GSM SECURITY and the protocols involves in a mobile environment authentication process
标签: authentication environment protocols SECURITY
上传时间: 2017-05-01
上传用户:417313137
Spring SECURITY 2.0.x中文参考文档
上传时间: 2013-12-23
上传用户:缥缈
SQL SECURITY with Visual Basic 6.0
标签: SECURITY Visual Basic with
上传时间: 2014-01-11
上传用户:王者A
The world s bestselling computer SECURITY book--fully expanded and updated is one of the most successful SECURITY books ever written. Leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company to fight cyber-crime.
标签: bestselling computer SECURITY expanded
上传时间: 2017-05-14
上传用户:thuyenvinh
SSL and TLS book. you can learn Secured socket layer and transport layer SECURITY from this book
上传时间: 2013-12-06
上传用户:xuanjie
Payment Card Industry Data SECURITY Standard Handbook
标签: Industry Handbook SECURITY Standard
上传时间: 2013-12-13
上传用户:han_zh
Its about cryptography example. useful for chatting with some sort of SECURITY
标签: cryptography chatting SECURITY example
上传时间: 2017-05-24
上传用户:fanboynet
spring SECURITY的中文学习文档,很好用的
上传时间: 2014-01-04
上传用户:linlin
Playfair Cipher 1.not even the large number of keys in a monoalphabetic cipher provides SECURITY 2.one approach to improving SECURITY was to encrypt multiple letters 3.the Playfair Cipher is an example 4.invented by Charles Wheatstone in 1854,but named after his friend Baron Playfair Playfair Key Matrix 1.a 5X5 matrix of letters based on a keyword 2.fill in letters of keyword (sans duplicates) 3.fill rest of matrix with other letters Encrypting and Decrypting -plaintext is encrypted two letters at a time 1. if a pair is a repeated letter, insert filler like X’ 2. if both letters fall in the same row, replace each with letter to right (wrapping back to start from end) 3. if both letters fall in the same column, replace each with the letter below it (again wrapping to top from bottom) 4. otherwise each letter is replaced by the letter in the same row and in the column of the other letter of the pair
标签: monoalphabetic Playfair provides SECURITY
上传时间: 2017-05-25
上传用户:变形金刚
"Hard to find" full description of ContactID protocol from Ademco used by many home SECURITY devices to send messages to CMS (Central Monitoring Station) about SECURITY events. Has full technical description and can be used to easy make CMS communication module that sends info from your alarm system to CMS station.
标签: description ContactID protocol SECURITY
上传时间: 2017-05-30
上传用户:lifangyuan12