您好,欢迎光临本网站![请登录][注册会员]  

安全技术下载,其它下载列表 第1053页

« 1 2 ... .48 .49 .50 .51 .52 1053.54 .55 .56 .57 .58 ... 3240 »

[其它] CRC32_Test_iOS.zip

说明:iOS中CRC32数据完整性校验,输出16进制校验码,封装好的分类,代码通俗易懂,简单调用方便移植。
<weixin_41977811> 上传 | 大小:37kb

[其它] NIST SP800-101r1.pdf

说明:This guide provides basic information on the preservation, acquisition, examination, analysis, and reporting of digital evidence on cell phones, relevant to law enforcement, incident response, and other types of investigations. The guide focuses main
<samsho2> 上传 | 大小:1mb

[其它] NIST SP800-101.pdf

说明:This guide provides basic information on the preservation, acquisition, examination, analysis, and reporting of digital evidence on cell phones, relevant to law enforcement, incident response, and other types of investigations. The guide focuses main
<samsho2> 上传 | 大小:1mb

[其它] NIST SP800-102.pdf

说明:A digital signature is an electronic analogue of a written signature; the digital signature can be used to provide assurance that the claimed signatory signed the information. In addition, a digital signature may be used to detect whether or not the
<samsho2> 上传 | 大小:255kb

[其它] NIST SP800-104.pdf

说明:The purpose of this document is to provide additional recommendations on the Personal Identity Verification (PIV) Card color-coding for designating employee affiliation. Compliance with this document is voluntary; however, a department or agency shal
<samsho2> 上传 | 大小:196kb

[其它] NIST SP800-106.pdf

说明:This document has been developed by the National Institute of Standards and Technology (NIST) in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. NIST is responsi
<samsho2> 上传 | 大小:222kb

[其它] NIST SP800-107.pdf

说明:A hash algorithm is used to map a message of arbitrary length to a fixed-length message digest. Federal Information Processing Standard (FIPS) 180-3, the Secure Hash Standard (SHS) [FIPS 180-3], specifies five approved hash algorithms: SHA-1, SHA-224
<samsho2> 上传 | 大小:225kb

[其它] NIST SP800-107 rev1.pdf

说明:A hash algorithm is used to map a message of arbitrary length to a fixed-length message digest. Federal Information Processing Standard (FIPS) 180-3, the Secure Hash Standard (SHS) [FIPS 180-3], specifies five approved hash algorithms: SHA-1, SHA-224
<samsho2> 上传 | 大小:336kb

[其它] NIST SP800-108.pdf

说明:When parties share a secret symmetric key (e.g., upon a successful execution of a key- establishment scheme as specified in [1] and [2]), it is often the case that additional keys will be needed (e.g. as described in [3]). Separate keys may be needed
<samsho2> 上传 | 大小:232kb

[其它] NIST SP800-111.pdf

说明:The purpose of this document is to assist organizations in understanding storage encryption technologies for end user devices and in planning, implementing, and maintaining storage encryption solutions. The types of end user devices addressed in this
<samsho2> 上传 | 大小:242kb

[其它] NIST SP800-113.pdf

说明:The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. NIST is responsible for dev
<samsho2> 上传 | 大小:848kb

[其它] NIST SP800-114.pdf

说明:This publication helps teleworkers secure the external devices they use for telework, such as personally owned and third-party privately owned desktop and laptop computers and consumer devices (e.g., cell phones, personal digital assistants [PDA]). T
<samsho2> 上传 | 大小:222kb
« 1 2 ... .48 .49 .50 .51 .52 1053.54 .55 .56 .57 .58 ... 3240 »