联合开发网   搜索   要求与建议
                登陆    注册
排序按匹配   按投票   按下载次数   按上传日期
按分类查找All 系统/网络安全(154) 

[系统/网络安全] Attendance-Time-tracking-System-

Simple Basic Attendance Time Tracking System(简单基本考勤时间跟踪系统)简化了监控学生-员工和讲师签出时间的过程,为企业高效管理考勤提供了简单的解决方案。系统具有以下类型的用户(学生、讲师、员工、主管和安全)。
Simple Basic Attendance Time Tracking System to simplify the process of monitoring students employees and instructors check-in out times, providing a straightforward solution for businesses to manage attendance efficiently. System has the following types of users ( student , instructor , employee , supervisor and security ). (2024-04-04, C#, 0KB, 下载0次)

http://www.pudn.com/Download/item/id/1712184383906456.html

[系统/网络安全] Jimma-Water-Billing-System

GitHub项目旨在彻底改变数据管理,特别是Jimma镇供水和污水服务企业的数据管理。通过精心设计和开发,我们构建了一个具有直观图形界面的系统数据库,提高了效率和安全性。
This GitHub project aims to revolutionize data management, particularly for Jimma Town Water Supply and Sewerage Service Enterprise. Through meticulous design and development, we ve crafted a systematic database with an intuitive graphical interface, enhancing efficiency and security. (2024-03-25, Java, 0KB, 下载0次)

http://www.pudn.com/Download/item/id/1711309991319572.html

[系统/网络安全] codeitishant

我的旅程始于平面设计,创作海报和传单,并通过在线资源逐渐扩展到网站设计和编码。为企业制作定制设计激发了我对网络安全的兴趣,导致了对黑客攻击和数字资产保护的强烈热情。
My journey began in graphic design, creating posters and flyers, and gradually expanded to website design and coding through online resources. Crafting custom designs for businesses piqued my interest in cybersecurity, leading to a strong passion for hacking and digital asset protection. (2024-03-15, HTML, 0KB, 下载0次)

http://www.pudn.com/Download/item/id/1710474173543286.html

[系统/网络安全] hyperpay_ruby

HyperPay是一个强大的支付网关,改变了中东和北非地区的在线购买体验。HyperPay使互联网企业能够更灵活、安全和轻松地接受和管理在线支付。HyperPay自2014年以来一直在处理在线支付。
HyperPay is a powerful payment gateway, transforming the online buying experience in the MENA region. HyperPay enable internet businesses to accept and manage payments online, with more flexibility, security and ease. HyperPay have been processing online payments since 2014. (2024-03-07, Ruby, 0KB, 下载0次)

http://www.pudn.com/Download/item/id/1709764967200124.html

[系统/网络安全] KaliEnvSetup

KaliEnvSetup是一个专业的创新或dise ado特别是自动化配置工具,是Kali Linux中的企业,是一个职业爱好者和数字爱好者的dirigido en el campo de la forense digital y el hackingético。
KaliEnvSetup es un proyecto innovador dise ado específicamente para automatizar la configuración de entornos en Kali Linux, dirigido a profesionales y aficionados en el campo de la forense digital y el hacking ético. (2024-03-05, Shell, 0KB, 下载0次)

http://www.pudn.com/Download/item/id/1709575421682960.html

[系统/网络安全] OpenAgent

OpenAgent集成了IAST、RASP、SCA、软补丁等各种类型的Java Agent产品,以满足企业在DevSecOps过程中的需求,只需要配置一个Java Agent,就可以实现测试环境、生产环境、应急响应等场景,全方位的安全和服务。
OpenAgent integrates various types of Java Agent products such as IAST, RASP, SCA, soft patches, etc., to meet the needs of enterprises in the DevSecOps process, only need to configure a Java Agent, can realize the test environment, production environment, emergency response and other scenarios, all-round Security and service. (2023-12-25, Java, 0KB, 下载0次)

http://www.pudn.com/Download/item/id/1703491267939451.html

[系统/网络安全] renren-security

采用Spring、MyBatis、Shiro框架,开发的一套权限系统,极低门槛,拿来即用。设计之初,就非常注重安全性,为企业系统保驾护航,让一切都变得如此简单。【QQ群:324780204、145799952】,
Using Spring, MyBatis and Shiro frameworks, we have developed a set of permission system with extremely low threshold and ready to use. At the beginning of the design, we paid great attention to security to protect the enterprise system and make everything so simple. [QQ group: 324780204, 145799952], (2023-04-17, Java, 0KB, 下载0次)

http://www.pudn.com/Download/item/id/1695745139473895.html

[系统/网络安全] 95185243

采用Log-BP算法的LDPC码译码仿真程序,给出了不同信噪比下误码率和误包率的统计图,用matlab和Cc-mex程
A simulation program for decoding LDPC codes based on Log-BP algorithm is presented. The statistical diagrams of bit error rate and packet error rate under different signal to noise ratios are given. The matlab and Cc-mex paths are used to calculate the bit error rate and packet error rate. (2019-03-28, MultiPlatform, 84KB, 下载3次)

http://www.pudn.com/Download/item/id/1553776611941782.html

[系统/网络安全] assigt

1请推导出单径瑞利信道中的BPSK相干解调的理论误码率性能,并画出比特信噪比与误码率的关系曲线, 2在单径瑞利信道中
1. The theoretical bit error rate (BER) performance of BPSK coherent demodulation in single-path Rayleigh channel is derived, and the relationship between bit-to-noise ratio and bit error rate (BER) is drawn. (2) in single-path Rayleigh channel, the relationship between BER and BER is drawn. (2019-03-26, Others, 49KB, 下载0次)

http://www.pudn.com/Download/item/id/1553548692100024.html

[系统/网络安全] digital-signature

本文通过通俗易懂的讲解,让您就像读小说一般,轻轻松松就能理解数字签名的基本原理和应用方法(即使您是一个并不精通计算机的企业老总,也能读懂本篇文章)。然后我们再逐步深入技术细节,最后将给出一个在B/S信息系统中使用数字签名的DEMO。
In this paper, you can understand the basic principles and application methods of digital signature easily and easily through simple and easy explanation. You can read this article even if you are a master of computers who are not proficient in computers. Then we step into the technical details and finally give a DEMO that uses digital signatures in the B/S information system. (2018-03-16, WINDOWS, 415KB, 下载1次)

http://www.pudn.com/Download/item/id/1521169757753271.html

[系统/网络安全] 黑防灰鸽子12.30脱壳免杀版.exe

灰鸽子远程控制软件,又叫灰鸽子( Huigezi)。功能十分强大,远程桌面、摄像头、麦克风、文件操作、网页访问记录、文件操作记录、移动硬盘监控等,主要针对企业防机密外泄。
Gray dove remote control software, also called Gray dove (Huigezi). Function is very powerful, remote desktop, camera, microphone, file operation, web access records, file operation records, mobile hard disk monitoring, etc., mainly for enterprise confidential leakage. (2017-11-06, WINDOWS, 3237KB, 下载18次)

http://www.pudn.com/Download/item/id/1509935324430972.html

[系统/网络安全] RegEdit

《小小黑客之路》第六章 信注册表,没有不可能RegEdit为本章案例对应的解决方案 RegEdit.sln为解决方案文件,使用Visual Studio 2008打开 Release文件夹下的RegEdit.exe为案例对应可执行文件 案例为注册表编辑器,可以用于枚举、查找、删除、编辑各注册表键。
The sixth chapter of the letter of the registry of the " little hackers of the road, there is nothing impossible RegEdit this chapter cases corresponding solutions RegEdit.sln solution file using Visual Studio 2008 to open Release folder under RegEdit.exe for the case corresponding executable file Case Registry Editor can be used to enumerate, search, delete, edit each registry key. (2012-11-13, Visual C++, 530KB, 下载7次)

http://www.pudn.com/Download/item/id/2045788.html

[系统/网络安全] acs4.0-build-24

Cisco Secure ACS 4.0 CISCO SECURE ACCESS CONTROL SERVER 4.0 FOR WINDOWS 思科® 安全访问控制服务器为思科智能信息网络提供基于身份的全面的访问控制解决方案。它是用于管理企业网络用户、管理员和网络基础设施资源的集成和控制层。 Cisco® Secure ACS (ACS)是具高可扩展性的高性能访问控制服务器,可作为集中的RADIUS 和 TACACS+ 服务器运行。Cisco Secure ACS将验证、用户访问和管理员访问与策略控制结合在一个集中的身份识别网络解决方案中,因此提高了灵活性、移动性、安全性和用户生产率, 从而进一步增强了访问安全性。它针对所有用户执行统一安全策略,不受用户网络访问方式的影响。它减轻了与扩展用户和网络管理员访问权限相关的管理负担。通过对所有用户帐户使用一个集中数据库,Cisco Secure ACS可集中控制所有的用户权限并将他们分配到网络中的几百甚至几千个接入点。对于记帐服务,Cisco Secure ACS针对网络用户的行为提供具体的报告和监控功能,并记录整个网络上每次的访问连接和设备配置变化。这个特性对于企业遵守Sarbanes Oxley法规尤其重要。Cisco Secure ACS支持广泛的访问连接,包括有线和无线局域网、宽带、内容、存储、IP上的语音(VoIP)、防火墙和VPN等。
Cisco Secure ACS 4.0 CISCO SECURE ACCESS CONTROL SERVER 4.0 FOR WINDOWS Cisco ® Secure Access Control Server for Cisco intelligent information network to provide a comprehensive identity-based access control solutions. It is used to manage enterprise network users, administrators and network infrastructure resources, integration and control layer. Cisco ® Secure ACS (ACS) is a highly scalable, high-performance access control server, as a centralized RADIUS and TACACS+ server is running. Cisco Secure ACS to verify user access and administrator access with policy control in conjunction with a centralized identity networking solutions, and therefore increased the flexibility, mobility, security and user productivity, and thus further enhance the safety of the visit. For all users of its implementation of a unified security policy, from the user mode of network access. Reduced with the expansion of its users and network administrators manage access-related burden. All user a (2009-08-20, C/C++, 43419KB, 下载48次)

http://www.pudn.com/Download/item/id/883780.html

[系统/网络安全] 444

随着中小企业迅速的发展和市场竞争的日益激烈,各类中小企业都越来越认识到经营计划管理的重要性及提升企业自身经营计划管理水平的迫切性。然而,经过分析研究负责经营计划的管理人员在现实工作中经常遇到下面这些问题:1)数据不一致、耗费人力:数据全部散落在文件中,数据多次重复录入,可能产生数据不一致性且耗费人力;2)了解计划变化难:计划多由项目总负责人等掌握,其它人想要了解计划的变化很困难;3)各方面协调困难:大家没有在同一平台上工作,各部门、人员相互间协调困难;4)工作效率不高:工作中各个环节相互衔接不够紧凑,导致工作效率不够高。
As mid-size and small companies develop rapidly and the competitions among them become more and more intense, mid-size and small companies recognize the importance of the planning management and the driven ness of raise the level of the companies’ planning management. However, as analysis, the planning managers often face problems as below in their works: 1) discordant data and too much labor force: data is distributed in files, and this will lead to repeated key-in that makes data discordant and cost too much labor force 2) difficult to get the changes of the plans: because plans are mostly controlled by project managers , other people are difficult to know the changes of the plans 3) difficult to coordinate: people works on different platforms so they hard to coordinate with each other 4) low working efficiency: because links between different works aren’t close enough, working efficiency is low. (2009-06-11, Visual Basic, 112KB, 下载6次)

http://www.pudn.com/Download/item/id/802972.html
总计:154