RFID – An introduction RFID tags, security and the individual
资源简介:RFID – An introduction RFID tags, security and the individual
上传时间: 2017-03-19
上传用户:330402686
资源简介:An Introduction To Cryptography Chapter 1, “The Basics of Cryptography,” provides an overview of the terminology and concepts you will encounter as you use PGP products. Chapter 2, “Phil Zimmermann on PGP,” written by PGP’s creator,...
上传时间: 2017-06-12
上传用户:cylnpy
资源简介:Data Structures and Problem Solving Using C++ provides an introduction to data structures and algorithms from the viewpoint of abstract thinking and problem solving, as well as the use of C++. It is a complete revision of Weiss successful ...
上传时间: 2013-12-20
上传用户:lifangyuan12
资源简介:Introduction to Process Improvement and theCapability Maturity Model (CMM)软件CMM认证的介绍
上传时间: 2015-09-02
上传用户:wlcaption
资源简介:This paper introduces an affine invariant of trapezia, and the explicit constraint equation between the intrinsic matrix of a camera and the similarity invariants of a trapezium are established using the affine invariant. By this constraint...
上传时间: 2014-01-16
上传用户:6546544
资源简介:The most up to date, comprehensive, and practical guide to Web services security, and the first to cover the final release of new standards SAML 1.1 and WS-Security.
上传时间: 2014-01-26
上传用户:小宝爱考拉
资源简介:it is a progrma that aim to caculate an average value, pi value and the pris number in java enviroment
上传时间: 2013-12-12
上传用户:lxm
资源简介:GSM Security and the protocols involves in a mobile environment authentication process
上传时间: 2017-05-01
上传用户:417313137
资源简介:A Gentle Introduction to Dynamic Programming and the Viterbi Algorithm
上传时间: 2014-01-17
上传用户:四只眼
资源简介:Overview of component creation This chapter provides an overview of component design and the process of writing components for Delphi applications. The material here assumes that you are familiar with Delphi and its standard components. ...
上传时间: 2017-06-10
上传用户:thuyenvinh