您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. john wiley & sons - securing wireless lan

  2. john wiley & sons - securing wireless lan's.pdf 无线安全
  3. 所属分类:专业指导

    • 发布日期:2009-07-29
    • 文件大小:5242880
    • 提供者:happy1231
  1. “Performance, Feasibility & Scalibility of Hommorphic Encryption Schemes in Securing Wireless Sensor Networks

  2. “Performance, Feasibility & Scalibility of Hommorphic Encryption Schemes in Securing Wireless Sensor Networks
  3. 所属分类:网络基础

    • 发布日期:2009-12-15
    • 文件大小:13631488
    • 提供者:Rsemary_xz
  1. Wiley - SSL and TLS esssentials- Securing the Web

  2. Wiley - SSL and TLS esssentials- Securing the Web
  3. 所属分类:Web开发

    • 发布日期:2009-12-29
    • 文件大小:1048576
    • 提供者:gxing
  1. Securing RFID systems conforming to EPC Class 1 Generation 2 standard

  2. RFID, capable of remote automatic identification, is taking the place of barcodes to become electronic tags 18 of the new generation. However, the information transmitted in the air could easily be intercepted and 19 eavesdropped due to its radio tr
  3. 所属分类:其它

    • 发布日期:2010-06-24
    • 文件大小:415744
    • 提供者:gewwntea
  1. How to Cheat at Deploying and Securing RFID

  2. Product Descr iption RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are
  3. 所属分类:Java

    • 发布日期:2010-10-03
    • 文件大小:7340032
    • 提供者:sunxianbin
  1. How to Cheat at Securing SQL Server 2005

  2. Product Descr iption The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005. SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdm
  3. 所属分类:其它

    • 发布日期:2010-10-03
    • 文件大小:9437184
    • 提供者:sunxianbin
  1. Best Practices for Securing the E-Business Suite

  2. Best Practices for Securing the E-Business Suite
  3. 所属分类:Oracle

    • 发布日期:2010-11-06
    • 文件大小:386048
    • 提供者:shizhenghai
  1. how to cheat at securing sql server 2005

  2. how to cheat at securing sql server 2005
  3. 所属分类:其它

    • 发布日期:2010-12-01
    • 文件大小:9437184
    • 提供者:szhourj6
  1. SSL and TLS Essentials - Securing the Web.pdf

  2. SSL and TLS Essentials - Securing the Web.pdf
  3. 所属分类:Web开发

    • 发布日期:2011-01-12
    • 文件大小:1048576
    • 提供者:lihuaijun
  1. Securing Linux A Survival Guide for Linux Security Version 1.0 2003

  2. Securing Linux A Survival Guide for Linux Security Version 1.0 2003
  3. 所属分类:Linux

    • 发布日期:2008-04-17
    • 文件大小:181248
    • 提供者:morre
  1. Securing Your Business with Cisco ASA and PIX Firewalls

  2. The easy-to-use guide for learning how to secure networks with the world-class PIX Firewall Ideal for network administrators with little or no firewall experience Easily explains how to implement a security system in small and medium businesses or a
  3. 所属分类:其它

    • 发布日期:2008-05-09
    • 文件大小:4194304
    • 提供者:Jans
  1. Securing credit card transactions with one-time payment scheme

  2. Securing credit card transactions with one-time payment scheme
  3. 所属分类:金融

    • 发布日期:2011-10-23
    • 文件大小:501760
    • 提供者:wwaaaccc
  1. Securing credit card transactions with one-time payment scheme

  2. Securing credit card transactions with one-time payment scheme q Yingjiu Li a,*, Xinwen Zhang b a School of Information Systems, Singapore Management University, 80 Stamford Road, Singapore 178902 b Lab for Information Security Technology, George Ma
  3. 所属分类:C/C++

    • 发布日期:2011-11-08
    • 文件大小:501760
    • 提供者:qq223857666
  1. Securing PHP Apps pdf 0分

  2. Securing PHP Apps 英文版
  3. 所属分类:PHP

    • 发布日期:2016-08-03
    • 文件大小:4194304
    • 提供者:u011433684
  1. Securing SQL Server(Apress,2016)

  2. Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, performing threat analysis, and encrypting sensitive data as a last line of defense against compromise. The multi-layered approach in this book
  3. 所属分类:SQLServer

    • 发布日期:2016-10-28
    • 文件大小:11534336
    • 提供者:vanridin
  1. Hacking and Securing iOS Applications 无水印pdf

  2. Hacking and Securing iOS Applications 英文无水印pdf pdf所有页面使用FoxitReader和PDF-XChangeViewer测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 本资源转载自网络,如有侵权,请联系上传者或csdn删除
  3. 所属分类:iOS

    • 发布日期:2017-09-25
    • 文件大小:10485760
    • 提供者:u011433684
  1. Securing Citrix XenApp Server in the Enterprise

  2. Tariq Azad-Securing Citrix XenApp Server in the Enterprise-Syngress (2008).pdf
  3. 所属分类:讲义

    • 发布日期:2017-09-29
    • 文件大小:15728640
    • 提供者:weixin_40360193
  1. Securing And Optimizing Linux

  2. Securing And Optimizing Linux
  3. 所属分类:Linux

    • 发布日期:2009-02-23
    • 文件大小:4194304
    • 提供者:osoon
  1. Securing DevOps--2018

  2. Securing DevOps explores how the techniques of DevOps and Security should be applied together to make cloud services safer. By the end of this book, readers will be ready to build security controls at all layers, monitor and respond to attacks on cl
  3. 所属分类:其它

    • 发布日期:2018-08-25
    • 文件大小:12582912
    • 提供者:kxg1005
  1. Securing-Linux:我们喜欢构建和使用连接到互联网的设备。 那不应该让我们彻夜难眠-源码

  2. Securing-Linux:我们喜欢构建和使用连接到互联网的设备。 那不应该让我们彻夜难眠
  3. 所属分类:其它

    • 发布日期:2021-02-06
    • 文件大小:104448
    • 提供者:weixin_42099302
« 1 23 4 5 6 7 8 9 10 ... 20 »