自用java开发包。 包含mail,io,net,sort,Security,http,chache等等内容。
上传时间: 2013-12-14
上传用户:tyler
clean all the event log, include Application, Security, System
标签: Application Security include System
上传时间: 2016-10-31
上传用户:siguazgb
Ubuntu packages of Security software。 相当不错的源码,只是文档不全; 大家仔细研究一定会有不菲的收获!
标签: packages Security software Ubuntu
上传时间: 2014-01-06
上传用户:zhangyi99104144
If you are using Internet Explorer on Windows XP Service Pack 2, there is a Security restriction disallowing scripts to run in files opened on your local machine. When you first try to run the examples, you will most likely get a message saying, "To help protect your Security, Internet Explorer has restricted this file from showing active content that could access your computer." To see the example, you must click on the message and select "Allow Blocked Content". JavaScript高级程序设计 里面自代源码
标签: restriction Explorer Internet Security
上传时间: 2016-11-18
上传用户:源弋弋
EMV v4.2 Book2:Security and Key Management
标签: Management Security Book2 EMV
上传时间: 2013-12-26
上传用户:zhangyigenius
Introduction Computer Security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new Security solutions grows. "Trusted computing" initiatives propose to solve some of today s Security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide Security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the Security benefits intact while ensuring that a PC owner s
标签: vulnerabilities Introduction discovered undeniably
上传时间: 2014-01-05
上传用户:yph853211
该程序包提供了三种加解密算法的源代码:DES、AES和RSA。程序没有使用Java的Security库,完全是自己根据加解密算法流程手工编写的。适用于密码学加解密算法的学习和研究。 由于运行速度慢,不推荐用于实用项目。
上传时间: 2017-03-08
上传用户:123啊
RFID – An introduction RFID tags, Security and the individual
标签: RFID introduction individual Security
上传时间: 2017-03-19
上传用户:330402686
this is the case study done on the technique in information Security i.e. CRYPTOGRAPHY. various cryptographic techniques are described here.
标签: i.e. CRYPTOGRAPHY information the
上传时间: 2014-01-27
上传用户:ls530720646
This file is about the computer Security and its interface.
标签: interface computer Security about
上传时间: 2017-03-25
上传用户:zwei41