虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Security

网络安全技术及其协议,包括了网络通信安全、信息在网络传输中的保密性和完整性、控制访问受限网域与敏感信息以及在公共网络如因特网上使用隐秘通讯。为了解决这些问题,各大组织及技术供应商纷纷推出了各种网络和信息安全技术。
  • WAP无线应用协议.包括WAE Wireless Application Enviromnent 无线应用环境, WAP Wireless Application Protocol 无线应用协议,W

    WAP无线应用协议.包括WAE Wireless Application Enviromnent 无线应用环境, WAP Wireless Application Protocol 无线应用协议,WDP Wireless Datagrm Protocol 无线数据报协议,WML Wireless Markup Language 无线标记语言,WSP Wireless Session Protocol 无线会话协议,WTA Wireless Telephony Application 无线电话应用,WTLS Wireless Transport Layer Security 无线传输层安全,WTP Wireless Transaction Protocol 无线事务协议

    标签: Application Wireless Enviromnent WAP

    上传时间: 2015-09-12

    上传用户:lijinchuan

  • 1.left.aspx下部分实现了读取RDF(RDF format feeds

    1.left.aspx下部分实现了读取RDF(RDF format feeds,是描述web资源的W3C XML格式)格式的feeds,可点击第三条“RDF Test”进行对比。 RDF与普通XML的主要区别是它的根节点下是<items>,而不是<channel>。 2.运行时,需要根据自己的机子改变RssReader.cs中的 String connStr = @"Data Source=6998D47256954C1\SQLEXPRESS Initial Catalog=rss Integrated Security=True"

    标签: RDF format feeds left

    上传时间: 2014-01-17

    上传用户:邶刖

  • 《DCOM入门》随书源码 Chapter 1 (Distributed Computing) N/A Chapter 2 (DCOM Overview) N/A Chapter 3 (Objec

    《DCOM入门》随书源码 Chapter 1 (Distributed Computing) N/A Chapter 2 (DCOM Overview) N/A Chapter 3 (Objects) Basics Chapter 4 (Components) Basics Chapter 5 (Infrastructure) Infrastructure Chapter 6 (Building Components with ATL) OCRServer Chapter 7 (Using COM Objects) OCRClient Chapter 8 (COM in Cyberspace) Cyber Chapter 9 (Applying Security) Security Chapter 10 (Connecting Objects) Chat

    标签: Chapter DCOM Distributed Computing

    上传时间: 2014-01-03

    上传用户:haoxiyizhong

  • This book keeps the exposition as straightforward as possible and enables you to cut through the maz

    This book keeps the exposition as straightforward as possible and enables you to cut through the maze of acronyms, hacking tools, rumored weaknesses, and vague vendor Security claims to make educated Security decisions when purchasing or deploying WLAN."

    标签: straightforward exposition the possible

    上传时间: 2014-01-07

    上传用户:851197153

  • 信息安全与保密的一些PPT文件

    信息安全与保密的一些PPT文件,对初学者可以了解概况,Information Security and confidentiality of PPT document for beginners can understand Profiles.

    标签: 信息安全

    上传时间: 2013-12-17

    上传用户:410805624

  • Software Testing, Second Edition provides practical insight into the world of software testing and q

    Software Testing, Second Edition provides practical insight into the world of software testing and quality assurance. Learn how to find problems in any computer program, how to plan an effective test approach and how to tell when software is ready for release. Updated from the previous edition in 2000 to include a chapter that specifically deals with testing software for Security bugs, the processes and techniques used throughout the book are timeless. This book is an excellent investment if you want to better understand what your Software Test team does or you want to write better software.

    标签: practical Software provides software

    上传时间: 2014-08-01

    上传用户:zhaiyanzhong

  • B/S版ERP安装方法 1、安装IIS5.0、Microsoft .NET Framework 1.1及SQL Server2000 2、将目录Copy_of_ERP和webctrl_clie

    B/S版ERP安装方法 1、安装IIS5.0、Microsoft .NET Framework 1.1及SQL Server2000 2、将目录Copy_of_ERP和webctrl_client复制到C:/Inetpub/wwwroot下,并将Copy_of_ERP目录设置成IIS虚拟目录 3、在SQL Server2000中新建一个Storage用户和LXTXERP数据库,然后将Data目录中的LXTXERP.BAK数据库备份文件还原 4、修改Copy_of_ERP目录下的Web.config文件的连接属性sa用户的密码: <add key="mydns" value="data source=(local) initial catalog=LXTXERP persist Security info=False user id=sa pwd=123 workstation id=jl packet size=4096" /> 5、在Windows管理工具中打开Internet 服务管理器,运行Copy_of_ERP中的Login.aspx打开ERP登录页面,默认用户:admin 密码:123 6、OK

    标签: webctrl_clie Copy_of_ERP Framework Microsoft

    上传时间: 2015-12-09

    上传用户:zhuimenghuadie

  • This code was used to produce simulation results described in: Using Directional Antennas to Pre

    This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego, 5-6 February 2004.

    标签: Directional simulation described Antennas

    上传时间: 2014-12-06

    上传用户:xieguodong1234

  • With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to s

    With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to safely test and debug applications, network services, and even kernels. You can try out new distributions, experiment with buggy software, and even test Security. Now, for the first time, the creator and maintainer of User Mode Linux shows how to put it to work hands-on. Jeff Dike covers everything from getting started through running enterprise-class User Mode Linux servers. You ll find authoritative advice on bootup, compilation, administration, specialized configurations, and much more.

    标签: Linux computer machines virtual

    上传时间: 2013-12-19

    上传用户:xinzhch

  • 商品销售管理系统 1.首先确保您的机器上安装了SQL Server数据库。将SQL Server服务器名称改为JAMESLIN

    商品销售管理系统 1.首先确保您的机器上安装了SQL Server数据库。将SQL Server服务器名称改为JAMESLIN,如果不修改服务器名称,则需要修改VB程序,在frmLogin窗体的cmdOK_Click函数中,修改代码: strConn = "Provider=SQLOLEDB.1 Integrated Security=SSPI Persist Security Info=False Initial Catalog=Sale Data Source=JAMESLIN UID=Admin PWD=111" 即Source=JAMESLIN中的“JAMESLIN”改为您本机服务器名。 2.在SQL Server“企业管理器”中“安全性|登录”中,创建用户:Admin,其密码为111。 3.打开SQL Server“企业管理器”的“工具|还原数据库”菜单命令,在对话框在设置还原的数据库名为Sale,选择从“设备”还原,根据向导逐步选择本章目录的“数据库”子目录下的文件Sale Backup,从而建立数据库。 这样,就可以运行本章程序了。

    标签: Server SQL JAMESLIN

    上传时间: 2015-12-30

    上传用户:nairui21