搜索结果

找到约 37 项符合 authentication 的查询结果

VC书籍 Secure Programming Cookbook for C and C++ is an important new resource for developers serious about

Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, sy ...
https://www.eeworm.com/dl/686/192064.html
下载: 129
查看: 1082

网络 Dropbear is an SSH 2 server, designed to be usable in small memory environments. It supports:

Dropbear is an SSH 2 server, designed to be usable in small memory environments. It supports: * Main features of SSH 2 protocol * Implements X11 forwarding, and authentication-agent forwarding for OpenSSH clients * Compatible with OpenSSH ~/.ssh/authorized_keys public key authentication ...
https://www.eeworm.com/dl/635/201813.html
下载: 200
查看: 1042

系统设计方案 This article describes Atmel’s FingerChip technology for electronic fingerprint sensing that combin

This article describes Atmel’s FingerChip technology for electronic fingerprint sensing that combines the advantages of small size, low cost, high accuracy, zero maintenance, low energy consumption and portability. This technology has applications in a wide range of fixed and portable secured devic ...
https://www.eeworm.com/dl/678/202657.html
下载: 135
查看: 1039

其他 The Microsoft&reg Cryptographic Application Programming Interface (CryptoAPI) provides services that

The Microsoft&reg Cryptographic Application Programming Interface (CryptoAPI) provides services that enable application developers to add authentication, encoding, and encryption to their Microsoft Win32&reg -based applications. Application developers can use the functions in the CryptoAPI without k ...
https://www.eeworm.com/dl/534/232527.html
下载: 60
查看: 1070

其他书籍 《为Windows Vista编写安全的代码》

《为Windows Vista编写安全的代码》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. ...
https://www.eeworm.com/dl/542/243577.html
下载: 162
查看: 1029

MySQL数据库 The Shift Log is a database entry and display system that is built off of PHP and MySQL. The log use

The Shift Log is a database entry and display system that is built off of PHP and MySQL. The log uses a basic user authentication system to ensure user accountability and log integrity. It also has a RTF editor integrated into it.
https://www.eeworm.com/dl/688/246810.html
下载: 101
查看: 1093

技术管理 The public key infrastructure (PKI) is the foundation and center of network security architecture no

The public key infrastructure (PKI) is the foundation and center of network security architecture now, can provide security services including confidentiality, authentication, dig2ital signatures and integrity.
https://www.eeworm.com/dl/642/259051.html
下载: 35
查看: 1049

网络 This a linux device driver for Ralink RT2500USB b/g WLAN Card. This driver implements basic 802.11

This a linux device driver for Ralink RT2500USB b/g WLAN Card. This driver implements basic 802.11 function. Infrastructure and Ad-hoc mode with open or shared or wpapsk or wpa2psk authentication method. WEP-40 and WEP-104 or tkip or aes encryption.
https://www.eeworm.com/dl/635/269304.html
下载: 157
查看: 1085

Linux/Unix编程 hostapd - user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator and RADIUS authent

hostapd - user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator and RADIUS authentication server
https://www.eeworm.com/dl/619/269387.html
下载: 199
查看: 1298

Linux/Unix编程 The UCL common multimedia library implements a number of algorithms and protocols needed by a number

The UCL common multimedia library implements a number of algorithms and protocols needed by a number of our applications. It compiles standalone on a range of Unix systems (Solaris, Linux, Irix, FreeBSD, MacOSX) and on Windows 95/98/NT/XP. The following protocols/algorithms are included in the libra ...
https://www.eeworm.com/dl/619/276848.html
下载: 77
查看: 1071