自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+
  • 博客(0)
  • 资源 (30)
  • 收藏
  • 关注

空空如也

EAL-template-目录.zip

安全架构 安全目标 操作用户指南 安全执行模块 测试覆盖分析 脆弱性分析 功能测试 功能规范 基础模块设计 交付程序 开发安全 开发工具 配置管理计划 配置项清单 生命周期模型 实现表示 准备程序

2022-01-08

QNX-UNIX-POSIX-C函数手册-chm格式.7z

新手程序员建议收藏,当做手册随时可查

2021-12-01

C++标准库.chm 解压后是chm格式

如果你是个c++新手,建议下载收藏,作为手册随时进行查询

2021-12-01

安全操作系统.ppt

安全操作系统.ppt

2020-03-12

SecurityArchitectureGuide_e.pdf

SecurityArchitectureGuide_e.pdf

2020-03-12

Security Target for Oracle Linux.pdf

Security Target for Oracle Linux.pdf

2020-03-12

NIST Cloud ComputingSecurity Reference Architecture.pdf

NIST Cloud ComputingSecurity Reference Architecture.pdf

2020-03-12

Linux内核的整体架构.doc

Linux内核的整体架构.doc

2020-03-12

Linux Kernel Security.pdf

Linux Kernel Security.pdf

2020-03-12

信息技术安全技术信息技术安全性评估准则-第二部分-word版.7z

信息技术安全技术信息技术安全性评估准则-第二部分-word版本

2020-03-12

JIL-Security-Architecture-requirements-(ADV_ARC)-v2-0.pdf

JIL-Security-Architecture-requirements-(ADV_ARC)-v2-0.pdf

2020-03-12

expert-brief-architecture.pdf

The expert group tackled the following issues:  What is a security architecture and what is its relationship with other architectures such as business, information, application and infrastructure architectures?  Why a security architecture, and what is the business case? Is it important to have a security architecture, or is it just another new hype?  Who does it give added value to?  Are there circumstances or conditions that determine when it is meaningful or not to develop a security architecture?  Which aspects and topics belong to a security architecture and with what depth?  How do you develop a security architecture, and what basic architecture models can you use for that purpose? What are their strong and their weak points?  How do you guarantee that a security architecture is introduced and maintained and that it will be used effectively?

2020-03-12

Design and Verification of Secure Systems.pdf

Design and Verification of Secure Systems.pdf

2020-03-12

Common Criteria Guidance for Developers.pdf

Common Criteria Guidance for Developers.pdf

2020-03-12

certMILS-D2.3-Security-Architecture-Template-PU-M16.pdf

certMILS-D2.3-Security-Architecture-Template-PU-M16.pdf

2020-03-12

A Quantitative Analysis of Common Criteria Certification Practice.pdf

A Quantitative Analysis of Common Criteria Certification Practice.pdf

2020-03-12

Common Criteria Guide for Oracle Linux.pdf

Common Criteria Guide for Oracle Linux.pdf

2020-03-12

Security Architecture.pdf

Common Criteria Security Architecture 文档

2020-03-12

_Linux网络安全架构Netfilter的分析和探讨.pdf

Linux网络安全架构Netfilter的分析和探讨

2020-03-12

第3部分安全保障组件.pdf

GB-T 18336.3-2015-清晰图像版本

2020-03-12

第1部分简介和一般模型.pdf

GB-T 18336.1-2015-清晰图像版本

2020-03-12

Android安全综述.pdf

Android安全综述

2020-03-12

修改和定制Android音频策略

修改和定制Android音频策略——以车载导航仪为例

2014-11-01

ISO_IEC_11172-4-1995.pdf

ISO_IEC_11172-4-1995.pdf

2011-08-18

ISO+11172-1.pdf

CONTENTS.................................................................................................................................................2 FOREWORD................................................................................................................................................4 INTRODUCTION - PART 1: SYSTEMS ...................................................................................................5 I.1 Multiplex-wide Operations (Pack layer) ..........................................................................6 I.2 Individual Stream Operations (Packet Layer) ..................................................................6 I.2.1 Demultiplexing ..................................................................................................6 I.2.2 Synchronization .................................................................................................6 I.2.3 Relation to Compression Layer..........................................................................7 I.3 System Reference Decoder ..............................................................................................7 1 GENERAL NORMATIVE ELEMENTS.......................................................................................8 1.1 Scope................................................................................................................................8 1.2 References........................................................................................................................8 2 TECHNICAL NORMATIVE ELEMENTS...................................................................................9 2.1 Definitions........................................................................................................................9 2.2 Symbols and Abbreviations ...........................................................................................16 2.2.1 Arithmetic Operators .......................................................................................16 2.2.2 Logical Operators ............................................................................................16 2.2.3 Relational Operators ........................................................................................17 2.2.4 Bitwise Operators ............................................................................................17 2.2.5 Assignment ......................................................................................................17 2.2.6 Mnemonics ......................................................................................................17 2.2.7 Constants .........................................................................................................18 2.3 Method of Describing Bit Stream Syntax ......................................................................18 2.4 Requirements .................................................................................................................20 2.4.1 Coding Structure and Parameters.....................................................................20 2.4.2 System Target Decoder....................................................................................20 2.4.3 Specification of the System Stream Syntax......................................................24 2.4.4 Semantic Definition of Fields in Syntax ..........................................................27 2.4.5 Restrictions on the Multiplexed Stream Semantics..........................................32 2.4.6 Constrained System Parameter Stream............................................................33 1-ANNEX A (informative) ......................................................................................................................A-1 1-A.1 Overview......................................................................................................................A-1 1-A.2 Encoder Operations......................................................................................................A-1 1-A.2.1 Degrees of freedom........................................................................................A-1 1-A.2.2 Synchronization .............................................................................................A-2 1-A.2.3 Multiplexing ..................................................................................................A-3 ......... ........ ........

2011-08-18

ISO_IEC_11172-3

INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1. GENERAL NORMATIVE ELEMENTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.1 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.2 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2. TECHNICAL NORMATIVE ELEMENTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.1 Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.2 Symbols and Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 2.3 Method of Describing Bitstream Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 2.4 Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 2.4.1 Specification of the Coded Audio Bitstream Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 2.4.2 Semantics for the Audio Bitstream Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 2.4.3 The Audio Decoding Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 3-Annex A (normative) Diagrams 3-Annex B (normative) Tables 3-Annex C (informative) The Encoding Process 3-Annex D (informative) Psychoacoustic Models 3-Annex E (informative) Bit Sensitivity to Errors 3-Annex F (informative) Error Concealment 3-Annex G (informative) Joint Stereo Coding

2011-08-18

TS流包结构分析,并举例分析了TS流

TS流包结构的分析,举例分析了TS流,包括分析了包的头和负载

2011-02-28

RTP协议;RTP协议详细介绍

RTP协议的详细介绍; 英文版;没得中文对照

2010-12-29

RTSP协议的中文和英文对照

RTSP协议的中文和英文对照,严格的一页中文对应一页英文

2010-12-29

一个钟表程序

一个改进过的钟表程序

2008-08-06

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除