搜索结果
找到约 239 项符合
security 的查询结果
按分类筛选
- 全部分类
- 其他书籍 (37)
- 书籍 (25)
- Java编程 (24)
- 其他 (15)
- 加密解密 (15)
- 电子书籍 (8)
- 软件设计/软件工程 (8)
- Java书籍 (8)
- Linux/Unix编程 (8)
- 技术资料 (7)
- 电源技术 (5)
- 文章/文档 (5)
- RFID编程 (5)
- 单片机开发 (5)
- 单片机编程 (4)
- 行业发展研究 (4)
- 软件工程 (4)
- 通讯编程文档 (4)
- 网络 (3)
- 书籍源码 (3)
- 数据库系统 (3)
- 模拟电子 (2)
- CA认证 (2)
- matlab例程 (2)
- SQL Server (2)
- 其他数据库 (2)
- Delphi控件源码 (2)
- 嵌入式/单片机编程 (2)
- 认证考试资料 (2)
- DSP编程 (1)
- 工控技术 (1)
- 数值算法/人工智能 (1)
- VC书籍 (1)
- 语音压缩 (1)
- 文件格式 (1)
- Windows Mobile (1)
- 技术管理 (1)
- Internet/网络编程 (1)
- JavaScript (1)
- 磁盘编程 (1)
- Applet (1)
- 其他嵌入式/单片机内容 (1)
- 系统设计方案 (1)
- 交通/航空行业 (1)
- MySQL数据库 (1)
- Symbian (1)
- 手机彩信(MMS)编程 (1)
- 家庭/个人应用 (1)
- 系统/网络安全 (1)
- 嵌入式综合 (1)
- 接口技术 (1)
- 源码 (1)
数据库系统 本程序的开发环境为VS2005
本程序的开发环境为VS2005,数据库为SQLSever2005
默认的连接字符串为:"DataSource=125.216.227.147 Initial Catalog=msdb Persist Security Info=True User ID=sa Password=111111"
管理系统为一个简单的人事管理系统,帮助初学者尽快的掌握这种语言,进而有助于系统改进,对初学者来说是很不错的选择。 ...
Java编程 If you want to use the Struts Framework to its fullest potential, this is the book for you. Programm
If you want to use the Struts Framework to its fullest potential, this is the book for you. Programming Jakarta Struts, 2nd Edition covers everything the successful earlier edition did as well as plenty more: now fully up to date with Struts 1.1, this edition covers the latest material on tag librar ...
其他书籍 This book was developed for information technology (IT) professionals who plan to take the related
This book was developed for information technology (IT) professionals who plan to
take the related Microsoft Certified Professional Exam 70-299, Implementing and
Administering Security in a Microsoft Windows Server 2003 Network, and for IT professionals
who implement and manage software solutions fo ...
加密解密 The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfi ...
加密解密 RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digit
RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digital signature . Its security based on Integer Factorization Problem (IFP). RSA uses an asymetric key. RSA was created by Rivest, Shamir, and Adleman in 1977. Every user have a pair of key, public key a ...
Java编程 Servlets and JavaServer Pages is the first complete guide to building dynamic Java-based Web applica
Servlets and JavaServer Pages is the first complete guide to building dynamic Java-based Web applications using the new JavaServer Pages 2.0 and Servlets 2.4. Servlets and JavaServer Pages (JSP) provide a robust solution to developing large, complex Web applications, including multiserver projects. ...
Java编程 this is the document for the secure development in java. It covers in very good details the aspect o
this is the document for the secure development in java. It covers in very good details the aspect of security programming in Java
Java编程 this is the document for the secure development in java. It covers in very good details the aspect o
this is the document for the secure development in java. It covers in very good details the aspect of security programming in Java
电子书籍 The second edition of this popular book has been completely updated to add the new features of the J
The second edition of this popular book has been completely updated to add the new features of the Java Servlet API Version 2.2, and new chapters on servlet security and advanced communication. In addition to completely covering the 2.2 specification, we have included bonus material on the new 2.3 v ...
其他 Decompilation Dos Program is a technique that allows you to recover lost source code. It is also nee
Decompilation Dos Program is a technique that allows you to recover lost source code. It is also needed in some cases for computer security.