搜索资源列表
Cisco.Press.Network.Security.Fundamentals.Sep.2004
- This a book about network security and SNMP .-This a book about network security and SN MP.
security
- 使用Xfire对WS-*一系列规范支持所做的WS-Security例子
firewall
- 专业味十足的一款防火墙软件,用VB语言开发,保护你的计算机安全。可以限定规则,适合监视应用程序及网络端口的功能。-The full flavor of a professional firewall using VB language development, the protection of your computer security. Can define the rules for application and network monitoring functions of the
seclib-1.0.0
- 一个用于网络安全方面的SSL,TLS库.可以用来做FTPS, WEB Server等等d-One for the network security aspects of SSL, TLS library. Can be used to do FTPS, WEB Server, etc. d
FirewallDemo
- VC++编写的防火墙程序可根据系统管理者设定的安全规则(Security Rules)把守网络,提供强大的访问控制、应用选通、信息过滤等功能。-VC++ Firewall program can be prepared in accordance with the system administrator of the safety rules set (Security Rules) guarding the network, provide a strong access control,
tinyproxy-1.4.0pre2.tar
- tinyproxy is a small, efficient HTTP proxy daemon. tinyproxy is very useful in a small network setting, where a larger proxy like Squid would either be too resource intensive, or a security risk. One of the key features of tinyproxy is the
acegi-sample
- 安全框架 Acegi 的主要功能示例Project-Acegi security framework of the main functions of sample Project
securityp2p
- ppt for security in peer to peer network
PortScanner
- VB快速端口扫描器的源代码,能快速扫描计算机或局域网中所有存在安全隐患的端口。程序中附带特洛伊和后门程序信息的数据库,主要特色是扫描速度快,扫描32,000个端口仅仅需要一分钟不到。你可以更新数据库中的特洛伊和后门程序信息以便进行比对和查找可疑打开的端口。程序代码还有一些比较好的IP转换为域名以及互相转换的函数,对VB网络编程的朋友有一定参考价值。-Fast port scanner VB source code, can quickly scan your computer or local
jsjwllw
- 计算机网络安全分析与防范策略论文 本文,将综合概括一些过去、现有的网络和系统漏洞,就几种常见的和最新出现的漏洞及其特征进行详细的说明,并就此进一步展开对这些漏洞的防范措施的具体介绍,使大家认识并了解这些漏洞的危害,从而更好的保护自己的计算机。通过对计算机网络面临威胁的分析,该文提出了网络安全方面的一些具体防范措施,提高了计算机网络的安全性。-Computer network security analysis and prevention strategy papers in this ar
research_of_security_and_authentication_protocol_f
- 文章提出了一种在P2P网络中安全分发密钥和进行对等点身份认证的方法。这种方法采用的认证协议同时结合了公钥加密和密钥加密技术。我们还通过一种认证测试的方法证明了该方法使用的安全认证协议的正确性。-This paper presents a P2P network in the distribution of key security and authentication of the peer approach. This method of authentication protocol use
802.11Security
- O Reilly出版的有关802.11无线网络安全方面的权威著作,是研究无线网络安全技术人员重要的参考书籍-Reilly published on 802.11 wireless network security authority of the book is to study the wireless network security and technical personnel an important reference book
Information-Security
- 密码学部分 数据库,操作系统安全部分 网络安全部分-Cryptography, part of the database, operating system, part of the security part of the network security
Network_Performance_Monitoring_and_Traffic_Statist
- 网络性能监控与流量统计系统,做网络安全的初学者的至宝。-Network performance monitoring and traffic statistical systems, do the treasure of network security for beginners.
Sensor-Network-Security-A-Survey
- 本文是一篇关于传感器网络安全的综述,详细地从各个层介绍了它的研究情况。-Wireless sensor networks(WSNs) use small nodes with constrained capabilities to sense,collect,and disseminate information in many types of applications.As sensor networks become wide-spread,security issues become
1-Security-Issues-in-Wireless-Sensor-Networks---I
- Wireless sensor network in security
WebDemo_spring-security
- 初学spring security权限管理时自己跑通的源码,使用了oracle作为数据库.工程架构是ibatis+spring+struts-Beginners spring security through rights management to run their own source code when using the oracle as the database. Engineering framework is ibatis+ spring+ struts
Five-Essential-Elements-of-WiMAX-Security
- Five Essential Elements of WiMAX Security
Cyber-Security-and-Power-System
- 在智能电网方面的论文 智能电网的网络安全方面的 希望对大家有帮助-The introduction of “smart grid” solutions imposes that cyber security and power system communication systems must be dealt with extensively. These parts together are essential for proper electricity transmissio
4. Information Forensics & Security
- Base Papers for Network Security