-
-
Petroem.rar
石化企业乙二醇安全保护系统设计Petrochemical ethylene glycol security system
-
-
8.1-Lesson-26.rar
ROUTING TECHNIQUES
Routing requires a router to have a routing table. Several techniques are employed to make the size of the routing table manageable and handle issues such as security. Some of these techniques are discussed here.
-
S72040.rar
SST89E516加密特性
SST89E/V516RDx and SST89E/V58RDx
Security Features
-
ELIPTIC.rar
Matlab Security Eliptic curve cryptoMatlab Security Eliptic curve cryptoMatlab Security Eliptic curve cryptoMatlab Security Eliptic curve cryptoMatlab Security Eliptic curve cryptoMatlab Security Eliptic curve cryptoMatlab Security Eliptic curve ...
-
CAESARCI.rar
... complex schemes, such as the Vigenà ¨re cipher, and still has modern application in the ROT13 system. As with all single alphabet substitution ciphers, the Caesar cipher is easily broken and in practice offers essentially no communication security.
-
Parallel-comem.rar
微机群并行计算机安全开机系统的研发PC cluster parallel computer security research and development of power system
-
isoiec7816-8-en.zip
Identification cards -- Integrated circuit(s) cards with contacts -- Part 8: Security related interindustry commands
-
Hacking.rar
Just an ebook i got from my friend via torrent, I think its a must have for those who need to know more details about systems security
-
-