您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. SOA资料

  2. Maximize the business value and flexibility of your SOA deployment. In Service-Oriented Architecture Compass, IBM experts offer a complete roadmap for maximizing the business value and flexibility of SOA in your environment. Drawing on their unsurpa
  3. 所属分类:Web开发

    • 发布日期:2007-08-03
    • 文件大小:2097152
    • 提供者:calinsun
  1. Securing Ajax Applications

  2. file format:pdf date:July 2007: First Edition. language:en
  3. 所属分类:Web开发

    • 发布日期:2009-06-09
    • 文件大小:2097152
    • 提供者:qishking
  1. Jakarta_Struts_for_Dummies.pdf

  2. Introduction Part I: Getting to Know Jakarta Struts Chapter 1: Starting with the Basics Chapter 2: Laying the Groundwork Chapter 3: Creating a Simple Web Application with Struts Part II: Starting from the Core Chapter 4: Controlling with the Control
  3. 所属分类:Java

    • 发布日期:2009-07-31
    • 文件大小:8388608
    • 提供者:mx_forever
  1. Professional.Microsoft.Search.SharePoint.2007.and.Search.Server.2008

  2. Chapter 1: Introduction to Enterprise Search Chapter 2: Overview of Microsoft Enterprise Search Products Chapter 3: Planning and Deploying an Enterprise Search Solution Chapter 4: Configuring and Administering Search Chapter 5: Searching LOB Systems
  3. 所属分类:Web开发

    • 发布日期:2009-08-31
    • 文件大小:10485760
    • 提供者:tracter_wang
  1. SSL & TLS Essentials. Securing the Web.pdf

  2. http://d.download.csdn.net/down/987659/cheyong007
  3. 所属分类:Web开发

    • 发布日期:2009-09-03
    • 文件大小:1048576
    • 提供者:dyx1024
  1. Hacking Windows® XP

  2. E文版 Part I: Customizing Your System . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 1: Customizing the Look of the Startup . . . . . . . . . . . . . . . . . . . . . . . 3 Chapter 2: Customizing User Navigation . . . . . . . . . . . . . . . .
  3. 所属分类:系统安全

    • 发布日期:2009-09-05
    • 文件大小:10485760
    • 提供者:pandoraliu
  1. apache security 安全

  2. Preface Audience Scope Contents of This Book Online Companion Conventions Used in This Book Using Code Examples We'd Like to Hear from You Safari Enabled Acknowledgments C hapter 1. Apache Security Principles Section 1.1. Security Definitions Sectio
  3. 所属分类:Web开发

    • 发布日期:2009-10-12
    • 文件大小:1048576
    • 提供者:wwfwolf
  1. WinZip Pro v14.0.8652 + KeyGen

  2. WinZip® is the original and most trusted file compression software for Windows. No other compression utility is as easy-to-use or offers the comprehensive feature set and productivity-enhancing approach that has made WinZip the gold standard in file
  3. 所属分类:Flash

    • 发布日期:2009-11-04
    • 文件大小:13631488
    • 提供者:gaojianlong
  1. Seam in Action英文版

  2. Table of Contents Part 1 - Teeing off with Seam 1 Seam unifies java EE 2 Putting seam-gen to work Part 2 – Seam fundamentals 3 The Seam life cycle 4 Components and contexts 5 The Seam component descr iptor 6 Absolute inversion of control Part 3 – Ho
  3. 所属分类:Java

    • 发布日期:2009-11-11
    • 文件大小:4194304
    • 提供者:fujs999
  1. ActiveMQ in Action

  2. Part I Introduction Chapter 1 Understanding message-oriented middleware and JMS Chapter 2 Introduction to Apache ActiveMQ Part II Configuring ActiveMQ Chapter 3 Understanding connectors Chapter 4 Persisting messages Chapter 5 Securing ActiveMQ
  3. 所属分类:Java

    • 发布日期:2009-11-29
    • 文件大小:2097152
    • 提供者:xt32720145
  1. An Introduction to Computer Security: The NIST Handbook

  2. This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls.
  3. 所属分类:专业指导

    • 发布日期:2010-01-04
    • 文件大小:2097152
    • 提供者:carrieyzh
  1. The Database Hacker

  2. The Database Hacker's Handbook: Defending Database Servers 500 pages 有问题,我的QQ:571669275 Table of Contents The Database Hacker's Handbook — Defending Database Servers Preface Introduction Part I - Introduction Chapter 1 - Why Care About Database Secu
  3. 所属分类:其它

    • 发布日期:2010-01-22
    • 文件大小:1048576
    • 提供者:aaf812000
  1. JAVA EE 6 帮助文档

  2. Part I Introduction 1. Overview 2. Using the Tutorial Examples Part II The Web Tier 3. Getting Started with Web Applications 4. JavaServerTM Faces Technology 5. Introduction to Facelets 6. Unified Expression Language 7. Using JavaServerTM Faces Tech
  3. 所属分类:Java

    • 发布日期:2010-01-26
    • 文件大小:5242880
    • 提供者:yhzrobert
  1. openssl编程方法及详解

  2. OpenSSL is a popular and effective open source version of SSL/TLS, the most widely used protocol for secure network communications. The only guide available on the subject, Network Security with OpenSSLdetails the challenges in securing network comm
  3. 所属分类:其它

    • 发布日期:2010-01-28
    • 文件大小:533504
    • 提供者:hch19861216
  1. Security of Mobile Communications

  2. The explosive demand for mobile communications is driving the development of wireless technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving rise to a myriad of security issues at all levels — from subscriber to n
  3. 所属分类:其它

    • 发布日期:2010-02-06
    • 文件大小:5242880
    • 提供者:sunxianbin
  1. NXP SECURE PLATFORM: SECURING THE PRODUCT LIFE CYCLE

  2. NXP SECURE PLATFORM: SECURING THE PRODUCT LIFE CYCLE
  3. 所属分类:系统安全

    • 发布日期:2020-12-10
    • 文件大小:1048576
    • 提供者:embededman
  1. Securing Cognitive Radio Networks against Primary User Emulation Attacks

  2. Securing Cognitive Radio Networks against Primary User Emulation Attacks
  3. 所属分类:其它

    • 发布日期:2021-02-22
    • 文件大小:505856
    • 提供者:weixin_38713061
  1. SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle

  2. SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle
  3. 所属分类:其它

    • 发布日期:2021-02-10
    • 文件大小:339968
    • 提供者:weixin_38729221
  1. Optimal Stopping Theory based Jammer Selection for Securing Cooperative Cognitive Radio Networks

  2. Optimal Stopping Theory based Jammer Selection for Securing Cooperative Cognitive Radio Networks
  3. 所属分类:其它

    • 发布日期:2021-02-08
    • 文件大小:175104
    • 提供者:weixin_38615397
  1. Optimal Stopping Theory based Jammer Selection for Securing Cooperative Cognitive Radio Networks

  2. In this paper, we investigate the problem of jammer selection for securing Cooperative Cognitive Radio Networks (CCRNs) with the Multiple-Input Multiple-Output (MIMO) capability. In the CCRN under our consideration, there exist a pair of Primary User
  3. 所属分类:其它

    • 发布日期:2021-02-07
    • 文件大小:175104
    • 提供者:weixin_38674569
« 1 2 3 4 56 7 8 9 10 ... 20 »