CPK通向赛博安全之路:理论与实践CPK Solution to Cyber Security:Theory and Practice
南湘浩更新时间:2020-05-12 15:26:25
最新章节:反侵权盗版声明封面
版权信息
内容简介
序言
前言
Part One Basic Theory
CHAPTER ONE CPK Public Key
CHAPTER TWO CPK Key Management
CHAPTER THREE CPK Truth Logic
CHAPTER FOUR CPK Identity Authentication
CHAPTER FIVE CPK Self-Assured Security
CHAPTER SIX CPK Virtual Network
- APP免费
CHAPTER SEVEN CPK Virtual Kernel
- APP免费
CHAPTER EIGHT CPK Digital Seal
- APP免费
CHAPTER NINE CPK Account Money
- APP免费
CHAPTER TEN CPK Systematic Security
- APP免费
Part Two Mair Practice
- APP免费
CHAPTER ELEVEN Virtual Internet
- APP免费
CHAPTER TWELVE Virtual Mob-Net
- APP免费
CHAPTER THIRTEEN RFID Anti-Fake Label
- APP免费
CHAPTER FOURTEEN Paper Anti-Fake Label
- APP免费
CHAPTER FIFTEEN File Classification
- APP免费
CHAPTER SIXTEEN CPK Video Monitoring
- APP免费
CHAPTER SEVENTEEN CPK Cloud Storage
- APP免费
CHAPTER EIGHTEEN Byte Encryption
- APP免费
CHAPTER NINETEEN Cyber Attack
- APP免费
CHAPTER TWENTY Situational Awareness
- APP免费
COMMENTS
- APP免费
COMMENT 1 The CPK Algorithm for Key Management
- APP免费
COMMENT 2 Identity Authentication Opening a New Land for Information Security
- APP免费
COMMENT 3 “Electronic ID Card” Attracts International Attention
- APP免费
COMMENT 4 CPK Goes to the World
- APP免费
COMMENT 5 Identity Authentication Based on CPK
- APP免费
COMMENT 6 To Construct Self-Assured Network System with CPK Technology
- APP免费
INTERVIEWS
- APP免费
Interview 1 Don't Lock Enthusiasm
- APP免费
Interview 2 Walk out of Mysterious “Black Chamber”
- APP免费
Interview 3 Searching for Safe “Silver Bullet”
- APP免费
NOTES
- APP免费
About the Author
- APP免费
反侵权盗版声明
更新时间:2020-05-12 15:26:25