very good book
Platform: |
Size: 1344790 |
Author: 郑树峰 |
Hits:
Description: This book keeps the exposition as straightforward as possible and enables you to cut through the maze of acronyms, hacking tools, rumored weaknesses, and vague vendor security claims to make educated security decisions when purchasing or deploying WLAN.\"-This book keeps the exposition as straight forward as possible and enables you to cut throu gh the maze of acronyms, hacking tools, rumored weaknesses. and vague security vendor claims to make educat ed security decisions when purchasing or deplo ying WLAN. "
Platform: |
Size: 3066839 |
Author: 静水 |
Hits:
Description: Wireless Security is a vast topic and any attempt to address all issues in a single book
is a daunting task. It is almost impossible to explain each and every security algorithm
that is used in wireless security in detail in a single volume.
Platform: |
Size: 2599101 |
Author: yeahelton@hotmail.com |
Hits:
Description: Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you ll want this book beside you every step of the way.-Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in Theor y and practice of wireless security, dispelling some of the myths along the way. In do ing so, they provide you with the technical grounding r equired to think about how the rest of the book ap plies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--ba sed systems. you ll want this book beside you every step of the way.
Platform: |
Size: 835584 |
Author: 秦 |
Hits:
Description: This a book about network security and SNMP .-This a book about network security and SN MP.
Platform: |
Size: 19371008 |
Author: wangjia |
Hits:
Description: This book keeps the exposition as straightforward as possible and enables you to cut through the maze of acronyms, hacking tools, rumored weaknesses, and vague vendor security claims to make educated security decisions when purchasing or deploying WLAN."-This book keeps the exposition as straight forward as possible and enables you to cut throu gh the maze of acronyms, hacking tools, rumored weaknesses. and vague security vendor claims to make educat ed security decisions when purchasing or deplo ying WLAN. "
Platform: |
Size: 3066880 |
Author: 静水 |
Hits:
Description: SQL Server Security Distilled, Second Edition
by Morris Lewis ISBN:1590592190
Apress © 2004 (352 pages)
This book takes an in-depth look at what you can do to secure data in SQL Server, shows how to authenticate access to data on the server, and authorizes what users can and can t do with that data, in versions 6.5, 7.0, and 2000.
Platform: |
Size: 2532352 |
Author: |
Hits:
Description: The CodeBreakers(《破译者》英文版),Kahn David 密码类得书籍 讲密码安全的-The CodeBreakers ( decipher in English), Kahn David password type a book stresses password security
Platform: |
Size: 1183744 |
Author: 周周 |
Hits:
Description: This book is for systems architects
who are interested in building security into their applications. The book is designed to
be useful to architects in three ways: as an introduction to security architecture, as a
handbook on security issues for architecture review, and as a catalog of designs to look
for within a security product.
Platform: |
Size: 1585152 |
Author: eioruqoiu |
Hits:
Description: wireless security book which can be fruitful for guys who is studying courses in security
Platform: |
Size: 4450304 |
Author: zahid |
Hits:
Description: 本书系统地介绍了密码编码学与网络安全的基本原理和应用技术。全书主要包括下列四个部分:对称密码部分讨论了对称密码的算法和设计原理;公钥加密和散列函数部分讨论了公钥密码的算法和设计原理、报文鉴别码和散列函数的应用等;网络安全应用部分讨论了系统层的安全问题,包括电子邮件安全、IP安全以及Web 安全等;系统安全部分讨论了入侵者和病毒造成的威胁及相应的对策、防火墙和可信系统的应用等。-This book systematically describes encryption and network security study of the basic principles and application technology. Book include the following four parts: symmetric cryptography, symmetric cryptography, discussed some of the algorithms and design principles public-key encryption and hash function discussed some public key cryptography algorithms and design principles, message authentication code and the application of hash function etc. network security part of the system application layer security issues, including e-mail security, IP security and Web security system security is discussed in part caused by the intruder and virus threats and appropriate countermeasures, firewalls and trusted systems and so on.
Platform: |
Size: 12995584 |
Author: 秦中元 |
Hits:
Description: Wiley IPTV security book ,Protect high value digital content-Wiley IPTV security book ,Protect high value digital content
Platform: |
Size: 2156544 |
Author: n |
Hits:
Description: network security book
Platform: |
Size: 12995584 |
Author: rihannaiu |
Hits:
Description: This book is divided into two parts, with the
first being “Mobile Application Platforms” (Chapters 2 through 8). These chapters
discuss the major operating system platforms on mobile devices, including Google’s
Android, Apple’s iPhone, Windows Mobile, RIM BlackBerry, J2ME, and Symbian.
These chapters strictly discuss how to use the platforms to build secure applications.
For example, they address many of the items in the top 15 list discussed in Chapter 1,
including secure storage, application isolation, and malware threads. These chapters
should be considered a “how-to” guide for application developers who are interested
in leveraging the security models of each platform.
Platform: |
Size: 3871744 |
Author: guosong |
Hits:
Description: Java2平台安全技术结构API设计。本书明确而详尽地阐述了Java平台安全性,探究了Java安全结构的内幕。
本书首先概述了计算机和网络安全概念并解释了Java安全模型,并在此基础上,详细描述了Java 2平台中新增加的许多安全结构方面的措施,同时对Java安全性的实施提出了使用指导,描绘了如何定制、扩展和精化安全结构以及成功实现的技术细节。
本书为建立安全、有效、强大和可移植的Java应用程序和applet提供了重要的信息,对于致力于研究Java平台的专业人员是一本必不可少的参考书。-Inside.Java.2.Platform.Security.This book describes clearly and in detail Java platform security, Java security architecture to explore the insider. Book begins with an overview of the computer and network security concepts and explains the Java security model, and on this basis, a detailed description of the Java 2 platform to increase the number of new safety measures for structural aspects, while Java security Shi Shi proposed the use of guide describes how to customize, extend and refine security structures and the technical details of the successful. This book is a safe, effective, powerful and portable Java applications and applet provides important information for the professionals working on Java platform is an essential reference.
Platform: |
Size: 5883904 |
Author: york |
Hits:
Description: network security book 网络安全分析的教材比较有用,从基础将其深入简出-Textbook of network security analysis of network security book is useful from basic depth Jane
Platform: |
Size: 22841344 |
Author: sanding |
Hits:
Description: 博弈论应用于认知无线电的有价值的文章,可供初学者学习。(Various spectrum management schemes have been proposed in recent years to improve the spectrum utilization in cognitive radio networks. However, few of them have considered the existence of cognitive attackers who can adapt their attacking strategy to the time-varying spectrum environment and the secondary users' strategy. In this paper, we investigate the security mechanism when secondary users are facing the jamming attack, and propose a stochastic game framework for anti-jamming defense. At each stage of the game, secondary users observe the spectrum availability, the channel quality, and the attackers' strategy from the status of jammed channels. According to this observation, they will decide how many channels they should reserve for transmitting control and data messages and how to switch between the)
Platform: |
Size: 16647168 |
Author: 小提子_快乐 |
Hits:
« 12
3
4
5
6
7
8
9
10
...
30
»