WAPI是WLAN Authentication and Privacy infrastructure的英文縮寫。
標簽: Authentication infrastructure Privacy WAPI
上傳時間: 2014-01-26
上傳用戶:kiklkook
A Public Key infrastructure (PKI) binds cryptographic public keys to physical entities through digital certificates. A PKI includes components that issue digital certificates and distribute certificate status information. PKI users select one or more certificate issuers as trust anchors, and establish security services based on certificates that may be validated using one of their trust anchors.
標簽: infrastructure cryptographic entities physical
上傳時間: 2017-07-31
上傳用戶:561596
Abstract: Stuxnet, a sophisticated virus that damaged Iran's nuclear capability, should be an eye openerfor the world. We can choose to learn something very narrow (how to combat the Stuxnet virus) or wecan choose to focus on the larger goal of thwarting the next type of creative cyber attack. Unfortunately,critical industrial infrastructure is not currently designed with security as a key goal, leaving open multipleavenues for an educated and funded attacker to create massive problems. This tutorial outlines somebasic concepts that engineers and product definers should consider to make sure their new projects stayahead of future threats.
上傳時間: 2013-11-17
上傳用戶:llwap
Linear Technology offers some of the highest performance RF and signal chain solutions for wireless and cellularinfrastructure. These products support worldwide standards including, LTE, WiMAX, GSM,W-CDMA, TD-SCDMA,CDMA, and CDMA2000. Other wireless systems include broadband microwave data links, secure communications,satellite receivers, broadband wireless access, wireless broadcast systems, RFID readers and cable infrastructure
上傳時間: 2013-11-04
上傳用戶:kiklkook
Abstract: While many questions still surround the creation and deployment of the smart grid, the need for a reliablecommunications infrastructure is indisputable. Developers of the IEEE 1901.2 standard identified difficult channel conditionscharacteristic of low-frequency powerline communications and implemented an orthogonal frequency division multiplexing (OFDM)architecture using advanced modulation and channel-coding techniques. This strategy helped to ensure a robust communicationsnetwork for the smart grid.
上傳時間: 2013-10-18
上傳用戶:myworkpost
In today’s IT environment, Java is a leading technology in the world of enterprise development. As management demands more from technology, complexity in infrastructure seems to grow exponentially, leaving many unable to keep up with the demands of such a fast-paced world. These complexities can be seen in the over-evolving Java 2 Enterprise Edition (J2EE) specifications. This unnecessary complexity drove us to discover ways of simplifying development.
標簽: environment development enterprise technology
上傳時間: 2013-12-24
上傳用戶:Zxcvbnm
JBoss, one of the leading java Open Source groups, integrates and develops these services for a full J2EE-based implementation. JBoss provides JBossServer, the basic EJB container, and Java Manage Preface 18 Great Events of the Twentieth Centuryment Extension (JMX) infrastructure. It also provides JBossMQ, for JMS messaging, JBossTX, for JTA/JTS transactions, JBossCMP for CMP persistence, JBossSX for JAAS based security, and JBossCX for JCA connectivity. Support for web components, such as servlets and JSP pages, is providedby an abstract integration layer. Implementations of the integration service are provided for third party servlet engines like Tomcat and Jetty. JBoss enables you to mix and match these components through JMX by replacing any component you want with a JMX compliant implementation for the same APIs.
標簽: integrates develops services leading
上傳時間: 2014-11-03
上傳用戶:wsf950131
由于電子商務廣泛采用公開密鑰技術,職能部門有必要對公鑰加以管理。本文簡要介紹了基于PKI的密鑰托管技術及密鑰托管代理的概念,分析了密鑰托管的步驟,以及政府部門在密鑰托管代理的幫助下強制訪問信息的過程。 關鍵詞:密鑰托管 證書授權認證 公開密鑰 公鑰基礎設施 托管證書 網絡的安全問題得到人們的日益重視。網絡面臨的威脅五花八門:內部竊密和破壞,截收,非法訪問,破壞信息的完整性,冒充,破壞系統的可用性,重演,抵賴等。于是公鑰基礎設施(Public Key infrastructure,PKI)應運而生。PKI是電子商務和其它信息系統的安全基礎,用來建立不同實體間的"信任"關系。它的基礎是加密技術,核心是證書服務。用戶使用由證書授權認證中心(Certificate Authority,CA)簽發的數字證書,結合加密技術,可以保證通信內
上傳時間: 2013-12-18
上傳用戶:tonyshao
mmread reads virtually any media file. If Windows Media Play can play it, so should mmread. It uses the Window s DirectX infrastructure to % render the media, so other OSs are out of luck.
標簽: mmread virtually Windows should
上傳時間: 2015-06-11
上傳用戶:xuan‘nian
《DCOM入門》隨書源碼 Chapter 1 (Distributed Computing) N/A Chapter 2 (DCOM Overview) N/A Chapter 3 (Objects) Basics Chapter 4 (Components) Basics Chapter 5 (infrastructure) infrastructure Chapter 6 (Building Components with ATL) OCRServer Chapter 7 (Using COM Objects) OCRClient Chapter 8 (COM in Cyberspace) Cyber Chapter 9 (Applying Security) Security Chapter 10 (Connecting Objects) Chat
標簽: Chapter DCOM Distributed Computing
上傳時間: 2014-01-03
上傳用戶:haoxiyizhong