搜索结果
找到约 91 项符合
Secure 的查询结果
按分类筛选
- 全部分类
- 书籍 (10)
- 加密解密 (9)
- Java编程 (7)
- 其他书籍 (4)
- 软件设计/软件工程 (4)
- 软件工程 (4)
- 技术资料 (4)
- 学术论文 (3)
- 文章/文档 (3)
- Linux/Unix编程 (3)
- 电子书籍 (3)
- 电源技术 (2)
- Java书籍 (2)
- VC书籍 (2)
- 网络 (2)
- 其他 (2)
- Internet/网络编程 (2)
- Symbian (2)
- 行业发展研究 (2)
- CA认证 (2)
- 资料/手册 (1)
- 单片机编程 (1)
- 嵌入式综合 (1)
- 无线通信 (1)
- 汇编语言 (1)
- USB编程 (1)
- 单片机开发 (1)
- 通讯编程文档 (1)
- 嵌入式/单片机编程 (1)
- MTK (1)
- 手机短信编程 (1)
- Jsp/Servlet (1)
- matlab例程 (1)
- 通讯/手机编程 (1)
- 书籍源码 (1)
- 认证考试资料 (1)
- 系统/网络安全 (1)
- 源码 (1)
- VIP专区 (1)
Java编程 Java Secure Shell Channel Library.
Java Secure Shell Channel Library.
其他 Cfingerd is a free and secure finger daemon replacement for standard finger daemons such as GNU fing
Cfingerd is a free and secure finger daemon replacement for standard finger daemons such as GNU fingerd or MIT fingerd. It can enable/disable finger service to individual users, rather than to all users on a given host.
VC书籍 This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash ...
加密解密 This project demonstrates the use of secure hash functions technique to implement a file encryption
This project demonstrates the use of secure hash functions technique
to implement a file encryption / decryption system.
This implemented application can encrypt / decrypt multiple files
on the fly using a password. The password supplied by the user
is used as the source message from which the hash ...
其他书籍 this is tutorial for ipchains/iptables . how to make ur system secure using them. how to enchance th
this is tutorial for ipchains/iptables . how to make ur system secure using them. how to enchance them.
软件工程 C++ methods to write ecash procedures in a secure way also containded with are description of the pr
C++ methods to write ecash procedures in a secure way also containded with are description of the protocols.
软件工程 description of evoting protocols to be implemented via very secure codes and its bugs and full revie
description of evoting protocols to be implemented via very secure codes and its bugs and full reviews.
Symbian this is the secure socket example seee it
this is the secure socket example seee it
Symbian this is the secure socket example seee it
this is the secure socket example seee it
Jsp/Servlet URL programming. This example illustrates using a URL to access resources on a secure site.
URL programming. This example illustrates using a URL to access resources
on a secure site.