-
-
[
Unix_Linux]
AntiCrack.zip
Unix password security inspection procedures, but also contains a password-breaking procedures unix
-
[
Delphi]
strsec50
StreamSec Security Library contains a variety of control algorithms
-
[
PDF]
132.rar
... benign environment. The communication system must handle
both situations. Security attacks can be launched towards any layer of the ... layer routing
information as a more probable target for security attacks. A reliable network service
cannot be provided ...
-
-
-
-
-
-
[
Others]
Wiley.Interscience.Information.Security.Principle
Basic theory of privacy - the basis of cryptography and privacy certified mountain base year, is a theory - software security, theory and practice of network security - protecting the actual information system development case study examples
-