切换至中文 Over 1 million code package, 10 million code file free download
  • [Windows_Unix] Cisco.Press.Cisco.Network.Design.Solutions.for.Sm ... network with effective design solutions that cover network security, IP telephony, unified communications, wireless networks, and CRM. ... one-size-fits-all approach Create effective and customizable security solutions across the spectrum of SMB types and ...
    Category: Other eBooks Upload User:yxg777 Size:1562K
  • [Java/JSP] DSProjLastver.rar this is project about security gate program by java
    Category: Java Develop Upload User:ufuture Size:3509K
  • [MultiPlatform] flash_player_8_security.zip Adobe Flash Player 8 security specification. Describes security best practices for flash player version 8.
    Category: FlashMX/Flex Upload User:hbhmjc Size:1285K
  • [Windows_Unix] NetworkSecurity.zip About network security in wireless environment
    Category: Other eBooks Upload User:szwc001 Size:4805K
  • [WORD] ArithmetiqueCrypto.rar ... to penetrate several processes. Currently more popular network-level security measures is to use the professional firewall+ intrusion ... (IDS) for the enterprise internal network to build a security barrier. Firewall can effectively block the passage of bad ...
    Category: Firewall-Security Upload User:duanxin Size:14K
  • [Visual C++ (VC++)] netsafty.rar Network Security Software Development Kit Xiangjie detailing WINPCAP use, entry-essential
    Category: Network Security Upload User:wugc2007 Size:14332K
  • [C/C++] Home_alarm.rar Home security is project for made security area
    Category: Project Design Upload User:yanghp22 Size:298K
  • [Visual C++ (VC++)] 2.zip People have difficulty remembering multiple passwords. This results in reduced security as users reuse the same password for different systems or reveal other passwords as they try to log in. It can also lead to reduced privacy, as users may rely on ...
    Category: SCM Upload User:sh_kanglu Size:1191K
  • [Visual C++ (VC++)] 3.zip ... and false rejects because the tolerance region is not guaranteed to be centered on the original click-point, causing usability and security concerns. Using empirical data from a large user study, we show that this is a significant issue in practice. We ...
    Category: software engineering Upload User:kinberly Size:252K
  • [Java/JSP] SunCertifiedEntrepriseArchitectForJ2EEStudyGuide_ ... and n-tier common architectures Legacy connectivity EJB and container models Protocols (HTTP, HTTPS, IIOP, JRMP) Applicability of JEE Design patterns Messaging Internationalization Security Enterprise architecture case study (using UML)
    Category: Java eBooks Upload User:luosstar Size:12010K