搜索资源列表
SECURITY
- 高等院校计算机应用技术硕士研究生课程,高级计算机网络程序设计实例子代码,SECURE部分.
SecurepeertopeernetworkingtheJXTAexample
- Secure peer to peer networking the JXTA example
com.jcraft.jsch_0.1.31.jar
- Java Secure Shell Channel Library.
严格留言板
- 欢迎使用『冰翎旋彩留言板[JSP2.0稳定版]』 在使用本系统前请确定您的机器中已经构键完成了JSP+JDBC的运行环境! 并且您的机器中安装了MSSQL软件!否则无法使用本流言板! 冰翎旋彩留言板JSP2.0稳定版具有: 1:过滤HTML的特殊字符,让本系统更安全! 2:特有的利用COOKIE的来保护留言本,让其在一分钟内不可以重复发帖!防止了一些人的恶意攻击! 3:优化了页面的模式,让新手更容易的看懂其内容! 4:后台管理采用COOKIE来保护管理员! 安装次序: 1.构键运行环境[详细方法
src
- udp可靠文件传输 有源码 可运行 内部简要注释-udp secure file transfer have the source can be run within a brief comment. . . .
rsaCipher
- In cryptography, RSA (which stands for Rivest, Shamir and Adleman who first publicly described it see below) is an algorithm for public-key cryptography. It is the first algorithm known to be suitable for signing as well as encryption, and one of the
jishiben
- 用Java设计的记事本。主要功能是:稳当的读写、保存、删除、黏贴、复制、查找、插入等功能。-Java design using Notepad. Main function is to: secure read and write, save, delete, paste, copy, find, insert functions.
pr0
- URL programming. This example illustrates using a URL to access resources on a secure site.
200902740040
- 提供文档的存储和管理,全文搜索,基于用户角色的安全访问机制。-Provide document storage and management, full-text search, user-based secure access mechanism for the role.
sha1
- SHA (Secure Hash Algorithm,译作安全散列算法) 是美国国家安全局 (NSA) 设计,美国国家标准与技术研究院 (NIST) 发布的一系列密码散列函数。正式名称为 SHA 的家族第一个成员发布于 1993年。然而现在的人们给它取了一个非正式的名称 SHA-0 以避免与它的后继者混淆。两年之后, SHA-1,第一个 SHA 的后继者发布了。 另外还有四种变体,曾经发布以提升输出的范围和变更一些细微设计: SHA-224, SHA-256, SHA-384 和 SHA-51
j_8745_bay_news
- 1 本程序采用JSP+MYSQL设计构件,快速可靠 2 采用最新防注设计,使您的网站更加安全 3 信息多级分类 4 生成HTML-A process design using JSP+ MYSQL components, fast and reliable anti-Note 2 using the latest design, make your site more secure 3 Category 4 multi-level information to generate HT
InternetBasedPenetrationTesting.tar
- this the document for the secure development in java. It covers in very good details the aspect of security programming in Java-this is the document for the secure development in java. It covers in very good details the aspect of security programming
SecureJavaProgramming.tar
- this the document for the secure development in java. It covers in very good details the aspect of security programming in Java-this is the document for the secure development in java. It covers in very good details the aspect of security programming
sha256.java
- Sha256 Algorithm. The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
jeecms-2.3.2-final
- JEECSM 基于java技术开发,继承其强大、稳定、安全、高效、跨平台等多方面的优点 -JEECSM based on java technology development, inheritance of its strong, stable, secure, efficient, cross-platform and many other advantages of
1
- 在线订餐系统 本系统主要利用Java Web技术,结合Struts实现MVC设计模式,搭建一个安全性以及利用率高的网站平台-To order pizza online system, the system mainly use the Java Web technology to achieve the MVC design pattern with Struts and build a secure Web platform as well as the utilization of high
jeecms-2.4.2-final-src
- JEECMS是JavaEE版网站管理系统(Java Enterprise Edition Content Manage System)的简称。 基于java技术开发,继承其强大、稳定、安全、高效、跨平台等多方面的优点 采用hibernate3+struts2+spring2+freemarker主流技术架构 懂html就能建站,提供最便利、合理的使用方式 强大、灵活的标签,用户自定义显示内容和显示方式-JEECMS is JavaEE version of website
SecurePeerGroup
- jva secure for group by jxta-jva secure for group by jxta
FST
- 综合三种加密算法: 1.AES对称加密算法 2.RSA非对称加密算法 3.MD5消息摘要算法 实现类PGP的文件网络安全传输系统,附带系统运行用例说明书。-Composite of three encryption algorithms: 1.AES symmetric encryption algorithm 2.RSA asymmetric encryption algorithm 3.MD5 PGP message digest algorithm class files
Towards-Secure-and-Dependable-Storage-Services-in
- JAVA PROJECT , Towards Secure and Dependable Storage Services in Cloud Computing Modified.