您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. The Craft of System Security

  2. The Craft of System Security by Sean Smith; John Marchesini List of Figures 1.1 An access control matrix 7 1.2 Security and state spaces 10 2.1 Example clearance order 26 2.2 Example categories order 27 2.3 Example MLS lattice 28 2.4 The *-Property
  3. 所属分类:Javascript

    • 发布日期:2009-05-22
    • 文件大小:5mb
    • 提供者:awubc2008
  1. X.690-ASN.1 encoding rules; Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) 和 Distinguished

  2. ASN.1的正式标准文档和它的编码规则由 International Telecommunications Union Telecommunications Sector (ITU-T)和International Standards Organization (ISO) / International Electrotechnical Commission (IEC)发布。
  3. 所属分类:其它

    • 发布日期:2009-05-27
    • 文件大小:512kb
    • 提供者:qianchsh
  1. ASN.1 BER DER编码子集入门指南

  2. (Abstract Syntax Notation One)/BER (Basic Encoding Rules)/DER(Distinguished Encoding Rules)的入门指南。本文的主要目的是提供 充分的背景细节资料,以便于让读者更好地理解和实现PKCS系列标准。
  3. 所属分类:专业指导

    • 发布日期:2009-06-01
    • 文件大小:465kb
    • 提供者:zhxhgod
  1. ASN.1 BER DER编码子集入门指南.doc

  2. (Abstract Syntax Notation One)/BER (Basic Encoding Rules)/DER(Distinguished Encoding Rules)的入门指南。本文的主要目的是提供 充分的背景细节资料,以便于让读者更好地理解和实现PKCS系列标准。
  3. 所属分类:专业指导

    • 发布日期:2009-06-01
    • 文件大小:44kb
    • 提供者:zhxhgod
  1. Model Checking-Edmund M. Clarke-模型检查PDF

  2. Model checking is a technique for verifying finite state concurrent systems such as sequential circuit designs and communication protocols. It has a number of advantages over traditional approaches that are based on simulation, testing, and deductiv
  3. 所属分类:其它

    • 发布日期:2009-06-23
    • 文件大小:10mb
    • 提供者:orzorz
  1. h.264视频编解码源代码.rar

  2. h.264视频编解码源代码.rar 详细说明:h.264标准代码,用于视频编码!可以实现各种视频的编码和解码,可以在这个代码的基础上进行各种开发,比如算法的优化,转码技术,实现各种分辨了的转码-h.264 standard code, uses in the video frequency code! May realize each kind of video frequency code and the decoding, may carry on each kind of develop
  3. 所属分类:C

    • 发布日期:2009-06-30
    • 文件大小:1mb
    • 提供者:zfuwen
  1. QCon全球开发大会精品主题--eBay Distinguished Architect-Best Practices for Scaling Websites

  2. QCon大会架构专场里,来自ebay的架构实践分享无疑是最耀眼的,eBay市场架构组的杰出架构师Randy Shoup提到了构建大型高容量系统的原则和实践,集中阐述了实现可扩展性的5个架构原则。
  3. 所属分类:Web开发

    • 发布日期:2009-07-03
    • 文件大小:603kb
    • 提供者:zwggwz00
  1. C++ FAQs

  2. C++ FAQs Part I. Preliminaries Chapter 1. Introduction FAQ 1.01 What is the purpose of this chapter? FAQ 1.02 What are C++ FAQs? FAQ 1.03 Who is the target audience for this book ? FAQ 1.04 Is this a book about C++ per se? FAQ 1.05 Why do deve
  3. 所属分类:C++

    • 发布日期:2007-09-15
    • 文件大小:896kb
    • 提供者:lovewhzlq
  1. Proxy Pattern Informatization Research Based On SaaS

  2. Abstract—Based on demands in proxy pattern, this article proposes informatization solution of proxy pattern which includes enterprise management, proxy management, franchisee management and supply chain management, then discusses basic functions, sy
  3. 所属分类:Proxy

    • 发布日期:2009-07-18
    • 文件大小:32kb
    • 提供者:wangqingjie1234
  1. spring-ldap-1.3.0.RC1.jar

  2. Spring-LDAP是一个java简单应用在LDAP开发的一个库,是采取类似Spring JDBC中的JdbcTemplate的原理建立的。它使得我们完全没必要考虑LdapContext的生成和关闭以及NamingEnumeration的循环。在Spring's DataAccessException基础上建立的Spring-LDAP提供一个更加全面且不用检查的异常处理机制。作为补充,Spring-LDAP也有了动态建立LDAP filters和DNs(Distinguished Names
  3. 所属分类:Java

    • 发布日期:2009-07-25
    • 文件大小:225kb
    • 提供者:xjhzjut
  1. 十天背一万单词,通过朗诵背单词

  2. 朗诵背单词,要功夫才行啊 Lesson 8 The weather in early December was bleak and unpleasant. The electric inspector was castigated for having failed to check the wire as he was supposed to. We should overcome the worst that the tyrant’s enmity can do. In any case,
  3. 所属分类:专业指导

    • 发布日期:2009-07-28
    • 文件大小:90kb
    • 提供者:iamwhz
  1. use_case_driven_object_modeling_with_uml_theory_and_practice.pdf

  2. 用例驱动开发的实践性很强的书,英文版。 Doug Rosenberg and Matt Stephens Use Case Driven Object Modeling with UML Theory and Practice The difference between “theory” and “practice” is that in theory there is no difference between theory and practice, but in practice, t
  3. 所属分类:Python

    • 发布日期:2009-07-31
    • 文件大小:11mb
    • 提供者:no_word
  1. Rapid Object Detection using a Boosted Cascade of Simple Features

  2. This paper describes a machine learning approach for visual object detection which is capable of processing images extremely rapidly and achieving high detection rates. This work is distinguished by three key contributions.
  3. 所属分类:专业指导

    • 发布日期:2009-09-16
    • 文件大小:194kb
    • 提供者:puppy_dog
  1. The Claremont Database Research

  2. In late May, 2008, a group of database researchers, architects, users and pundits met at the Claremont Resort in Berkeley, California to discuss the state of the research field and its impacts on practice. This was the seventh meeting of this sort i
  3. 所属分类:iOS

    • 发布日期:2009-10-13
    • 文件大小:240kb
    • 提供者:zlmiqff
  1. Linux下图形界面mp3播放器的实现

  2. 摘要:Linux作为自由和开源软件领域中最出色的例子,人们更多地了解其在服务器方面的应用。不过,由于Linux具有可移植度高、自由、免费等特性,最近几年,它在移动设备和个人电脑领域的应用也越来越广泛。鉴于以上应用领域对用户界面友好性方面的要求,几乎所有的此类应用都是采用图形用户界面。基于GTK的GNOME,是Linux领域中最主要的桌面环境。而GTK本身,则是创造图形用户界面的最流行的跨平台GUI工具箱之一。这里将通过一个使用GTK和GStreamer技术的简单mp3播放器的实现,详细描述Li
  3. 所属分类:Linux

    • 发布日期:2010-03-07
    • 文件大小:407kb
    • 提供者:noah1987
  1. Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More

  2. Overview The Insider's Guide to Building Breakthrough Services with Today's New Web Services PlatformUsing today's new Web services platform, you can build services that are secure, reliable, efficient at handling transactions, and well suited to yo
  3. 所属分类:Web开发

    • 发布日期:2010-05-25
    • 文件大小:6mb
    • 提供者:yizhizouxiaqu
  1. [生物数据挖掘].Biological.Data.Mining.pdf

  2. Modern biology has become an information science. Since the invention of a DNA sequencing method by Sanger in the late seventies, public repositories of genomic sequences have been growing exponentially, doubling in size every 16 months—a rate often
  3. 所属分类:硬件开发

    • 发布日期:2010-06-18
    • 文件大小:5mb
    • 提供者:applephoon
  1. LAN Switch Security - What Hackers Know About Your Switches

  2. LAN Switch Security: What Hackers Know About Your Switches A practical guide to hardening Layer 2 devices and stopping campus network attacks Eric Vyncke Christopher Paggen, CCIE® No. 2659 Contrary to popular belief, Ethernet switches are not inhere
  3. 所属分类:Access

    • 发布日期:2010-10-09
    • 文件大小:3mb
    • 提供者:lean6688
  1. 微软活动目录管理管理简明手册

  2. 在基于Windows 2000网络中,活动目录(Active Directory)是它的核心。活动目录是一个分布式的目录服务。网络信息可以分散在多台不同的计算机上,保证快速访问和容错;同时不管用户从何处访问或信息处在何处,对用户都提供统一的视图。可以这样说:没有活动目录,就没有Windows 2000。7 E9 e* I* K; J 8 F# j3 ^7 j$ j一、活动目录基础 6 z) K" V O6 _, k$ m$ F0 D(一)活动目录概览( X# G1 c6 B+ z* g$ f9
  3. 所属分类:C

    • 发布日期:2010-12-08
    • 文件大小:1mb
    • 提供者:shangzhenhui
  1. RFC 2253 UTF-8 String Representation of Distinguished Names(中文版)

  2. RFC 2253 UTF-8 String Representation of Distinguished Names(中文版)
  3. 所属分类:Java

    • 发布日期:2009-01-06
    • 文件大小:296kb
    • 提供者:vincent326
« 12 3 4 5 »