搜索资源列表
DCOMrumencode
- 《DCOM入门》随书源码 Chapter 1 (Distributed Computing) N/A Chapter 2 (DCOM Overview) N/A Chapter 3 (Objects) Basics Chapter 4 (Components) Basics Chapter 5 (Infrastructure) Infrastructure Chapter 6 (Building Components with ATL) OCRServer Chapt
wangluoquzhengfenbushiguanli
- 网络取证日志分布式安全管理,为从事网络犯罪取证方面研究的读者提供参考。-Log Distributed Network Forensics Security Management, in order to engage in cyber-crime research evidence to provide reference readers.
Cyber-Security-and-Power-System
- 在智能电网方面的论文 智能电网的网络安全方面的 希望对大家有帮助-The introduction of “smart grid” solutions imposes that cyber security and power system communication systems must be dealt with extensively. These parts together are essential for proper electricity transmissio
GuardDuty
- 网络监视,屏蔽您不想要的文字进入站点-Lets you create your very own Cyber Sitter or Net Nanny Type software- it blocks access to sites based on keywords such as "sex"hackor "security" alternatively whatever you want !- it s the long awaited project version of previousl
pengyou
- 登陆腾讯朋友网并发表状态,西电网络攻防大赛题目-Visit Tencent friend network and delivered state, Western Electric cyber security competition title
Cyber Security W S
- cyber security material-programmes and documents
CYBER SECURITY
- Cyberseuciry basics for brginners
polyalphabatic
- This is a nice algorithm.It is mainly use in cyber security.
rsa
- This is a nice algorithm.It is mainly use in computer network and cyber security
IDS
- In recent years, the needs of the Internet are felt in lives of all people. Accordingly, many studies have been done on security in virtual environment. Old technics such as firewalls, authentication and encryption could not provide Internet secur
Janos_CPS
- new cyber physical security measures
draft-2_framework-v1-1_with-markup
- Cyber security framework
cyber_resilience_paper_2014
- Paper on Cyber SEcurity Resilience
Cyber_Security_-_A_Practitioner_Guide
- Cyber_Security - A Practitioner Guide
Ant-Based Cyber Security
- 蚂蚁算法的安全问题,运用蚂蚁算法,解决黑客,防盗等安全问题(ant-based cyber--describe a swarming-agent-based, mixedinitiative approach to infrastructure defense where teams of humans and software agents defend cooperating organizations in tandem by sharing insights and solutio