Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, Authentication and key exchange, PKI, random numbers, and anti-tampering.
標簽: Programming developers for important
上傳時間: 2015-09-03
上傳用戶:gundan
Dropbear is an SSH 2 server, designed to be usable in small memory environments. It supports: * Main features of SSH 2 protocol * Implements X11 forwarding, and Authentication-agent forwarding for OpenSSH clients * Compatible with OpenSSH ~/.ssh/authorized_keys public key Authentication
標簽: environments Dropbear designed supports
上傳時間: 2014-01-16
上傳用戶:skhlm
This article describes Atmel’s FingerChip technology for electronic fingerprint sensing that combines the advantages of small size, low cost, high accuracy, zero maintenance, low energy consumption and portability. This technology has applications in a wide range of fixed and portable secured devices including access control systems, cash terminals, public transport, PCs, PDAs, Smart Card readers and motor vehicles. It can be used in almost any situation where rapid, reliable and accurate identification or Authentication of an individual is required.
標簽: fingerprint FingerChip technology electronic
上傳時間: 2013-12-27
上傳用戶:h886166
The Microsoft® Cryptographic Application Programming Interface (CryptoAPI) provides services that enable application developers to add Authentication, encoding, and encryption to their Microsoft Win32® -based applications. Application developers can use the functions in the CryptoAPI without knowing anything about the underlying implementation, in much the same way as they can use a graphics library without knowing anything about the particular graphics hardware configuration.
標簽: Cryptographic Application Programming Microsoft
上傳時間: 2013-12-27
上傳用戶:pinksun9
《為Windows Vista編寫安全的代碼》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - Cryptographic Enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars
上傳時間: 2016-01-07
上傳用戶:zxc23456789
The Shift Log is a database entry and display system that is built off of PHP and MySQL. The log uses a basic user Authentication system to ensure user accountability and log integrity. It also has a RTF editor integrated into it.
上傳時間: 2016-01-15
上傳用戶:s363994250
The public key infrastructure (PKI) is the foundation and center of network security architecture now, can provide security services including confidentiality, Authentication, dig2ital signatures and integrity.
標簽: infrastructure architecture foundation security
上傳時間: 2014-01-23
上傳用戶:pompey
This a linux device driver for Ralink RT2500USB b/g WLAN Card. This driver implements basic 802.11 function. Infrastructure and Ad-hoc mode with open or shared or wpapsk or wpa2psk Authentication method. WEP-40 and WEP-104 or tkip or aes encryption.
標簽: driver This implements Ralink
上傳時間: 2016-03-10
上傳用戶:cc1015285075
hostapd - user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator and RADIUS Authentication server
標簽: IEEE Authenticator and WPA
上傳時間: 2014-01-06
上傳用戶:450976175
The UCL common multimedia library implements a number of algorithms and protocols needed by a number of our applications. It compiles standalone on a range of Unix systems (Solaris, Linux, Irix, FreeBSD, MacOSX) and on Windows 95/98/NT/XP. The following protocols/algorithms are included in the library: Base64 encoding/decoding Binary tree Random number HMAC Authentication MD5 DES RTP MBus SAP
標簽: number algorithms multimedia implements
上傳時間: 2014-11-16
上傳用戶:hoperingcong