-
-
[
Visual C++ (VC++)]
UserFun.zip
... in Windows NT and 2000. In this 2nd article we will start programming with security identifiers, access control lists and security descriptors. We will solve trivial problems using the SID, obtain information from an access token, enable a ...
-
[
Visual C++ (VC++)]
boost.zip
... in Windows NT and 2000. In this 2nd article we will start programming with security identifiers, access control lists and security descriptors. We will solve trivial problems using the SID, obtain information from an access token, enable a ...
-
[
Visual C++ (VC++)]
driveprotection.Rar
our data, document basically stored on the hard drive, and hard disk security will be the main focus of concern, the program will address the safety drive for appropriate action
-
[
Visual C++ (VC++)]
winmd5v2.05.rar
name is the MD5 Message-Digest Algorithm 5, in the early 1990s by the MIT Laboratory of Computer Science and RSA Data Security Inc. invention, MD2, MD3 MD4 and developed from
-
[
PDF]
LinuxBible.zip
... * Ideal for users planning the transition to Linux who want to sample different distributions to see which one best meets their needs* Includes sections on practical uses for Linux, multimedia apps, instant messaging, BT, and improved security techniques
-
[
PDF]
SAPB12005B_documents.zip
SAP Business One Documentation. Includes Installation Manual, System Guide, Security Guide and others.
Category:
E-Books Upload User:
apsled Size:
3179K
-
[
Java/JSP]
basedondataminingtec
Intrusion Detection Technology network security has become a hot topic. This paper introduces the intrusion detection and the application of the classification in Intrusion Detection Data Mining Methods and expounded on the data mining technology based ...
-
[
Java/JSP]
reading notes.rar
what one has learned of studying JSP,Servlet,XML,RMI,JAF,JAF,EJB,Security,JDBC,JTA/JTS,JCA,JMS,JNDI,Application Server
-
[
Visual C++ (VC++)]
2003112609491317642.zip
... a application that monitors and displays a variety of security-related activity taking place on a system. Tokenmon gets ... process executes, in an object called a token. The security Tokenmon monitors activity includes the following : Logon/logoff Enabling ...
-
[
Delphi]
yol.v1.3.rar
... prohibit downloading software features such as Internet Explorer toolbar to restore the link titles boot resume dialog internet security Options button pages removed from the definition of classification review of the IE code changes ahead of time to ...