acegi权限管理框架,作为基于Spring框架的WEB应用的安全框架
上传时间: 2015-11-07
上传用户:gyq
New security and control protocol for VoIP based on steganography and digital watermarking (关于ip telephone security的外文资料2006年)
标签: steganography watermarking and security
上传时间: 2014-06-13
上传用户:皇族传媒
An Immunological Model of Distributed Detection and its Application to Computer Security(PhD thesis)
标签: Immunological Distributed Application Detection
上传时间: 2015-11-25
上传用户:dreamboy36
我的security 的学习笔记.可以看看卡
标签: security
上传时间: 2015-11-30
上传用户:541657925
Linux安全教程linux-security
标签: linux-security Linux 教程
上传时间: 2013-12-29
上传用户:chens000
OReilly - Network Security Hacks
标签: Security OReilly Network Hacks
上传时间: 2013-12-28
上传用户:aa17807091
SQL Server Security Distilled, Second Edition by Morris Lewis ISBN:1590592190 Apress © 2004 (352 pages) This book takes an in-depth look at what you can do to secure data in SQL Server, shows how to authenticate access to data on the server, and authorizes what users can and can t do with that data, in versions 6.5, 7.0, and 2000.
标签: 1590592190 Distilled Security Edition
上传时间: 2015-12-25
上传用户:hj_18
This Home Security hardware and software. The CPU is MCS-51 series. The source code is developed by C language.
标签: The developed Security hardware
上传时间: 2014-12-03
上传用户:heart520beat
CCISP考试指南与导读 CISSP STUDY NOTES FROM CISSP PREP GUIDE 1 DOMAIN 1 – SECURITY MANAGEMENT PRACTICES 2 DOMAIN 2 – ACCESS CONTROL SYSTEMS 7 DOMAIN 3 – TELECOM AND NETWORK SECURITY 13 DOMAIN 4 – CRYPTOGRAPHY 34 DOMAIN 5 – SECURITY ARCHITECTURE AND MODELS 46 DOMAIN 6 – OPERATIONS SECURITY 56 DOMAIN 7 – APPLICATIONS AND SYSTEM DEVELOPMENT 63 DOMAIN 8 – BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING 70 DOMAIN 9 – LAW, INVESTIGATION AND ETHICS 78 DOMAIN 10 – PHYSICAL SECURITY 87
标签: CISSP MANAGEMENT PRACTICES SECURITY
上传时间: 2014-02-13
上传用户:sy_jiadeyi
这个是acegi安全例子,可以在实际使用中使用。
标签: acegi
上传时间: 2016-01-23
上传用户:yan2267246