Welcome![Sign In][Sign Up]
Location:
Search - security

Search list

[JSP/JavaJavaTrust.war

Description: oasis发布的web services security规范中的ws-trust规范的java实现-oasis issued by the web services security specification of ws123- tr su standardized achievement java
Platform: | Size: 6903808 | Author: 唐波 | Hits:

[Software Engineeringbiyesheji_jiyuACLdewangluo

Description: 毕业设计论文-反病毒的 随着网络技术的不断发展,出现了大量的基于网络的服务,网络安全问题也就变得越来越重要。ACL即访问控制列表,它是工作在OSI参考模型三层以上设备,通过对数据包中的第三、四层中的包头信息按照给定的规则进行分析,判断是否转发该数据包。基于ACL的网络病毒的过滤技术在一定程度上可以比较好的保护局域网用户免遭外界病毒的干扰,是一种比较好的中小型局域网网络安全控制技术。 本设计重点从计算机网络病毒的出现、基本特征以及发展现状的角度出发,比较深入的研究了相关网络安全技术,深入分析了当前几种严重影响网络性能的网络病毒,结合ACL的工作原理,制定了相应的访问控制规则列表,并且通过模拟实验,对ACL的可行性进行了相应的测试。 -Design graduate thesis- with the anti-virus network technology continues to develop, a lot of Web-based services, network security issues have become increasingly important. ACL or access control lists, it is work in the OSI Reference Model for three more equipment, the data packet through the third, four of Baotou information according to the rules, to determine whether the transmitted data packets. Based on ACL network virus filtering technology will be able to better protect users from the outside world LAN virus interference is a relatively good small and medium-sized LAN security control technologies. The design focus from the computer network virus with the basic features of the status quo of the development perspective, more in-depth studies to the relevant network security technol
Platform: | Size: 128000 | Author: thocr | Hits:

[Otherinfo_security

Description: 该软件包介绍了有关信息安全的知识,包括基本概念、密码学基础、认证系统及计算机病毒等。-the package of information security related information, including basic concepts, basic cryptography, Authentication system and computer viruses.
Platform: | Size: 8534016 | Author: 李飒 | Hits:

[CSharpSecurity.aspx

Description: 登陆的安全设置,主要防止没有登陆就进入其他界面-landing the security settings, mainly to prevent any landing on to other interface
Platform: | Size: 1024 | Author: 毛桃 | Hits:

[Special Effectsait_picmatch

Description: Author: Fahd Ahmad Abbasi Summary: Matches two pictures given as arguments. MATLAB Release: R13 Required Products: Image Processing Toolbox Description: The function takes two images as argument and using edge detection checks whether they are the same or not...a cool and simple code which can be used in security systems. The level at which the two pictures should be matched can be controlled. -Author : Fahd Ahmad Abbasi Summary : Matches two pictures given as arguments. MATLAB B. Release : R13 Required Products : Image Processing Toolbox Description : The function takes two images as argument and us ing edge detection checks whether they are the s ame or not ... a cool and simple code which can be u sed in security systems. The level at which the t wo pictures should be matched can be controlled .
Platform: | Size: 1024 | Author: Jallon | Hits:

[OS programwangluobaojiequ

Description: 实现对网络安全的保障,对入侵计算机的数据包进行截取检测 -realization of network security for the protection of computer hacking of data packets for an interception Detection
Platform: | Size: 80896 | Author: 杜维维 | Hits:

[Software Engineeringwangluoloudonglunwen

Description: 本文档是毕设论文。是网络安全漏洞扫描的。已通过答辩。-this documentation is completed based papers. Network security vulnerability scanning. The respondent has passed.
Platform: | Size: 1359872 | Author: 金晓爽 | Hits:

[source in ebookDCOMrumencode

Description: 《DCOM入门》随书源码 Chapter 1 (Distributed Computing) N/A Chapter 2 (DCOM Overview) N/A Chapter 3 (Objects) Basics Chapter 4 (Components) Basics Chapter 5 (Infrastructure) Infrastructure Chapter 6 (Building Components with ATL) OCRServer Chapter 7 (Using COM Objects) OCRClient Chapter 8 (COM in Cyberspace) Cyber Chapter 9 (Applying Security) Security Chapter 10 (Connecting Objects) Chat -"DCOM Easy" book with a source Chapter (Distributed Comp uting) N/A Chapter 2 (DCOM Overview) N/A Chapte r 3 (Objects) Basics Chapter 4 (Components) Bas ics Chapter 5 (Infrastructure) Infrastructur e Chapter 6 (Building Components with ATL) OCRS Chapter 7 servers (Using COM Objects) OCRClient C hapter 8 (COM in Cyberspace) Cyber Chapter 9 (Ap plying Security) Security Chapter 10 (Connect ing Objects) Chat
Platform: | Size: 656384 | Author: xiaoguang | Hits:

[Crack HackMD5andRSA

Description: 网络信息与安全技术中的MD5算法和RSA算法的java实现-information and network security technology and the RSA algorithm MD5 algorithm to achieve the java
Platform: | Size: 24576 | Author: wuxianyou | Hits:

[Crack HackAes_jiamidaima

Description: 网络安全加密的AES算法代码,希望大家能用的着。-network security encryption algorithm AES code, the hope everyone can be significant.
Platform: | Size: 12288 | Author: 阿太 | Hits:

[JSPsecurity

Description: 我的security 的学习笔记.可以看看卡-My learning notebook security. Can look at the card
Platform: | Size: 4096 | Author: jack | Hits:

[Crack HackSecureChat

Description: 提供加密的c/s 聊天程序。用到对称加密算法和非对称加密算法,实现客户服务器的安全聊天-Provide encrypted c/s chat program. Using symmetric encryption algorithms and asymmetric encryption algorithms, to achieve the security of client-server chat
Platform: | Size: 2627584 | Author: 梅三 | Hits:

[OtherWormhole_Simulation_Code

Description: This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego, 5-6 February 2004. -This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego, 5-6 February 2004.
Platform: | Size: 41984 | Author: 旺老财 | Hits:

[OtherAppliedCryptography

Description: 应用密码学,协议,算法与C源程序,密码学经典著作,网络安全与密码学必备书-Applied Cryptography, protocol, algorithm and C source code, classic cryptography, network security and cryptography an essential book
Platform: | Size: 2579456 | Author: | Hits:

[Disk ToolsMassStorageStopper.beta

Description: 不让别人在你电脑上乱用USB和1394移动设备,确保你的系统和文件、隐私安全-Not allowing people in your computer to use USB and 1394 mobile devices, to ensure that your system and files, privacy, security
Platform: | Size: 1618944 | Author: | Hits:

[OS programgunmgnt

Description: 软件工程的课程设计,一个提供给公安机关的枪支管理系统,里面附带了用于测试的数据、图片等。实现了查询,增删改,权限等功能。-Software engineering course design, one provided to the public security organs of the gun control system, which comes with data for testing and photographs. Realize the inquiries, additions and deletions changed, permissions and other functions.
Platform: | Size: 4476928 | Author: 杨秀云霁 | Hits:

[JSP/JavaSECURITY

Description: 高等院校计算机应用技术硕士研究生课程,高级计算机网络程序设计实例子代码,SECURE部分.-Master of Computer Application Technology tertiary post-graduate courses, advanced computer networks, programming examples of sub-code, SECURE part.
Platform: | Size: 35840 | Author: 罗一 | Hits:

[Otherdog

Description: 安全芯加密狗 -Core-core security dongle security dongle
Platform: | Size: 32261120 | Author: dglmy | Hits:

[JSP/Javajavachat

Description: 利用目前即时通讯工具在互联网上使用的广泛、便利、易用受欢迎的特点,结合了Java语言(Java 2 Standard Edition)的易用特点与性能优势,比如跨平台、安全性、多线程、网络Socket编程、流概念等方面,来设计基于Java虚拟机可跨平台特性的即时通讯工具,并对其体系结构、构成模块及系统关键技术进行了分析与设计。该系统具有安全、高效、实用、支持在不同系统平台运行等特点。 关键词:J2SE、即时通讯、跨平台(一次编写、到处执行)、多线程、JICQ -To take advantage of instant messaging tools on the Internet using a broad, convenient, easy-to-use popular features, a combination of Java language (Java 2 Standard Edition) The easy-to-use features and performance advantages, such as cross-platform, security, multi-threaded, Network Socket programming, the concept of flow, etc., to design based on the Java virtual machine can be cross-platform features of instant messaging tools, and architecture, modules and systems constitute a key technology for the analysis and design. The system has safe, efficient, practical and support the operation of different system platforms and so on. Key words: J2SE, instant messaging, cross-platform (write once, everywhere Executive), multi-threaded, JICQ
Platform: | Size: 309248 | Author: zengji | Hits:

[Otherrsa

Description: 网络安全体制中的RSA算法的一些相关文章-Network security system of the RSA algorithm in a number of related articles
Platform: | Size: 4818944 | Author: | Hits:
« 1 2 3 4 5 6 78 9 10 11 12 ... 50 »

CodeBus www.codebus.net