搜索资源列表
Microsoft Security Assessment Tool手册
- checkrisk.rar Microsoft Security Assessment Tool 的目的是帮助您找出并解决计算环境中的安全风险。 该工具使用一种全盘方法来衡量涉及人员、流程和技术主题的安全战略。 在得出评估结果的同时还提供了建议的缓冲工作,其中包括一些指向详细信息的链接,以便在需要时提供附加指导。 这些资源可帮助您了解更多有助于提高环境安全的特定工具和方法的相关信息。
Network.Security.and.Firewalls
- 关于网络安全与防火墙方面的技术文档,介绍了各种网络安全技术
Security-key-management-system
- 密钥管理系统的安全性非常重要,目前国内尚无现成的同类产品,需要组织力量进行攻关、开发。由格尔公司自行设计、开发的密钥管理系统不仅能充分满足金融IC卡联合试点的需求,而且具有很好的开放性,能根据用户的不同需求,进行定制开发,如上海浦东发展银行的系统、上海光大银行的系统和长沙人行的系统等。-Security key management system is very important, there is no readily available domestic similar products,
USB.Disk.Security.V5.0.0.76
- USB disk security for usb disk virus kill removal tool.
designing.security.architecture
- This book is for systems architects who are interested in building security into their applications. The book is designed to be useful to architects in three ways: as an introduction to security architecture, as a handbook on security issues
timo_kasper___embedded_security_analysis_of_rfid_
- Embedded Security Analysis of RFID Devices
j2ee_and_j2me_for_security_bank
- 基于J2EE和J2ME的安全移动电子银行.PDF-j2ee and j2me for security a bank
ContactID
- "Hard to find" full descr iption of ContactID protocol from Ademco used by many home security devices to send messages to CMS (Central Monitoring Station) about security events. Has full technical descr iption and can be used to easy make CMS c
watermarking
- 数字水印技术目前 正处于一个快速发 展和持续深入的阶 段, 应用领域也在 快速扩展。 刀 市场经济飞速发展的今天, 这 对于企业形象和经济利益存在 严重损害危险的企业和数字产 品侵权的创作者来说, 无疑是 一个良好的解决方案。数字水 印及其应用技术不仅提供了突 破性的信息安全防护方式, 而 且在数字防伪中占据着重要的 地位, 这对维护国家经济秩序 是大有益处的。-Digital watermarking technology is cu
the-research-and-reality-of-the-WLAN
- 通过对WLAN无线局域网安全的现状分析,结合其自身实际工程经验,对WLAN安全技术进行全面总结-Through the wireless LAN security, WLAN analysis, combined with practical engineering experience of its own, on the WLAN security technology to conduct a comprehensive summary
Security.Evaluation
- 在分析影响服务可用性网络攻击导致网络流量异常改变的基础上,提出了一种主机网络实 时流量的安全状况评估方法. -Analysis of the impact of service availability in the network attacks lead to abnormal changes in network traffic, based on a host of real-time network flow method to assess the security situat
JENI-J2ME-Bab07-Security
- this file need for setting security in j2me
AnRFIDSecurityModule
- An RFID Security Module
Analysis_of_WiMax-802.16_Security
- Explain the threat to WiMAX security
A-Fast-Voltage-Security-Assessment
- A Fast Voltage Security Assessment Method Using Adaptive Bounding
Multi-level-MANET-Routing-Security-Analysis-and-Si
- 移动自组网多安全等级路由策略的分析与仿真Multi-level MANET Routing Security Analysis and Simulation-Multi-level MANET Routing Security Analysis and Simulation
Security-Radio-Networks
- Security in Cognitive Radio Networks -Security in Cognitive Radio Networks
Understanding Deep Packet Inspection for SCADA Security
- Understanding Deep Packet Inspection for SCADA Security
SAT A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks (2011)
- Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. While anonymity-related issues have been exte
Analysis and Design of Security for Next Generation 4G Cellular Networks
- Analysis and Design of Security for Next Generation 4G Cellular Networks