您好,欢迎光临本网站![请登录][注册会员]  

安全技术下载,其它下载列表 第1046页

« 1 2 ... .41 .42 .43 .44 .45 1046.47 .48 .49 .50 .51 ... 3240 »

[其它] NIST SP800-56A rec2 comments.pdf

说明:Overall, I would say that the 56A authors have done well in writing and revising 56A. Key establishment, and discrete logarithm cryptography, are difficult and complicated subjects. The 56A document strives to tackle most of the complex details of th
<samsho2> 上传 | 大小:720kb

[其它] NIST SP800-56A.pdf

说明:Many U.S. Government Information Technology (IT) systems need to employ well-established cryptographic schemes to protect the integrity and confidentiality of the data that they process. Algorithms such as the Advanced Encryption Standard (AES) as de
<samsho2> 上传 | 大小:1mb

[其它] NIST SP800-56Ar3.pdf

说明:Many U.S. Government Information Technology (IT) systems need to employ well-established cryptographic schemes to protect the integrity and confidentiality of the data that they process. Algorithms such as the Advanced Encryption Standard (AES) as de
<samsho2> 上传 | 大小:3mb

[其它] NIST SP800-56Br2.pdf

说明:Many U.S. Government Information Technology (IT) systems need to employ strong cryptographic schemes to protect the integrity and confidentiality of the data that they process. Algorithms such as the Advanced Encryption Standard (AES), as defined in
<samsho2> 上传 | 大小:1mb

[其它] NIST SP800-56C.pdf

说明:Introduction During an execution of some of the public-key-based key establishment schemes specified in NIST Special Publications 800-56A [1] and 800-56B [2], a key derivation method is used to obtain secret cryptographic keying material. This Recom
<samsho2> 上传 | 大小:314kb

[其它] NIST SP800-57pt1r4.pdf

说明:The use of cryptographic mechanisms is one of the strongest ways to provide security services for electronic applications and protocols and for data storage. The National Institute of Standards and Technology (NIST) publishes Federal Information Proc
<samsho2> 上传 | 大小:1mb

[其它] NIST SP800-57pt2r1.pdf

说明:Cryptographic mechanisms are often used to protect the integrity and confidentiality of data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. A crypto
<samsho2> 上传 | 大小:1mb

[其它] NIST SP800-57Pt3r1.pdf

说明:Application-Specific Key Management Guidance, Part 3 of the Recommendation for Key Management is intended primarily to help system administrators and system installers adequately secure applications based on product availability and organizational ne
<samsho2> 上传 | 大小:1023kb

[其它] NIST SP800-59.pdf

说明:This document provides guidelines developed in conjunction with the Department of Defense, including the National Security Agency, for identifying an information system as a national security system. The basis for these guidelines is the Federal Info
<samsho2> 上传 | 大小:166kb

[其它] NIST SP800-60 Vol1 Rev1.pdf

说明:Title III of the E-Government Act (Public Law 107-347), titled the Federal Information Security Management Act (FISMA), tasked the National Institute of Standards and Technology (NIST) to develop: • Standards to be used by all Federal agencies to c
<samsho2> 上传 | 大小:324kb

[其它] NIST SP800-60 Vol2 Rev1.pdf

说明:Title III of the E-Government Act (Public Law 107-347), titled the Federal Information Security Management Act (FISMA), tasked the National Institute of Standards and Technology (NIST) to develop: • Standards to be used by all Federal agencies to c
<samsho2> 上传 | 大小:1mb

[其它] acaddocWall20.rar

说明:使用AUTOCAD常会遇到名为ACADDOC.lsp(或fas)的脚本文件,它们藏在目录中随着图纸文件一起传播,当打开图纸,病毒文件会复制自己到CAD的工作目录,中毒的CAD会复制病毒到之后打开的所有图纸目录。本工具是为此而设计,她能对干净的CAD进行锁定保护,防止新的病毒进入CAD工作目录,当发现打开图纸目录内含有ACADDOC病毒时,还可主动删除。根本上杜绝了感染CAD病毒的可能。适合多个版本的CAD。完全免费,绿色软件。
<issating> 上传 | 大小:203kb
« 1 2 ... .41 .42 .43 .44 .45 1046.47 .48 .49 .50 .51 ... 3240 »