搜索资源列表
spring-security-2.0.5.zip
- Spring框架中涉及到安全配置所需要的包,分享一下,Spring\spring-security-2.0.5.zip Spring\spring-security-2.0.5.zip Spring\spring-security-2.0.5.zip
Spring.Security.3.x.Reference
- Spring Security 参考手册,包含很多的参考例子。-Spring Security Reference Manual, contains many examples of reference.
RFID-Security
- Radio Frequency Identification [RFID] systems have become popular for automated identification and supply chain applications. This article describes the technical fundamentals of RFID systems and the associated standards. Specifically, we
RFID-tags-security-and-the-individual
- RFID – An introduction RFID tags, security and the individual-When I lastwrote for CSLR, RFID tagswere but a glimmer in some scientist’s eye. The thought that by 2006 they would be in everyday use [even if we did not know it] was unthinkable.
USB.Disk.Security.V5.0.0.76
- USB disk security for usb disk virus kill removal tool.
designing.security.architecture
- This book is for systems architects who are interested in building security into their applications. The book is designed to be useful to architects in three ways: as an introduction to security architecture, as a handbook on security issues
TMS.Security.System.v2.4.Full.Source.Delphi
- delphi组件,用于与操作系统安全有关的操作,控件中对底层的API函数,作了大量封装。哈哈,用起来就一个字“爽”-delphi components, with the operating system for security-related operations, controls on the bottom of the API function, made a large number of packages. Haha, to use one word on the " Sm
SIP-Protocol-and-Security-Mechanism
- 详细介绍了SIP协议栈的原理与其中的安全加解密机制,对于设计实际的安全语音传输系统有一点的借鉴指导作用-Detailed introduces the principle of SIP protocol stack and encryption security mechanism, to design the actual safety voice transmission systems have a reference guide effect
acegi-security-1.0.4-src
- 非常强大的安全认证框架,具有很好的扩展性。-A very powerful security authentication framework, with very good scalability.
A-Fast-Voltage-Security-Assessment
- A Fast Voltage Security Assessment Method Using Adaptive Bounding
applicationContext-security
- spring security 用户数据库 配置-spring security configuration user database
Sensor-Network-Security-A-Survey
- 本文是一篇关于传感器网络安全的综述,详细地从各个层介绍了它的研究情况。-Wireless sensor networks(WSNs) use small nodes with constrained capabilities to sense,collect,and disseminate information in many types of applications.As sensor networks become wide-spread,security issues become
Spring.Security.3
- Spring Security 3 电子书英文清晰版 详细介绍了web app中如何一步步加入 spring security 框架支持,配置灵活,功能强大。-Overview of Spring Security 3: 1)Make your web applications impenetrable. 2)Implement authentication and authorization of users. 3)Integrate Spring Security 3 wit
Multi-level-MANET-Routing-Security-Analysis-and-Si
- 移动自组网多安全等级路由策略的分析与仿真Multi-level MANET Routing Security Analysis and Simulation-Multi-level MANET Routing Security Analysis and Simulation
Security-Radio-Networks
- Security in Cognitive Radio Networks -Security in Cognitive Radio Networks
1-Security-Issues-in-Wireless-Sensor-Networks---I
- Wireless sensor network in security
WebDemo_spring-security
- 初学spring security权限管理时自己跑通的源码,使用了oracle作为数据库.工程架构是ibatis+spring+struts-Beginners spring security through rights management to run their own source code when using the oracle as the database. Engineering framework is ibatis+ spring+ struts
Five-Essential-Elements-of-WiMAX-Security
- Five Essential Elements of WiMAX Security
88.On-line-java-compiler-with-security-editor
- this is a compiler for java with security code
Cyber-Security-and-Power-System
- 在智能电网方面的论文 智能电网的网络安全方面的 希望对大家有帮助-The introduction of “smart grid” solutions imposes that cyber security and power system communication systems must be dealt with extensively. These parts together are essential for proper electricity transmissio