SECURITY

共 306 篇文章
SECURITY 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 306 篇文章,持续更新中。

Linux Bible: 介紹包括 Fedora, KNOPPIX, Debian, SUSE, Ubuntu , 及其他 7 種 Linux * Ideal for users planning

Linux Bible: 介紹包括 Fedora, KNOPPIX, Debian, SUSE, Ubuntu , 及其他 7 種 Linux * Ideal for users planning the transition to Linux who want to sample different distributions to see which one best meets thei

Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the rela

Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the related architecture. HIP is a proposal to change the TCP/IP stack to securely support mobility and mult

Windows Vista Kernel Security, 对象了解系统底层以及系统安全的人很有帮助

Windows Vista Kernel Security, 对象了解系统底层以及系统安全的人很有帮助

WindPE for Borland Delphi 7.0: {*******************************************************} { } { Wi

WindPE for Borland Delphi 7.0: {*******************************************************} { } { WindPE for Borland Delphi 7.0 } { } { Code:WindRand http://www.pefine.com } { } { Copyright (c) 20

The core of Java(TM) technology, the Java virtual machine is an abstract computing machine that enab

The core of Java(TM) technology, the Java virtual machine is an abstract computing machine that enables the Java(TM) platform to host applications on any computer or operating system without rewriting

Apache 2.0.63 is the current stable version of the 2.0 series, and is recommended over any previous

Apache 2.0.63 is the current stable version of the 2.0 series, and is recommended over any previous 2.0 release. This release fixes a few potential security vulnerabilites.

Oreilly.Java.Security.2nd.rar

Oreilly.Java.Security.2nd.rar,Oreilly丛书中对于Java安全的书

Multimedia security: the 22nd century approach

Multimedia security: the 22nd century approach

TinyLogin is a suite of tiny Unix utilities for handling logging into, being authenticated by, chan

TinyLogin is a suite of tiny Unix utilities for handling logging into, being authenticated by, changing one s password for, and otherwise maintaining users and groups on an embedded system. It also

《为Windows Vista编写安全的代码》

《为Windows Vista编写安全的代码》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges develop

商品销售管理系统 1.首先确保您的机器上安装了SQL Server数据库。将SQL Server服务器名称改为JAMESLIN

商品销售管理系统 1.首先确保您的机器上安装了SQL Server数据库。将SQL Server服务器名称改为JAMESLIN,如果不修改服务器名称,则需要修改VB程序,在frmLogin窗体的cmdOK_Click函数中,修改代码: strConn = "Provider=SQLOLEDB.1 Integrated Security=SSPI Persist Security Info=Fa

SQL Server Security Distilled, Second Edition by Morris Lewis ISBN:1590592190 Apress &copy 2004

SQL Server Security Distilled, Second Edition by Morris Lewis ISBN:1590592190 Apress &copy 2004 (352 pages) This book takes an in-depth look at what you can do to secure data in SQL Server, show

B/S版ERP安装方法 1、安装IIS5.0、Microsoft .NET Framework 1.1及SQL Server2000 2、将目录Copy_of_ERP和webctrl_clie

B/S版ERP安装方法 1、安装IIS5.0、Microsoft .NET Framework 1.1及SQL Server2000 2、将目录Copy_of_ERP和webctrl_client复制到C:/Inetpub/wwwroot下,并将Copy_of_ERP目录设置成IIS虚拟目录 3、在SQL Server2000中新建一个Storage用户和LXTXERP数据库,然后将Da

我的security 的学习笔记.可以看看卡

我的security 的学习笔记.可以看看卡

An Immunological Model of Distributed Detection and its Application to Computer Security(PhD thesis)

An Immunological Model of Distributed Detection and its Application to Computer Security(PhD thesis)

net_tcp.h

/*<br /> *********************************************************************************************************<br /> * &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;

In this paper, we provide an overview of the security concerns introduced by wireless LANs, current

In this paper, we provide an overview of the security concerns introduced by wireless LANs, current approaches to wireless LAN security, their limitations, and the weaknesses of various “band aid” sec

Every day, patches are created to cover up security holes in software applications and operating sys

Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken ad

Computer Security: Art and Science,计算机安全方面的经典,2002年版,chm,英文

Computer Security: Art and Science,计算机安全方面的经典,2002年版,chm,英文

802.11 security(安全).rar 无线应用安全 4

802.11 security(安全).rar 无线应用安全 4