搜索资源列表
ASP.NET_Security_PasswordEncryptor
- Security control for vb. net component
Security_research
- A ppt report the security mgm and market in Chinese
WirelessSecurityKnowItAll
- What is it that makes a wireless medium so unique? What are the problems of operating in the wireless medium and how are they overcome? What are the different types of wireless networks in use today? How does each one of them work and how do th
artificalfinger
- Importance of Open Discussion on Adversarial Analyses for Mobile Security Technologies ---A Case Study for User Identification --- Finger print identification and possibilities might be used to cheat finger print devices. How to choose fingerprin
4
- 关于信息安全等级保护工作的实施意见(公通字[2004]66号)-Level of protection on the information security implementation advice (public through [2004] 66)
hacking-growth-diary
- 一个黑客成长为安全专家的传记,里面有大量实际操作的教程,黑客成长日记-A hacker security experts biography growth, which has a large number of practical tutorials, hacking growth diary
captcha
- Capcha in PHP 5, very security
hark
- 该文章分为十六个章节 逐步的讲述了网络安全学、社会工程学. 讲述的是一个黑客的故事,这位黑客 曾经成功闯入“北美空中防护指挥系统”, 被FBI通缉.他就是 凯文·米特尼克。 本书也是由他所著.当然这是中文版. 阅读此书,你会发现我们所有的人都终将需要得到“米特尼克”(译者注:指凯文·米特尼克这样的人)的指导。-The article is divided into sixteen chapters gradually learn about the
IEEE_00983498-2001
- Combined Digital Signature and Digital Watermark Scheme for Image Authentication,Digital Signature, Digital Watermark, Image Authentication, Internet Security
WP-Deep-Packet-Inspection-v1.0
- Understanding Deep Packet Inspection for SCADA Security
cn_proj
- network security for packets while sending source to destination
Easy-language-QQ-password-
- Easy language QQ password secret security source absolute tune to force
install
- ONVIF is a global and open industry forum with the goal to facilitate the development and use of a global open standard for the interface of physical IP-based security products.
NFC-Security
- nfc Security for portal network
Network
- for network security all porpuse
WLAN_Presentation
- Presentation Overview History Standards Used Technologies Used Topologies Hardware Security