EAL 文档实例-当前资源为目录结构-具体实例再联系
安全架构
安全目标
操作用户指南
安全执行模块
测试覆盖分析
脆弱性分析
功能测试
功能规范
基础模块设计
交付程序
开发安全
开发工具
配置管理计划
配置项清单
生命周期模型
实现表示
准备程序
TS流包结构分析,并举例分析了TS流
TS流包结构的分析,举例分析了TS流,包括分析了包的头和负载
ISO_IEC_11172-3
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1. GENERAL NORMATIVE ELEMENTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.1 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.2 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2. TECHNICAL NORMATIVE ELEMENTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.1 Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.2 Symbols and Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.3 Method of Describing Bitstream Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.4 Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.4.1 Specification of the Coded Audio Bitstream Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.4.2 Semantics for the Audio Bitstream Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.4.3 The Audio Decoding Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
3-Annex A (normative) Diagrams
3-Annex B (normative) Tables
3-Annex C (informative) The Encoding Process
3-Annex D (informative) Psychoacoustic Models
3-Annex E (informative) Bit Sensitivity to Errors
3-Annex F (informative) Error Concealment
3-Annex G (informative) Joint Stereo Coding
ISO+11172-1.pdf
CONTENTS.................................................................................................................................................2
FOREWORD................................................................................................................................................4
INTRODUCTION - PART 1: SYSTEMS ...................................................................................................5
I.1 Multiplex-wide Operations (Pack layer) ..........................................................................6
I.2 Individual Stream Operations (Packet Layer) ..................................................................6
I.2.1 Demultiplexing ..................................................................................................6
I.2.2 Synchronization .................................................................................................6
I.2.3 Relation to Compression Layer..........................................................................7
I.3 System Reference Decoder ..............................................................................................7
1 GENERAL NORMATIVE ELEMENTS.......................................................................................8
1.1 Scope................................................................................................................................8
1.2 References........................................................................................................................8
2 TECHNICAL NORMATIVE ELEMENTS...................................................................................9
2.1 Definitions........................................................................................................................9
2.2 Symbols and Abbreviations ...........................................................................................16
2.2.1 Arithmetic Operators .......................................................................................16
2.2.2 Logical Operators ............................................................................................16
2.2.3 Relational Operators ........................................................................................17
2.2.4 Bitwise Operators ............................................................................................17
2.2.5 Assignment ......................................................................................................17
2.2.6 Mnemonics ......................................................................................................17
2.2.7 Constants .........................................................................................................18
2.3 Method of Describing Bit Stream Syntax ......................................................................18
2.4 Requirements .................................................................................................................20
2.4.1 Coding Structure and Parameters.....................................................................20
2.4.2 System Target Decoder....................................................................................20
2.4.3 Specification of the System Stream Syntax......................................................24
2.4.4 Semantic Definition of Fields in Syntax ..........................................................27
2.4.5 Restrictions on the Multiplexed Stream Semantics..........................................32
2.4.6 Constrained System Parameter Stream............................................................33
1-ANNEX A (informative) ......................................................................................................................A-1
1-A.1 Overview......................................................................................................................A-1
1-A.2 Encoder Operations......................................................................................................A-1
1-A.2.1 Degrees of freedom........................................................................................A-1
1-A.2.2 Synchronization .............................................................................................A-2
1-A.2.3 Multiplexing ..................................................................................................A-3
.........
........
........
修改和定制Android音频策略
修改和定制Android音频策略——以车载导航仪为例
Linux内核的整体架构.doc
Linux内核的整体架构.doc
certMILS-D2.3-Security-Architecture-Template-PU-M16.pdf
certMILS-D2.3-Security-Architecture-Template-PU-M16.pdf
Design and Verification of Secure Systems.pdf
Design and Verification of Secure Systems.pdf
expert-brief-architecture.pdf
The expert group tackled the following issues:
What is a security architecture and what is its relationship with other architectures
such as business, information, application and infrastructure architectures?
Why a security architecture, and what is the business case? Is it important to have a
security architecture, or is it just another new hype?
Who does it give added value to?
Are there circumstances or conditions that determine when it is meaningful or not to
develop a security architecture?
Which aspects and topics belong to a security architecture and with what depth?
How do you develop a security architecture, and what basic architecture models can
you use for that purpose? What are their strong and their weak points?
How do you guarantee that a security architecture is introduced and maintained and
that it will be used effectively?
Linux Kernel Security.pdf
Linux Kernel Security.pdf
Security Target for Oracle Linux.pdf
Security Target for Oracle Linux.pdf
NIST Cloud ComputingSecurity Reference Architecture.pdf
NIST Cloud ComputingSecurity Reference Architecture.pdf
JIL-Security-Architecture-requirements-(ADV_ARC)-v2-0.pdf
JIL-Security-Architecture-requirements-(ADV_ARC)-v2-0.pdf
C++标准库.chm 解压后是chm格式
如果你是个c++新手,建议下载收藏,作为手册随时进行查询
第3部分安全保障组件.pdf
GB-T 18336.3-2015-清晰图像版本
ISO_IEC_11172-4-1995.pdf
ISO_IEC_11172-4-1995.pdf
RTSP协议的中文和英文对照
RTSP协议的中文和英文对照,严格的一页中文对应一页英文
Security Architecture.pdf
Common Criteria Security Architecture 文档
Common Criteria Guide for Oracle Linux.pdf
Common Criteria Guide for Oracle Linux.pdf
A Quantitative Analysis of Common Criteria Certification Practice.pdf
A Quantitative Analysis of Common Criteria Certification Practice.pdf
Common Criteria Guidance for Developers.pdf
Common Criteria Guidance for Developers.pdf
SecurityArchitectureGuide_e.pdf
SecurityArchitectureGuide_e.pdf
RTP协议;RTP协议详细介绍
RTP协议的详细介绍;
英文版;没得中文对照