您好,欢迎光临本网站![请登录][注册会员]  

安全技术下载,其它下载列表 第1057页

« 1 2 ... .52 .53 .54 .55 .56 1057.58 .59 .60 .61 .62 ... 3240 »

[其它] NIST SP800-157.pdf

说明:FIPS 201 originally required that all PIV credentials and associated keys be stored in a PIV Card. While the use of the PIV Card for electronic authentication works well with traditional desktop and laptop computers, it is not optimized for mobile de
<samsho2> 上传 | 大小:821kb

[其它] NIST SP800-160v1.pdf

说明:FIPS 201 originally required that all PIV credentials and associated keys be stored in a PIV Card. While the use of the PIV Card for electronic authentication works well with traditional desktop and laptop computers, it is not optimized for mobile de
<samsho2> 上传 | 大小:2mb

[其它] NIST SP800-160-vol2-draft.pdf

说明:INTRODUCTION THE NEED FOR CYBER RESILIENT SYSTEMS he need for trustworthy secure systems1 stems from a variety of stakeholder needs that are driven by mission, business, and other objectives and concerns. The principles, concepts, and practices for
<samsho2> 上传 | 大小:2mb

[其它] NIST SP800-162.pdf

说明:CHAPTER ONE INTRODUCTION nformation and Communications Technology (ICT) relies on a complex, globally distributed, and interconnected supply chain ecosystem that is long, has geographically diverse routes, and consists of multiple tiers of outsourc
<samsho2> 上传 | 大小:1mb

[其它] NIST SP800-163.pdf

说明:When deploying a new technology, an organization should be aware of the potential security impact it may have on the organization’s IT resources, data, and users. While new technologies may offer the promise of productivity gains and new capabilities
<samsho2> 上传 | 大小:1008kb

[其它] NIST SP800-163r1.pdf

说明:When deploying a new technology, an organization should be aware of the potential security impact it may have on the organization’s IT resources, data, and users. While new technologies may offer the promise of productivity gains and new capabilities
<samsho2> 上传 | 大小:1mb

[其它] NIST SP800-165.pdf

说明:The Cryptographic Technology Group’s (CTG) work in cryptographic mechanisms addresses topics such as hash algorithms, symmetric and asymmetric cryptographic techniques, key management, authentication, and random number generation. Strong cryptog
<samsho2> 上传 | 大小:4mb

[其它] NIST SP800-168.pdf

说明:Approximate matching is a promising technology designed to identify similarities between two digital artifacts. It is used to find objects that resemble each other or to find objects that are contained in another object. This can be very useful for f
<samsho2> 上传 | 大小:220kb

[其它] NIST SP800-170.pdf

说明:Overview: CTG’s work in the field of cryptography includes researching, analyzing, and standardizing cryptographic technology, such as hash algorithms, symmetric and asymmetric cryptographic techniques, key management, authentication, and random
<samsho2> 上传 | 大小:12mb

[其它] H3C交换机路由器说明书.zip

说明:H3C交换机路由器说明书
<star2king> 上传 | 大小:84mb

[其它] 个人金融信息保护技术规范-原文.pdf

说明:近日,全国金融标准化技术委员会(简称“金标委”)发布了《个人金融信息保护技术规范》(以下简称“《规范》”),个人金融信息是个人信息在金融领域围绕账户信息、鉴别信息、金融交易信息、个人身份信息、财产信息、借贷信息等方面的扩展与细化,是金融业机构在提供金融产品和服务的过程中积累的重要基础数据,也是个人隐私的重要内容。   《规范》规定了个人金融信息在收集、传输、存储、使用、删除、销毁等生命周期各环节的安全防护要求,从安全技术和安全管理两个方面,对个人金融信息保护提出了规范性要求。
<successhuwei> 上传 | 大小:2mb

[其它] 加壳和*3.27.zip

说明:非常强大的加壳工具,亲测可以过360的检测。
<weixin_45925436> 上传 | 大小:979kb
« 1 2 ... .52 .53 .54 .55 .56 1057.58 .59 .60 .61 .62 ... 3240 »