Driven by the rapid advancement of technology and the growing need of business
requirements, cyber communications are embedded in many physical systems. The
integration of cyber and physical capabilities leads to the creation of many applica-
tions with enormous societal impact and economic benefit. The emerging systems
that connect the cyber-world of computing and communications with the physical
world are cyber-physical systems (CPS).
資源簡介:Driven by the rapid advancement of technology and the growing need of business requirements, cyber communications are embedded in many physical systems. The integration of cyber and physical capabilities leads to the creation of many applic...
上傳時間: 2020-06-07
上傳用戶:shancjb
資源簡介:A book describle in detail about the system Security and usability technology. It is a system book on Security.
上傳時間: 2015-07-22
上傳用戶:zmy123
資源簡介:New Security and control protocol for VoIP based on steganography and digital watermarking (關(guān)于ip telephone Security的外文資料2006年)
上傳時間: 2014-06-13
上傳用戶:皇族傳媒
資源簡介:Red Hat Linux Security and Optimization 2002,有關(guān)linux的講解
上傳時間: 2013-12-24
上傳用戶:songyue1991
資源簡介:The most up to date, comprehensive, and practical guide to Web services Security, and the first to cover the final release of new standards SAML 1.1 and WS-Security.
上傳時間: 2014-01-26
上傳用戶:小寶愛考拉
資源簡介:EMV v4.2 Book2:Security and Key Management
上傳時間: 2013-12-26
上傳用戶:zhangyigenius
資源簡介:RFID – An introduction RFID tags, Security and the individual
上傳時間: 2017-03-19
上傳用戶:330402686
資源簡介:This file is about the computer Security and its interface.
上傳時間: 2017-03-25
上傳用戶:zwei41
資源簡介:CVSS for network Security and its application
上傳時間: 2013-12-25
上傳用戶:yyyyyyyyyy
資源簡介:GSM Security and the protocols involves in a mobile environment authentication process
上傳時間: 2017-05-01
上傳用戶:417313137
資源簡介:this book is about the concerns about RFiD Security and privacy and includes solutions.
上傳時間: 2014-01-13
上傳用戶:愛死愛死
資源簡介:JBoss, one of the leading java Open Source groups, integrates and develops these services for a full J2EE-based implementation. JBoss provides JBossServer, the basic EJB container, and Java Manage Preface 18 Great Events of the Twentieth Ce...
上傳時間: 2014-11-03
上傳用戶:wsf950131
資源簡介:A distributed, peer-to-peer, server-less communication & messaging solution for JAVA (JMS), C++ and .NET applications, integrates with JBoss, WebLogic & WebSphere. Offers guaranteed delivery, Security and transactions. Supports TCP, SSL & H...
上傳時間: 2014-11-28
上傳用戶:wangchong
資源簡介:Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the related architecture. HIP is a proposal to change the TCP/IP stack to securely support mobility and multi-homing. Additionally, it provides for ...
上傳時間: 2016-09-01
上傳用戶:皇族傳媒
資源簡介:Fully revised to cover the latest standards and technologies, XML and Java(TM), Second Edition provides the practical solutions developers need to design powerful and portable Web-based applications. Featuring step-by-step examples, this bo...
上傳時間: 2014-01-05
上傳用戶:hj_18
資源簡介:This book is written for engineers involved in the operation, control, and planning of electric power systems. In addition, the book provides information and tools for researchers working in the fields of power system Security and stability...
上傳時間: 2020-06-07
上傳用戶:shancjb
資源簡介:Digital convergence, in recent history, has been prevalentin the consumer equipment domain and the designengineers in this area have been struggling with a plethoraof emerging standards and protocols. What lessons can welearn from their str...
上傳時間: 2014-12-23
上傳用戶:9牛10
資源簡介:Abstract: It may sound trite, but it is definitely true: the smart grid has the potential to completely transform the energyindustry. However, smart meters and grid management alone will not ensure the success of the smart grid. Unliketradi...
上傳時間: 2013-10-29
上傳用戶:皇族傳媒
資源簡介:This module defines safer C library string * * routine replacements. These are meant to make C * * a bit more safe in reference to Security and * * robustness
上傳時間: 2014-01-04
上傳用戶:佳期如夢
資源簡介:信息安全與保密的一些PPT文件,對初學(xué)者可以了解概況,Information Security and confidentiality of PPT document for beginners can understand Profiles.
上傳時間: 2013-12-17
上傳用戶:410805624
資源簡介:The core of Java(TM) technology, the Java virtual machine is an abstract computing machine that enables the Java(TM) platform to host applications on any computer or operating system without rewriting or recompiling. Anyone interested in de...
上傳時間: 2016-05-03
上傳用戶:zhenyushaw
資源簡介:The Rails Cookbook is is packed with the solutions you need to be a proficient developer with Rails, the leading framework for building the new generation of Web 2.0 applications. Recipes range from the basics, like installing Rails and set...
上傳時間: 2013-12-23
上傳用戶:pkkkkp
資源簡介:在網(wǎng)絡(luò)安全中經(jīng)常會遇到rootkit,NSA安全和入侵檢測術(shù)語字典( NSA Glossary of Terms Used in Security and Intrusion Detection)對rootkit的定義如下:A hacker Security tool that captures passwords and message traffic to and from a computer. A colle...
上傳時間: 2017-04-04
上傳用戶:xaijhqx
資源簡介:Ksplice is practical technology for updating the Linux kernel without rebooting. It enables you to avoid the disruptive process of rebooting for kernel Security updates and bugfixes. By making it easy to keep your systems up to date, Ksplic...
上傳時間: 2013-12-16
上傳用戶:xaijhqx
資源簡介:The second edition of this popular book has been completely updated to add the new features of the Java Servlet API Version 2.2, and new chapters on servlet Security and advanced communication. In addition to completely covering the 2.2 spe...
上傳時間: 2017-09-07
上傳用戶:wang5829
資源簡介:This book provides an overview of recent innovations and achievements in the broad areas of cyber-physical systems (CPS), including architecture, networking, systems, applications, Security, and privacy. The book discusses various new CPS t...
上傳時間: 2019-04-21
上傳用戶:danyun
資源簡介:In order to enhance the efficiency and reliability of the power grid, diversify energy resources, improve power Security, and reduce greenhouse gas emission, many countries have been putting great efforts in designing and constructing their...
上傳時間: 2020-06-07
上傳用戶:shancjb
資源簡介:In the first chapter, the topic of this book is classified into the area of pervasive com- puting. Further, Security and privacy in the scope of RFID technology is motivated and the vision that guides the remainder of this book is introduce...
上傳時間: 2020-06-08
上傳用戶:shancjb
資源簡介:Overview The MT7628 router-on-a-chip includes an 802.11n MAC and baseband,a 2.4 GHz radio and FEM,a 575/580MHz MIPS? 24K% CPU core,a 5-port 10/100 fast ethernet switch. The MT7628 includes everything needed to build an AP router from a sing...
上傳時間: 2022-07-18
上傳用戶:
資源簡介:Computer Security: Art and Science,計算機(jī)安全方面的經(jīng)典,2002年版,chm,英文
上傳時間: 2015-10-31
上傳用戶:kelimu