切换至中文 Over 1 million code package, 10 million code file free download
  • [Visual C++ (VC++)] UserFun.zip ... in Windows NT and 2000. In this 2nd article we will start programming with security identifiers, access control lists and security descriptors. We will solve trivial problems using the SID, obtain information from an access token, enable a ...
    Category: Windows Develop Upload User:ibmpower Size:212K
  • [Visual C++ (VC++)] boost.zip ... in Windows NT and 2000. In this 2nd article we will start programming with security identifiers, access control lists and security descriptors. We will solve trivial problems using the SID, obtain information from an access token, enable a ...
    Category: Windows Develop Upload User:ktdz1688 Size:759K
  • [Visual C++ (VC++)] driveprotection.Rar our data, document basically stored on the hard drive, and hard disk security will be the main focus of concern, the program will address the safety drive for appropriate action
    Category: Network Security Upload User:xunhui Size:448K
  • [Visual C++ (VC++)] winmd5v2.05.rar name is the MD5 Message-Digest Algorithm 5, in the early 1990s by the MIT Laboratory of Computer Science and RSA Data Security Inc. invention, MD2, MD3 MD4 and developed from
    Category: Button control Upload User:gjcm088 Size:34K
  • [PDF] LinuxBible.zip ... * Ideal for users planning the transition to Linux who want to sample different distributions to see which one best meets their needs* Includes sections on practical uses for Linux, multimedia apps, instant messaging, BT, and improved security techniques
    Category: Other eBooks Upload User:qrkjorg Size:9027K
  • [PDF] SAPB12005B_documents.zip SAP Business One Documentation. Includes Installation Manual, System Guide, Security Guide and others.
    Category: E-Books Upload User:apsled Size:3179K
  • [Java/JSP] basedondataminingtec Intrusion Detection Technology network security has become a hot topic. This paper introduces the intrusion detection and the application of the classification in Intrusion Detection Data Mining Methods and expounded on the data mining technology based ...
    Category: Network Security Upload User:jx2008jx11 Size:7K
  • [Java/JSP] reading notes.rar what one has learned of studying JSP,Servlet,XML,RMI,JAF,JAF,EJB,Security,JDBC,JTA/JTS,JCA,JMS,JNDI,Application Server
    Category: Java Develop Upload User:osakacity Size:149K
  • [Visual C++ (VC++)] 2003112609491317642.zip ... a application that monitors and displays a variety of security-related activity taking place on a system. Tokenmon gets ... process executes, in an object called a token. The security Tokenmon monitors activity includes the following : Logon/logoff Enabling ...
    Category: Windows Develop Upload User:l_service Size:170K
  • [Delphi] yol.v1.3.rar ... prohibit downloading software features such as Internet Explorer toolbar to restore the link titles boot resume dialog internet security Options button pages removed from the definition of classification review of the IE code changes ahead of time to ...
    Category: Network Security Upload User:taiyanghuo Size:557K