搜索资源列表
fangzheng_apabi
- 方正apabi联盟制作[信息系统安全与对抗技术实验教程],PDF电子文档资料!-Founder apabi Union produced [information systems security and technological experiments confrontation Guide] PDF file electronic information!
可信网络连接关键技术研究与实现
- With the accelerate implementation of information and the rapid development of e-commerce and e-government, the network security is of great significance. Now people are more concerned about how to ensure working at a trusted network environment. In
ComSecureDivision
- This file is about the computer security and its interface.
11
- 此文件为我网络安全方面的理论知识,有兴许的朋友可以-This file for my network security aspects of the theory of knowledge, there is perhaps a friend can look at the
12
- 此文件为我网络安全方面的理论知识,有兴许的朋友可以-This file for my network security aspects of the theory of knowledge, there is perhaps a friend can look at the
student
- 理解Linux的文件系统的组织;掌握常用的数据结构;系统采用两级目录,其中第一级对应于用户账号,第二级对应于用户帐号下的文件 使用文件来模拟外存,进行数据结构设计和操作算法的设计,实现一个文件系统并实现基本的文件操作(为了简便文件系统,不考虑文件共享,文件系统安全以及管道文件与设备文件等特殊内容)。 -Understanding of Linux file system organization have commonly used data structure system uses
JENI-J2ME-Bab07-Security
- this file need for setting security in j2me
signaturwithnetworkcoding
- 一篇研究基于网络编码的文件分发系统的安全问题的文章,对于研究网络编码,p2p和安全的人有一定的参考价值-A research is based on network coding file distribution system, the safety of articles for the study of network coding, p2p and security people have a certain reference value
RegRepair
- 註冊表修復工具 一款註冊表修復工具 包括三部分功能 (1):文件擴展名修復 (2):系統安設置修復 (3):ActiveX\COM組件修復 作者:重新做鬼 Fatesy-Registry Repair Tool Registry Repair tools include a three-part feature (1): File Extension Repair (2): System Security Settings Repair (3): ActiveX \ COM
webanquan
- web安全主要包括sql注入、任意文件上传、下载、任意文件读取、写入、xss跨站脚本漏洞等-Web security mainly includes SQL injection, arbitrary file upload, download, arbitrary file read, write, XSS XSS vulnerabilities
yeysy
- XYCMS幼儿园建站系统,前台栏目:幼儿园简介、新闻动态、师资团队、宝贝SHOW、健康驿站、招生简章、潜能开发、在线咨询、联系我们等,后台是对应的功能管理。 请注意:后台的广告管理和安全设置不能用,这两功能需要付费,不过不需要广告功能的用户可忽略此功能,安全设置可通过手动修改数据库链接文件来实现。 -Station system, of XYCMS Kindergarten front part: kindergarten Profile, News, teacher team,
Android-Mobile-security
- 在android平台下用于保存数据有三种方式,1、SQLite 2、SharedPreferences 3、File SharedPreferences是将数据保存在一个xml文件中,并且是以Map的形式保存,一个Key对应一个Value,但获取某一个Key的时候,都会有一个默认值,这个默认值是在xml不存在这个key值的时候使用。 -There are three ways to save data in the android platform, SQLite, SharedPref
TimeCOS_SIMv1.0
- 用于SIM卡开发学习的基本文档,了解卡片文件结构,安全机制等-For the SIM card development learning basic documentation for the card file structure, security mechanisms
File-security-protection-technology
- 随着信息技术的广泛应用,数字文明彻底改变了传统信息存储交流 形式,数字文件大量涌现,数字档案逐渐发展成为档案家族中重要的一 员。数字档案的广泛应用带来了一系列的便利和好处,但其安全维护及 合法使用问题也日益突出。在这一背景下,新兴的数字水印技术日益成 为解决数字档案信息安全的重要有效手段,它能有效地对数字媒体进行 版权保护及内容验证-With the extensive application of information technology, digital civili
LYB-v1.1
- 程序 Dreamweaver CS3 编写 === === 更新如下============= 不悔清爽留言本 1.1 增加留言审核功能! 增加密码修改页面 Admin.asp 直接运行修改密码。为了安全起见,请不要把此文件传到网站目录中。 ================================= 不悔清爽留言本 1.0 请大家使用之前、修改data目录下的数据库名称,改复杂点。。在修改数据库连接文件conn目录下
Password-in-java-file
- 应用程序安全是一个综合性的课题,它需要在权衡各方面的因素之后,再作出安全策略。首先分析了Java平台自身的安全机制,括它的安全策略、认证和授权,之后分析Java应用程序中的一些缺陷和不足,并提出相应的改进方法。-Application security is a comprehensive subject, it needs to weigh the various factors, the re-make security policy. First analysis of the Java
MoblieSafeProduct
- 自己写的 关于安卓手机的 一些安全软件的竞品分析的思维导图。由于PUDN无法选择思维导图各种的文件,就选择了CHM文件,望理解。该文件需要Xmind软件打开,谢谢!-Write your own phone number on the Android security software Competitive Analysis of Mind Mapping. Since PUDN not choose from a variety of documents mind map, chose CH
Audio Processing using Matlab
- Audio processing is the intentional alteration of auditory signals. The major application area of the audio processing is in the field of music. One of the practical examples that demonstrate audio processing is audio mastering processor for audio co
Security-vulnerabilities-in-GSM
- The file presents security vulnerabilities in GSM networks
theis-file
- This pdf file is on Security Issues regarding MANET (Mobile Ad Hoc Networks): Challenges and Solutions.In mobile adhoc network explained. Opnet tool is used as simulation tool.Results are also explained.-This pdf file is on Security Issues regarding