Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the:http://www.truecrypt.org/
标签: open-source encryption Features software
上传时间: 2013-12-20
上传用户:123啊
浙大acm课件,主讲np问题,很详细,适合新手
标签: acm
上传时间: 2014-08-26
上传用户:731140412
This article describes how to consume Web services in Java 1.5.0 using the new JAX-WS 2.0 API (JSR 228). Developers around the world, including me, have always complained about the hard ways to work in Java to consume even a Web service as simple as adding two numbers. However, with JAX-WS 2.0 API now available in core Java in JDK 1.5.0, life is simple like never before.
标签: describes services article consume
上传时间: 2013-11-27
上传用户:kelimu
We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.
标签: effectiveness analytically numerically cloaking
上传时间: 2017-03-30
上传用户:zxc23456789
Although some FX1-based devices may use the FX1鈥檚 CPU to process USB data directly (Port I/O Mode), most applica- tions use the FX1 simply as a conduit between the USB and external data-processing logic (e.g., an ASIC or DSP, or the IDE controller on a hard disk drive).
标签: Although directly devices process
上传时间: 2014-01-08
上传用户:2467478207
Generate random bits, convert to bipolar, corrupt the message by passing through noise and decode using hard decision decoding and calculate BER
标签: Generate bipolar convert corrupt
上传时间: 2013-12-25
上传用户:1966640071
全书从算法设计和算法分析的基本概念和方法入手,系统介绍了算法设计方法与分析技巧。全书分为3个部分:第一部分介绍算法的基本概念、算法的数学基础以及算法复杂度分析;第二部分针对排序问题和图的问题,讨论各种已有的算法,并介绍常用的算法设计方法包括分治法、贪心法、动态规划法、回溯法和分支限界法,并介绍了计算的复杂性以及NP完全问题;第三部分讲述并行计算模型和并行算法设计技术。书中每章后面都附有一定数量的习题,帮助读者理解和掌握书中的内容。
上传时间: 2013-12-17
上传用户:mikesering
对参加ACM竞赛非常有用的几个ACM答题模板(数论,数值计算,NP等等)
上传时间: 2013-12-01
上传用户:ZJX5201314
These documents are all classic documents relating to the domain of virus writing.Give a good insight about the virus which are rare and are considered best for case studies..many variants are still being produced and all these are original.Its very hard to find them now adays..these are extremely helpfull for people working in Malware analysis and malicious code analysis
标签: documents relating classic writing
上传时间: 2017-08-18
上传用户:thuyenvinh
This book is for someone who wants to quickly master the basics of how to install, run, and maintain Linux on an Intel-based personal computer. All of the tools you need are included. Your computer should have a monitor, or display, keyboard, mouse, hard drive, floppy drive, and CD-ROM drive. Although you can jump right in and install Linux onto your hard drive, you should have some technical information about your computer and its hardware on hand before you start.
标签: install someone quickly maintai
上传时间: 2017-08-19
上传用户:zhuoying119