虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Security

网络安全技术及其协议,包括了网络通信安全、信息在网络传输中的保密性和完整性、控制访问受限网域与敏感信息以及在公共网络如因特网上使用隐秘通讯。为了解决这些问题,各大组织及技术供应商纷纷推出了各种网络和信息安全技术。
  • Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the rela

    Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the related architecture. HIP is a proposal to change the TCP/IP stack to securely support mobility and multi-homing. Additionally, it provides for enhanced Security and privacy and advanced network concepts, such as moving networks and mobile ad hoc networks. HIP is "cool", which means that as a mobile VPN solution, when your network interfaces go up or down, there is no need to re-establish a secure tunnel.

    标签: Identity Protocol Host implemetation

    上传时间: 2016-09-01

    上传用户:皇族传媒

  • Linux Bible: 介紹包括 Fedora, KNOPPIX, Debian, SUSE, Ubuntu , 及其他 7 種 Linux * Ideal for users planning

    Linux Bible: 介紹包括 Fedora, KNOPPIX, Debian, SUSE, Ubuntu , 及其他 7 種 Linux * Ideal for users planning the transition to Linux who want to sample different distributions to see which one best meets their needs * Includes sections on practical uses for Linux, multimedia apps, instant messaging, BT, and improved Security techniques

    标签: Linux planning KNOPPIX Fedora

    上传时间: 2016-09-24

    上传用户:坏坏的华仔

  • IEEE 802.11i-2004 Amendment to IEEE Std 802.11, 1999 Edition (Reaff 2003). IEEE Standard for Informa

    IEEE 802.11i-2004 Amendment to IEEE Std 802.11, 1999 Edition (Reaff 2003). IEEE Standard for Information technology--Telecommunications and information exchange between system--Local and metropolitan area networks?Specific requirements--Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications--Amendment 6: Medium Access Control (MAC) Security Enhancements

    标签: IEEE 802.11 Amendment Standard

    上传时间: 2013-12-21

    上传用户:ywqaxiwang

  • 版本更新了一下

    版本更新了一下,到5.84了,需要用VS.net平台进行编译运行,介绍与原来的一样! 磁盘文件的安全删除,我们通常所执行的删除操作并不是真正的删除只是清除了文件的fat表内容,文件数据还在磁盘上,可以恢复,所以不安全。-disk deletion of the Security document, we usually enforced by the delete operation does not really delete the file will simply remove the fat table of contents, document data on the disk is, can be restored, therefore unsafe.

    标签: 版本 更新

    上传时间: 2016-11-05

    上传用户:大三三

  • 浅谈VB.NET的密码算法及其在信息安全中的应用 Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Inf

    浅谈VB.NET的密码算法及其在信息安全中的应用 Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Information Secuirity ,介绍了Microsoft的最新开发工具Visual Basic 2005(简称VB.NET)中与密码算法相关的System.Security.Cryptography命名空间(简称SSC).举例说明了利用SSC提供的类编写信息安全程序的方法,其中包括对称加密、非对称加密和数字签名算法的编程.

    标签: Arithmetric Discussion Cryptology NET

    上传时间: 2013-12-31

    上传用户:小宝爱考拉

  • MySQL claims to be the world s most popular open source database, and with good reason. It is free

    MySQL claims to be the world s most popular open source database, and with good reason. It is free, runs on a wide variety of platforms, is relatively simple, easy to configure and performs well even under significant load. By comparison to some other popular database management systems, configuring it is quite simple, but there are still a sufficiently wide variety of Security-relevant configuration issues to make securing it a challenge.

    标签: database popular claims source

    上传时间: 2016-12-13

    上传用户:王者A

  • rhce linux learning guide 1.01 Basic Linux Knowledge 1.02 Linux Filesystem Hierarchy and Structur

    rhce linux learning guide 1.01 Basic Linux Knowledge 1.02 Linux Filesystem Hierarchy and Structure 1.03 Basic Commands 1.04 Printing 1.05 The Linux/Unix Shell 1.06 Basic Security 1.07 Linux/Unix System Administration 1.08 Basic TCP/IP Networking 1.09 Standard Network Services 1.10 Basic Network Security

    标签: Linux Filesystem Knowledge Hierarchy

    上传时间: 2014-12-06

    上传用户:stewart·

  • Fully revised to cover the latest standards and technologies, XML and Java(TM), Second Edition provi

    Fully revised to cover the latest standards and technologies, XML and Java(TM), Second Edition provides the practical solutions developers need to design powerful and portable Web-based applications. Featuring step-by-step examples, this book focuses on harnessing the power of Java(TM) and XML together to streamline the development process. XML and Java(TM), Second Edition provides new coverage of emerging areas such as document management, databases, messaging, servlets, JDBC, data binding, Security, and more. It begins with an overview of XML programming techniques, standard APIs, and tools. Building upon this foundation, the book goes on to cover the latest technologies, including DOM Level 2, SAX2, XSLT, SOAP, WSDL, and UDDI. It explores the role of these major middleware technologies in XML and Java-based Web application development, as well as the limitations and potential pitfalls.

    标签: technologies and standards Edition

    上传时间: 2014-01-05

    上传用户:hj_18

  • Description The art galleries of the new and very futuristic building of the Center for Balkan Coop

    Description The art galleries of the new and very futuristic building of the Center for Balkan Cooperation have the form of polygons (not necessarily convex). When a big exhibition is organized, watching over all of the pictures is a big Security concern. Your task is that for a given gallery to write a program which finds the surface of the area of the floor, from which each point on the walls of the gallery is visible. On the figure 1. a map of a gallery is given in some co-ordinate system. The area wanted is shaded on the figure 2.

    标签: Description futuristic galleries the

    上传时间: 2017-02-17

    上传用户:1427796291

  • This product has been manufactured to your company’s specifications a part for use in your company’

    This product has been manufactured to your company’s specifications a part for use in your company’s general electronic products. It is guaranteed to perform according to delivery specifications. For any other use apart from general electronic equipment, we cannot take responsibility if the product is used in medical devices, nuclear power control equipment, aerospace equipment, fire and Security systems, or any other applications in which there is a direct risk to human life and where extremely high levels of reliability are required. If the product is to be used in any of the above applications, we will need to enter into a separate product liability agreement.

    标签: company your specifications manufactured

    上传时间: 2017-02-19

    上传用户:haohaoxuexi