Solaris Operating Environment Security
標(biāo)簽: Environment Operating Security Solaris
上傳時(shí)間: 2013-12-25
上傳用戶:xinzhch
example for security of meikuang
標(biāo)簽: security meikuang example for
上傳時(shí)間: 2013-12-14
上傳用戶:xyipie
RFID Security - F. Thornton, B. Haines, A. Das, et al - Syngress - 2006
上傳時(shí)間: 2013-12-13
上傳用戶:love_stanford
自用java開發(fā)包。 包含mail,io,net,sort,security,http,chache等等內(nèi)容。
標(biāo)簽: security chache java http
上傳時(shí)間: 2013-12-14
上傳用戶:tyler
clean all the event log, include Application, Security, System
標(biāo)簽: Application Security include System
上傳時(shí)間: 2016-10-31
上傳用戶:siguazgb
Ubuntu packages of security software。 相當(dāng)不錯(cuò)的源碼,只是文檔不全; 大家仔細(xì)研究一定會(huì)有不菲的收獲!
標(biāo)簽: packages security software Ubuntu
上傳時(shí)間: 2014-01-06
上傳用戶:zhangyi99104144
If you are using Internet Explorer on Windows XP Service Pack 2, there is a security restriction disallowing scripts to run in files opened on your local machine. When you first try to run the examples, you will most likely get a message saying, "To help protect your security, Internet Explorer has restricted this file from showing active content that could access your computer." To see the example, you must click on the message and select "Allow Blocked Content". JavaScript高級(jí)程序設(shè)計(jì) 里面自代源碼
標(biāo)簽: restriction Explorer Internet security
上傳時(shí)間: 2016-11-18
上傳用戶:源弋弋
EMV v4.2 Book2:Security and Key Management
標(biāo)簽: Management Security Book2 EMV
上傳時(shí)間: 2013-12-26
上傳用戶:zhangyigenius
spring+acegi編寫的網(wǎng)上書城,具有很高的技術(shù)研究?jī)r(jià)值。
上傳時(shí)間: 2014-01-02
上傳用戶:lindor
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s
標(biāo)簽: vulnerabilities Introduction discovered undeniably
上傳時(shí)間: 2014-01-05
上傳用戶:yph853211
蟲蟲下載站版權(quán)所有 京ICP備2021023401號(hào)-1