- 
- 
                
					Petroem.rar
					石化企业乙二醇安全保护系统设计Petrochemical ethylene glycol security system
				 
- 
                
			
- 
                
					8.1-Lesson-26.rar
					ROUTING TECHNIQUES
Routing requires a router to have a routing table. Several techniques are employed to make the size of the routing table manageable and handle issues such as security. Some of these techniques are discussed here.
				 
- 
                
					S72040.rar
					SST89E516加密特性
SST89E/V516RDx and SST89E/V58RDx
Security Features
				 
- 
                
					ELIPTIC.rar
					Matlab Security  Eliptic curve cryptoMatlab Security  Eliptic curve cryptoMatlab Security  Eliptic curve cryptoMatlab Security  Eliptic curve cryptoMatlab Security  Eliptic curve cryptoMatlab Security  Eliptic curve cryptoMatlab Security  Eliptic curve  ... 
				 
- 
                
					CAESARCI.rar
					 ...  complex schemes, such as the Vigenà ¨re cipher, and still has modern application in the ROT13 system. As with all single alphabet substitution ciphers, the Caesar cipher is easily broken and in practice offers essentially no communication security.
				 
- 
                
					Parallel-comem.rar
					微机群并行计算机安全开机系统的研发PC cluster parallel computer security research and development of power system
				 
- 
                
					isoiec7816-8-en.zip
					Identification cards -- Integrated circuit(s) cards with contacts -- Part 8: Security related interindustry commands
				 
- 
                
					Hacking.rar
					Just an ebook i got from my friend via torrent, I think its a must have for those who need to know more details about systems security
				 
- 
                
			
-