Welcome![Sign In][Sign Up]
Location:
Search - Cryptography for Developers

Search list

[WinSock-NDISWCPiercePracticesEnterpriseLibrary

Description: A group of programmers far smarter than I have been laboring from some time to create a library of utilities to help developers like myself to create better applications. The fruits of that labor is the Enterprise Library from the Patterns & Practices group at Microsoft. The Enterprise Library encompasses Exception Handling, Logging, Caching, Security, Cryptography, and Database Access. The latest incarnation of the Enterprise Library for the .Net 2.0 framework also includes an ObjectBuilder which allows object creation with dependency injection. I’d be lying to you if I told you I understand exactly what the ObjectBuilder does. Brian Button has released the most complete information I have found so far on the ObjectBuilder. Documentation is scarce at this point since the Enterprise Library has not been officially released. The code covered in this article is based on the December Community Technology Preview of the new Enterprise Library.-A group of programmers far smarter than I ha ve been laboring from some time to create a libra ry of utilities to help developers like myself t o create better applications. The fruits of tha t labor is the Enterprise Library from the Patte Residus
Platform: | Size: 185636 | Author: 邹增理 | Hits:

[Other resourceSecure_Programming_Cookbook_for_C_and_C++

Description: Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.-Secure Programming Cookbook for C and C is a n important new resource for developers seriou 's about writing secure code for Unix (including Linux) and Windows environments. This essenti al code companion covers a wide range of topics, including safe initialization. access control, input validation, symmetric and public key cryptography. cryptographic hashes and MACs. authentication and key exchange, PKI. random numbers, and anti-tampering.
Platform: | Size: 1406512 | Author: 周爽 | Hits:

[Internet-NetworkWCPiercePracticesEnterpriseLibrary

Description: A group of programmers far smarter than I have been laboring from some time to create a library of utilities to help developers like myself to create better applications. The fruits of that labor is the Enterprise Library from the Patterns & Practices group at Microsoft. The Enterprise Library encompasses Exception Handling, Logging, Caching, Security, Cryptography, and Database Access. The latest incarnation of the Enterprise Library for the .Net 2.0 framework also includes an ObjectBuilder which allows object creation with dependency injection. I’d be lying to you if I told you I understand exactly what the ObjectBuilder does. Brian Button has released the most complete information I have found so far on the ObjectBuilder. Documentation is scarce at this point since the Enterprise Library has not been officially released. The code covered in this article is based on the December Community Technology Preview of the new Enterprise Library.-A group of programmers far smarter than I ha ve been laboring from some time to create a libra ry of utilities to help developers like myself t o create better applications. The fruits of tha t labor is the Enterprise Library from the Patte Residus
Platform: | Size: 185344 | Author: 邹增理 | Hits:

[VC/MFCSecure_Programming_Cookbook_for_C_and_C++

Description: Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.-Secure Programming Cookbook for C and C is a n important new resource for developers seriou 's about writing secure code for Unix (including Linux) and Windows environments. This essenti al code companion covers a wide range of topics, including safe initialization. access control, input validation, symmetric and public key cryptography. cryptographic hashes and MACs. authentication and key exchange, PKI. random numbers, and anti-tampering.
Platform: | Size: 1405952 | Author: 周爽 | Hits:

[BooksCryptographyorDevelopers

Description: 程序员密码学 一本好书,值得一看 书中包含密码学算法以及实例-Cryptography for Developers
Platform: | Size: 3636224 | Author: 郎永山 | Hits:

[Crack Hackelliptic_crypto

Description: This book is intended as a guide for security professionals, developers, and those interested in learning how elliptic curve cryptography can be deployed to secure applications.
Platform: | Size: 2564096 | Author: xadas | Hits:

[Software EngineeringCryptography_Developers

Description: Cryptography for developers eBook by Tom St Denis, Simon Johnson. -Special examples of Cryptography goals: Privacy, Integrity, Authentication -Full Discussion of Large Integer Arithmetic, Public Key Algoritms
Platform: | Size: 3670016 | Author: Alexander | Hits:

[OtherCryptography_for_Developers

Description: 开发者的加密技术,本书主要对软件开发者提供加密技术向导-Cryptography for Developers, the book mainly for software developers to provide encryption wizard
Platform: | Size: 2864128 | Author: lee | Hits:

[OtherCryptography-for-Developers---Simon-Johnson

Description: Cryptography is a well-established science that has been a significant historical influence for more than 2,000 years. Traditionally its main users were governments and the military, although it is worth noting that The Kama Sutra of Vatsyayana contains a recommendation that women should study the art of understanding writing in cypher (full details of all works cited are given in References and further reading.-Cryptography is a well-established science that has been a significant historical influence for more than 2,000 years. Traditionally its main users were governments and the military, although it is worth noting that The Kama Sutra of Vatsyayana contains a recommendation that women should study the art of understanding writing in cypher (full details of all works cited are given in References and further reading.
Platform: | Size: 3634176 | Author: Marcus Arcus | Hits:

[Software Engineering2_6_flow_cytometry_lecture_optical_filters

Description: This file is about cryptography algorithm It ll be helpful for new developers
Platform: | Size: 992256 | Author: Jenny | Hits:

[Industry research04-Image-Warping

Description: This file is about cryptography algorithm It ll be helpful for new developers
Platform: | Size: 575488 | Author: Jenny | Hits:

[Industry research3.1-3.2-book-quiz

Description: This file is about cryptography algorithm It ll be helpful for new developers
Platform: | Size: 246784 | Author: Jenny | Hits:

[Other1981---An-iterative-image-registration-technique-

Description: This file is about cryptography algorithm It ll be helpful for new developers
Platform: | Size: 2138112 | Author: Jenny | Hits:

CodeBus www.codebus.net