Solaris Operating Environment Security
标签: Environment Operating Security Solaris
上传时间: 2013-12-25
上传用户:xinzhch
example for security of meikuang
标签: security meikuang example for
上传时间: 2013-12-14
上传用户:xyipie
RFID Security - F. Thornton, B. Haines, A. Das, et al - Syngress - 2006
上传时间: 2013-12-13
上传用户:love_stanford
自用java开发包。 包含mail,io,net,sort,security,http,chache等等内容。
上传时间: 2013-12-14
上传用户:tyler
clean all the event log, include Application, Security, System
标签: Application Security include System
上传时间: 2016-10-31
上传用户:siguazgb
Ubuntu packages of security software。 相当不错的源码,只是文档不全; 大家仔细研究一定会有不菲的收获!
标签: packages security software Ubuntu
上传时间: 2014-01-06
上传用户:zhangyi99104144
If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction disallowing scripts to run in files opened on your local machine. When you first try to run the examples, you will most likely get a message saying, "To help protect your security, Internet Explorer has restricted this file from showing active content that could access your computer." To see the example, you must click on the message and select "Allow Blocked Content". JavaScript高级程序设计 里面自代源码
标签: restriction Explorer Internet security
上传时间: 2016-11-18
上传用户:源弋弋
EMV v4.2 Book2:Security and Key Management
标签: Management Security Book2 EMV
上传时间: 2013-12-26
上传用户:zhangyigenius
spring+acegi编写的网上书城,具有很高的技术研究价值。
上传时间: 2014-01-02
上传用户:lindor
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s
标签: vulnerabilities Introduction discovered undeniably
上传时间: 2014-01-05
上传用户:yph853211