《为Windows Vista编写安全的代码》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world Security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - Cryptographic Enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars
上传时间: 2016-01-07
上传用户:zxc23456789
TinyLogin is a suite of tiny Unix utilities for handling logging into, being authenticated by, changing one s password for, and otherwise maintaining users and groups on an embedded system. It also provides shadow password support to enhance system Security. TinyLogin is, as the name implies, very small, and makes an excellent complement to BusyBox on an embedded System. It can be used without BusyBox, of course, but I envision them being used together most of the time.
标签: authenticated TinyLogin utilities handling
上传时间: 2016-01-30
上传用户:253189838
A distributed, peer-to-peer, server-less communication & messaging solution for JAVA (JMS), C++ and .NET applications, integrates with JBoss, WebLogic & WebSphere. Offers guaranteed delivery, Security and transactions. Supports TCP, SSL & HTTP protocols
标签: communication peer-to-peer distributed server-less
上传时间: 2014-11-28
上传用户:wangchong
Apache 2.0.63 is the current stable version of the 2.0 series, and is recommended over any previous 2.0 release. This release fixes a few potential Security vulnerabilites.
标签: recommended the previous current
上传时间: 2016-04-14
上传用户:hullow
The core of Java(TM) technology, the Java virtual machine is an abstract computing machine that enables the Java(TM) platform to host applications on any computer or operating system without rewriting or recompiling. Anyone interested in designing a language or writing a compiler for the Java virtual machine must have an in-depth understanding of its binary class format and instruction set. If you are programming with the Java programming language, knowledge of the Java virtual machine will give you valuable insight into the Java platform s Security capabilities and cross-platform portability. It will increase your understanding of the Java programming language, enabling you to improve the Security and performance of your programs.
标签: machine Java technology computing
上传时间: 2016-05-03
上传用户:zhenyushaw
WindPE for Borland Delphi 7.0: {*******************************************************} { } { WindPE for Borland Delphi 7.0 } { } { Code:WindRand http://www.pefine.com } { } { Copyright (c) 2007 Pefine Security Lab } {*******************************************************}
上传时间: 2016-05-05
上传用户:han_zh
微软DNS服务器远程溢出漏洞测试代码 Microsoft DNS Server Remote Code execution Exploit and analysis Advisory: http://www.microsoft.com/technet/Security/advisory/935964.mspx This remote exploit works against port 445 (also Microsoft RPC api used) * Mario Ballano ( mballano~gmail.com ) * Andres Tarasco ( atarasco~gmail.com )
标签: DNS Microsoft execution Advisory
上传时间: 2013-12-25
上传用户:caixiaoxu26
本目录下存放了演示web应用安全技术的例程序,具体用法如下: 1.attack目录是演示JSP安全性漏洞及对策的web应用程序,可以直接部署到应用服务器并运行。 2.Security目录下存放演示保护web资源的例程序,tomcat子目录下存放可以在tomcat下运行的web应用程序(Security目录)及在 tomcat下配置安全域的配置文件样例(配置文件目录), weblogic子目录存放可以在weblogic下运行的web应用程序。
上传时间: 2014-01-17
上传用户:lyy1234
As information technology is more and more in-depth and wide range of applications, management information system has been gradually implemented in the technical maturity. Management Information System is a continuous development of new disciplines. Library Management System is a typical management information system (MIS), the development includes the background of the establishment and maintenance of database and front-end application development aspects. Database requested data consistency, integrity and the Security of the data, and front-end applications require complete functions, such as easy-to-use. After analysis, I chose companies MICROSOFT VISUAL BASIC and Access prospects were as database development tools and background. With the provision of the various object-oriented development tools, in particular the data window convenient and simple objects developed intelligent customer satisfaction systems.
标签: more applications information technology
上传时间: 2013-11-29
上传用户:xymbian
The Rails Cookbook is is packed with the solutions you need to be a proficient developer with Rails, the leading framework for building the new generation of Web 2.0 applications. Recipes range from the basics, like installing Rails and setting up your development environment, to the latest techniques, such as developing RESTful web services. Topics include: . Modeling data with the ActiveRecord library . Setting up views with ActionView and RHTML templates . Building your application s logic into ActionController . Testing and debugging your Rails application . Building responsive web applications using JavaScript and Ajax . Ensuring that your application is Security and performs well . Deploying your application with Mongrel and Apache . Using Capistrano to automate deployment . Using the many Rails plugins Working with graphics
标签: Rails with proficient developer
上传时间: 2013-12-23
上传用户:pkkkkp