搜索结果
找到约 37 项符合
authentication 的查询结果
按分类筛选
VC书籍 Secure Programming Cookbook for C and C++ is an important new resource for developers serious about
Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, sy ...
网络 Dropbear is an SSH 2 server, designed to be usable in small memory environments. It supports:
Dropbear is an SSH 2 server, designed to be usable in small memory environments.
It supports:
* Main features of SSH 2 protocol
* Implements X11 forwarding, and authentication-agent forwarding
for OpenSSH clients
* Compatible with OpenSSH ~/.ssh/authorized_keys public key
authentication ...
系统设计方案 This article describes Atmel’s FingerChip technology for electronic fingerprint sensing that combin
This article describes Atmel’s FingerChip technology for electronic fingerprint sensing that
combines the advantages of small size, low cost, high accuracy, zero maintenance, low energy
consumption and portability. This technology has applications in a wide range of fixed and
portable secured devic ...
其他 The Microsoft® Cryptographic Application Programming Interface (CryptoAPI) provides services that
The Microsoft&reg Cryptographic Application Programming Interface (CryptoAPI) provides services that enable application developers to add authentication, encoding, and encryption to their Microsoft Win32&reg -based applications. Application developers can use the functions in the CryptoAPI without k ...
其他书籍 《为Windows Vista编写安全的代码》
《为Windows Vista编写安全的代码》,2007年出版
Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. ...
MySQL数据库 The Shift Log is a database entry and display system that is built off of PHP and MySQL. The log use
The Shift Log is a database entry and display system that is built off of PHP and MySQL. The log uses a basic user authentication system to ensure user accountability and log integrity. It also has a RTF editor integrated into it.
技术管理 The public key infrastructure (PKI) is the foundation and center of network security architecture no
The public key infrastructure (PKI) is the foundation and center of network security architecture now, can provide security services including confidentiality, authentication, dig2ital signatures and integrity.
网络 This a linux device driver for Ralink RT2500USB b/g WLAN Card. This driver implements basic 802.11
This a linux device driver for Ralink RT2500USB b/g WLAN Card.
This driver implements basic 802.11 function.
Infrastructure and Ad-hoc mode with open or shared or wpapsk or wpa2psk authentication method.
WEP-40 and WEP-104 or tkip or aes encryption.
Linux/Unix编程 hostapd - user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator and RADIUS authent
hostapd - user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP
Authenticator and RADIUS authentication server
Linux/Unix编程 The UCL common multimedia library implements a number of algorithms and protocols needed by a number
The UCL common multimedia library implements a number of algorithms and protocols needed by a number of our applications. It compiles standalone on a range of Unix systems (Solaris, Linux, Irix, FreeBSD, MacOSX) and on Windows 95/98/NT/XP. The following protocols/algorithms are included in the libra ...