您好,欢迎光临本网站![请登录][注册会员]  

安全技术下载,其它下载列表 第1042页

« 1 2 ... .37 .38 .39 .40 .41 1042.43 .44 .45 .46 .47 ... 3240 »

[其它] NIST SP800-28.pdf

说明:(IT) systems to carry out essential, mission-critical functions. As existing technology evolves and new technologies are introduced to provide new capabilities and features, new vulnerabilities are often introduced as well. Organizations implement
<samsho2> 上传 | 大小:498kb

[其它] NIST SP800-28v2.pdf

说明:The purpose of this document is to provide an overview of active content and mobile code technologies in use today and offer insights for making informed IT security decisions on their application and treatment. The discussion gives details about the
<samsho2> 上传 | 大小:1003kb

[其它] NIST SP800-29.pdf

说明:Federal agencies, industry, and the public now rely on cryptography to protect information and communications used in critical infrastructures, electronic commerce, and other application areas. Cryptographic modules are implemented in these products
<samsho2> 上传 | 大小:325kb

[其它] 区块链安全白皮书-技术应用篇.pdf

说明:本白皮书版权属于中国信息通信研究院和中国通信标准化协会。本白皮书从网络安全的视角,客观审视区块链技术发展和应用情况,分析探讨区块链技术应用分层架构、安全风险和应对框架,给出关于促进区块链技术安全应用的若干建议,希望与业界分享,切实提升区块链技术发展应用安全性。
<biggoodbobo> 上传 | 大小:4mb

[其它] 文件加密解密工具.jar

说明:可以选择所需要加密的文档,图片等,通过生成密钥对选中文件加密,采用对称性加密,解密文件需要用最开始生成的密钥对其解密(需要电脑上有所需环境JRE)
<KD_zhang> 上传 | 大小:7kb

[其它] NIST SP800-31.pdf

说明:Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems. As network attacks have increased in nu
<samsho2> 上传 | 大小:851kb

[其它] NIST SP800-32.pdf

说明:Public Key Infrastructures (PKIs) can speed up and simplify delivery of products and services by providing electronic approaches to processes that historically have been paper based. These electronic solutions depend on data integrity and authenticit
<samsho2> 上传 | 大小:582kb

[其它] NIST SP800-33.pdf

说明:This document has been developed by NIST in furtherance of its statutory responsibilities (under the Computer Security Act of 1987 and the Information Technology Management Reform Act of 1996, specifically 15 U.S.C. 278 g-3(a)(5)). This is not a guid
<samsho2> 上传 | 大小:336kb

[其它] NIST SP800-34 rev1 errata.pdf

说明:NIST Special Publication 800-34, Rev. 1, Contingency Planning Guide for Federal Information Systems, provides instructions, recommendations, and considerations for federal information system contingency planning. Contingency planning refers to interi
<samsho2> 上传 | 大小:925kb

[其它] NIST SP800-36.pdf

说明:furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. NIST is responsible for developing standards and guidelines, including minimum requirements, for providing adequ
<samsho2> 上传 | 大小:368kb

[其它] NIST SP800-37.pdf

说明:T • Enabling more consistent, comparable, and repeatable assessments of security controls in federal information systems; • Promoting a better understanding of agency-related mission risks resulting from the operation of information systems; and •
<samsho2> 上传 | 大小:738kb

[其它] 鼠标自动点击器1017.exe

说明:使用方法:1.运行本程序 2.运行游戏 3.把鼠标放在你想点击的地方 4.按F3启动鼠标自动点击 5.完成目的后,按F4停止鼠标自动点击!
<sssksss> 上传 | 大小:49kb
« 1 2 ... .37 .38 .39 .40 .41 1042.43 .44 .45 .46 .47 ... 3240 »