亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

ACEGI-security

  • The Rails Cookbook is is packed with the solutions you need to be a proficient developer with Rails,

    The Rails Cookbook is is packed with the solutions you need to be a proficient developer with Rails, the leading framework for building the new generation of Web 2.0 applications. Recipes range from the basics, like installing Rails and setting up your development environment, to the latest techniques, such as developing RESTful web services. Topics include: . Modeling data with the ActiveRecord library . Setting up views with ActionView and RHTML templates . Building your application s logic into ActionController . Testing and debugging your Rails application . Building responsive web applications using JavaScript and Ajax . Ensuring that your application is security and performs well . Deploying your application with Mongrel and Apache . Using Capistrano to automate deployment . Using the many Rails plugins Working with graphics

    標簽: Rails with proficient developer

    上傳時間: 2013-12-23

    上傳用戶:pkkkkp

  • Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the rela

    Host Identity Protocol on Linux is an implemetation of the Host Identity Protocol (HIP) and the related architecture. HIP is a proposal to change the TCP/IP stack to securely support mobility and multi-homing. Additionally, it provides for enhanced security and privacy and advanced network concepts, such as moving networks and mobile ad hoc networks. HIP is "cool", which means that as a mobile VPN solution, when your network interfaces go up or down, there is no need to re-establish a secure tunnel.

    標簽: Identity Protocol Host implemetation

    上傳時間: 2016-09-01

    上傳用戶:皇族傳媒

  • Linux Bible: 介紹包括 Fedora, KNOPPIX, Debian, SUSE, Ubuntu , 及其他 7 種 Linux * Ideal for users planning

    Linux Bible: 介紹包括 Fedora, KNOPPIX, Debian, SUSE, Ubuntu , 及其他 7 種 Linux * Ideal for users planning the transition to Linux who want to sample different distributions to see which one best meets their needs * Includes sections on practical uses for Linux, multimedia apps, instant messaging, BT, and improved security techniques

    標簽: Linux planning KNOPPIX Fedora

    上傳時間: 2016-09-24

    上傳用戶:壞壞的華仔

  • IEEE 802.11i-2004 Amendment to IEEE Std 802.11, 1999 Edition (Reaff 2003). IEEE Standard for Informa

    IEEE 802.11i-2004 Amendment to IEEE Std 802.11, 1999 Edition (Reaff 2003). IEEE Standard for Information technology--Telecommunications and information exchange between system--Local and metropolitan area networks?Specific requirements--Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications--Amendment 6: Medium Access Control (MAC) Security Enhancements

    標簽: IEEE 802.11 Amendment Standard

    上傳時間: 2013-12-21

    上傳用戶:ywqaxiwang

  • 版本更新了一下

    版本更新了一下,到5.84了,需要用VS.net平臺進行編譯運行,介紹與原來的一樣! 磁盤文件的安全刪除,我們通常所執行的刪除操作并不是真正的刪除只是清除了文件的fat表內容,文件數據還在磁盤上,可以恢復,所以不安全。-disk deletion of the security document, we usually enforced by the delete operation does not really delete the file will simply remove the fat table of contents, document data on the disk is, can be restored, therefore unsafe.

    標簽: 版本 更新

    上傳時間: 2016-11-05

    上傳用戶:大三三

  • 淺談VB.NET的密碼算法及其在信息安全中的應用 Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Inf

    淺談VB.NET的密碼算法及其在信息安全中的應用 Simple Discussion on Cryptology Arithmetric of VB.NET and Its Usage in Information Secuirity ,介紹了Microsoft的最新開發工具Visual Basic 2005(簡稱VB.NET)中與密碼算法相關的System.Security.Cryptography命名空間(簡稱SSC).舉例說明了利用SSC提供的類編寫信息安全程序的方法,其中包括對稱加密、非對稱加密和數字簽名算法的編程.

    標簽: Arithmetric Discussion Cryptology NET

    上傳時間: 2013-12-31

    上傳用戶:小寶愛考拉

  • MySQL claims to be the world s most popular open source database, and with good reason. It is free

    MySQL claims to be the world s most popular open source database, and with good reason. It is free, runs on a wide variety of platforms, is relatively simple, easy to configure and performs well even under significant load. By comparison to some other popular database management systems, configuring it is quite simple, but there are still a sufficiently wide variety of security-relevant configuration issues to make securing it a challenge.

    標簽: database popular claims source

    上傳時間: 2016-12-13

    上傳用戶:王者A

  • rhce linux learning guide 1.01 Basic Linux Knowledge 1.02 Linux Filesystem Hierarchy and Structur

    rhce linux learning guide 1.01 Basic Linux Knowledge 1.02 Linux Filesystem Hierarchy and Structure 1.03 Basic Commands 1.04 Printing 1.05 The Linux/Unix Shell 1.06 Basic Security 1.07 Linux/Unix System Administration 1.08 Basic TCP/IP Networking 1.09 Standard Network Services 1.10 Basic Network Security

    標簽: Linux Filesystem Knowledge Hierarchy

    上傳時間: 2014-12-06

    上傳用戶:stewart·

  • Fully revised to cover the latest standards and technologies, XML and Java(TM), Second Edition provi

    Fully revised to cover the latest standards and technologies, XML and Java(TM), Second Edition provides the practical solutions developers need to design powerful and portable Web-based applications. Featuring step-by-step examples, this book focuses on harnessing the power of Java(TM) and XML together to streamline the development process. XML and Java(TM), Second Edition provides new coverage of emerging areas such as document management, databases, messaging, servlets, JDBC, data binding, security, and more. It begins with an overview of XML programming techniques, standard APIs, and tools. Building upon this foundation, the book goes on to cover the latest technologies, including DOM Level 2, SAX2, XSLT, SOAP, WSDL, and UDDI. It explores the role of these major middleware technologies in XML and Java-based Web application development, as well as the limitations and potential pitfalls.

    標簽: technologies and standards Edition

    上傳時間: 2014-01-05

    上傳用戶:hj_18

  • Description The art galleries of the new and very futuristic building of the Center for Balkan Coop

    Description The art galleries of the new and very futuristic building of the Center for Balkan Cooperation have the form of polygons (not necessarily convex). When a big exhibition is organized, watching over all of the pictures is a big security concern. Your task is that for a given gallery to write a program which finds the surface of the area of the floor, from which each point on the walls of the gallery is visible. On the figure 1. a map of a gallery is given in some co-ordinate system. The area wanted is shaded on the figure 2.

    標簽: Description futuristic galleries the

    上傳時間: 2017-02-17

    上傳用戶:1427796291

主站蜘蛛池模板: 泰来县| 望奎县| 北流市| 大庆市| 兖州市| 松潘县| 香格里拉县| 曲阳县| 栖霞市| 临泉县| 罗山县| 平湖市| 娱乐| 江达县| 庐江县| 古蔺县| 增城市| 吴江市| 五家渠市| 楚雄市| 新宾| 西丰县| 古浪县| 邢台市| 广德县| 平乐县| 府谷县| 班戈县| 长顺县| 修武县| 阿拉善右旗| 马公市| 太湖县| 灵寿县| 罗甸县| 曲阳县| 昭苏县| 仙桃市| 泽州县| 大理市| 弥渡县|