Welcome![Sign In][Sign Up]
Location:
Search - security

Search list

[JSP/Javaacegi-security-1.0.0-RC1-src

Description: Acegi Security为Spring Framework提供一个兼容的安全认证服务(security services). -Acegi Security for the Spring Framework provides a compatible safety certification services (security services).
Platform: | Size: 536073 | Author: cxy | Hits:

[CA authsecurity

Description: 说明: 1、里面有什么: 1.1、org.bouncycastle.*下的所有软件是bouncycastle组织开发的软件包 1.2、org.infosecurity.*下的软件包括: DES_CBC算法的实现 RSA算法的实现(包括:密钥生成、公钥加密和私钥解密、数字签名及签名验证) 数字信封的实现   利用数字信封实现大文件的加密、解密。 2、有什么用:   2.1 研究、学习信息安全中的密码学设计与实现技术。   2.2 当然如果大家觉得在其它地方用的上,我会觉得很高兴的。 3、还有什么改进: 3.1 对文件加密、解密的时候要频繁的IO,如果加一个缓冲区,比如10K、50K等, 只有缓冲区满了才写入DISK这样将提高效率。 3.2 RSA私钥积存的时候可以按PKCS8形式,再经BASE64编码保存比较好。-Note : 1, mean there : 1.1, org.bouncycastle .* of all software development organizations is bouncycastle package 1.2, org.infosecurity .* The software includes : DES_CBC algorithm to achieve the realization of the RSA algorithm (including : key generation, public key and private key encryption decryption, digital signatures and signature verification), the realization of digital envelope using digital envelope realize document encryption, decryption. Two, what is the use of : 2.1, learning the information security cryptography design and technology. 2.2 Of course, if you think in the other parts, I feel very happy. Three, what is there for improvement : 3.1 pairs of file encryption, decryption, and the time to frequent the IO, plus a buffer, such as 10K, 50K, the only buffer is needed for
Platform: | Size: 213582 | Author: 雷敏 | Hits:

[Other resourcejetspeed-security

Description: jetspeed2 安全模块完全解构资料-jetspeed2 security module completely Deconstruction information
Platform: | Size: 487095 | Author: 金三木 | Hits:

[Other resourceOReilly.Security.and.Usability.Aug.2005

Description: A book describle in detail about the system security and usability technology. It is a system book on security.
Platform: | Size: 7935735 | Author: Myron Tan | Hits:

[Other resourcemax-security

Description: Maximum Security (First Edition) 网络安全 英文版-Maximum Security (First Edition) English network security
Platform: | Size: 3252335 | Author: hehuilong | Hits:

[Other resourceSyngress.RFID.Security.Apr.2006.eBook-DDU

Description: RFID.Security指南 安全性是rfid的重要因素,本书详细探讨了rfid的安全性问题,英文-RFID.Security Guide rfid safety is an important factor, The book explored in detail the rfid security issue, English
Platform: | Size: 4349642 | Author: lilin | Hits:

[Other resourceOreilly.Linux.Security.Cookbook.eBook-LiB

Description: Oreilly出版的介绍Linux安全方面知识的书籍-Morris published on Linux security knowledge books
Platform: | Size: 653187 | Author: pw | Hits:

[Other resourceCisco.Press.Network.Security.Fundamentals.Sep.2004

Description: This a book about network security and SNMP .-This a book about network security and SN MP.
Platform: | Size: 19371325 | Author: wangjia | Hits:

[OtherOReilly[1].Network.Security.Tools.Apr.2005.eBook-L

Description: security tools 介绍了各种安全工具,很好的书-security tools introduced various security tools, very good book
Platform: | Size: 1344790 | Author: 郑树峰 | Hits:

[CSharpSecurity.aspx

Description: 登陆的安全设置,主要防止没有登陆就进入其他界面-landing the security settings, mainly to prevent any landing on to other interface
Platform: | Size: 1432 | Author: 毛桃 | Hits:

[Internet-NetworkCyber-Security-and-Power-System

Description: 在智能电网方面的论文 智能电网的网络安全方面的 希望对大家有帮助-The introduction of “smart grid” solutions imposes that cyber security and power system communication systems must be dealt with extensively. These parts together are essential for proper electricity transmission, where the information infrastructure is critical. The development of communication capabilities, moving power control systems from “islands of automation” to totally integrated computer environments, have opened up new possibilities and vulnerabilities. Since several power control systems have been procured with “openness” requirements, cyber security threats become evident. For refurbishment of a SCADA/EMS system, a separation of the operational and administrative computer systems must be obtained. The paper treats cyber security issues, and it highlights access points in a substation. Also, information security domain modeling is treated. Cyber security issues are important for “smart grid” solutions. Broadband communications open up for smart meters, and the
Platform: | Size: 579584 | Author: hahavi | Hits:

[androidAndroid Security Internals.pdf

Description: ANDROID SECURITY INTERNALS An In-Depth Guide to android's security architecture
Platform: | Size: 5848064 | Author: young蛘 | Hits:

[Firewall-Security4. Information Forensics & Security

Description: Base Papers for Network Security
Platform: | Size: 5901312 | Author: cschellaa | Hits:

[WEB CodeEssential PHP Security (2005)

Description: Essential PHP Security (2005)
Platform: | Size: 362496 | Author: Suleman | Hits:

[Other5G evolution of user mobile security

Description: In this paper they have discussed various security issues of 4G with respect to Wi-max and long term evolution. These issues are discussed at MAC and physical layer level. The security issues are seen in terms of possible attacks, system vulnerabilities and privacy concerns.
Platform: | Size: 308224 | Author: hicham | Hits:

[Other(App) Delphi Component - Tms Security System

Description: TMS Security system pack delphi 7 source code
Platform: | Size: 490496 | Author: mzille | Hits:

[Othersecurity

Description: Approach: NS-2 is an open source system that is developed using C++ and Tool Control Language TCL. Researchers can freely add new components to the system to server their own purposes. The latest version of NS-2 is version 2.28. Within this version, most of the standard protocols supported. You can find protocol from media access layer protocols such as CSMA/CD up to application protocols as FTP and HTTP. For routing protocols, there are unicast and multicast routing protocols for wire network and DSR, DSDV, AODV for wireless ad-hoc networks. Most of these protocols were developed by researchers and adopted into standard version of NS-2. In order to experiment security features for network, we need to add security functions into NS-2. Of course for specific experiments there are specific requirements. The purpose of this project is only to illustrate a way to add security functions into NS-2 Our approach is to build a new protocol at network layer
Platform: | Size: 2048 | Author: bvc | Hits:

[Crack HackFIDO Security Reference-20150514

Description: FIDO Security Reference-20150514
Platform: | Size: 446464 | Author: ashleyroy | Hits:

[BooksSecurity in Digital Sources

Description: Security in digital sources manual (in spanish)
Platform: | Size: 2164736 | Author: Helhest | Hits:

[JSP/JavaSpring Security Oauth2.0课程资料

Description: Spring Security Oauth2.0课程资料(Spring Security Oauth2.0)
Platform: | Size: 2998272 | Author: 水彩笔 | Hits:
« 1 2 34 5 6 7 8 9 10 ... 50 »

CodeBus www.codebus.net