Description: A group of programmers far smarter than I have been laboring from some time to create a library of utilities to help developers like myself to create better applications. The fruits of that labor is the Enterprise Library from the Patterns & Practices group at Microsoft. The Enterprise Library encompasses Exception Handling, Logging, Caching, Security, Cryptography, and Database Access. The latest incarnation of the Enterprise Library for the .Net 2.0 framework also includes an ObjectBuilder which allows object creation with dependency injection. I’d be lying to you if I told you I understand exactly what the ObjectBuilder does. Brian Button has released the most complete information I have found so far on the ObjectBuilder. Documentation is scarce at this point since the Enterprise Library has not been officially released. The code covered in this article is based on the December Community Technology Preview of the new Enterprise Library.-A group of programmers far smarter than I ha ve been laboring from some time to create a libra ry of utilities to help developers like myself t o create better applications. The fruits of tha t labor is the Enterprise Library from the Patte Residus Platform: |
Size: 185636 |
Author:邹增理 |
Hits:
Description: Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.-Secure Programming Cookbook for C and C is a n important new resource for developers seriou 's about writing secure code for Unix (including Linux) and Windows environments. This essenti al code companion covers a wide range of topics, including safe initialization. access control, input validation, symmetric and public key cryptography. cryptographic hashes and MACs. authentication and key exchange, PKI. random numbers, and anti-tampering. Platform: |
Size: 1406512 |
Author:周爽 |
Hits:
Description: A group of programmers far smarter than I have been laboring from some time to create a library of utilities to help developers like myself to create better applications. The fruits of that labor is the Enterprise Library from the Patterns & Practices group at Microsoft. The Enterprise Library encompasses Exception Handling, Logging, Caching, Security, Cryptography, and Database Access. The latest incarnation of the Enterprise Library for the .Net 2.0 framework also includes an ObjectBuilder which allows object creation with dependency injection. I’d be lying to you if I told you I understand exactly what the ObjectBuilder does. Brian Button has released the most complete information I have found so far on the ObjectBuilder. Documentation is scarce at this point since the Enterprise Library has not been officially released. The code covered in this article is based on the December Community Technology Preview of the new Enterprise Library.-A group of programmers far smarter than I ha ve been laboring from some time to create a libra ry of utilities to help developers like myself t o create better applications. The fruits of tha t labor is the Enterprise Library from the Patte Residus Platform: |
Size: 185344 |
Author:邹增理 |
Hits:
Description: Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.-Secure Programming Cookbook for C and C is a n important new resource for developers seriou 's about writing secure code for Unix (including Linux) and Windows environments. This essenti al code companion covers a wide range of topics, including safe initialization. access control, input validation, symmetric and public key cryptography. cryptographic hashes and MACs. authentication and key exchange, PKI. random numbers, and anti-tampering. Platform: |
Size: 1405952 |
Author:周爽 |
Hits:
Description: This book is intended as a guide for security professionals, developers, and
those interested in learning how elliptic curve cryptography can be deployed to secure
applications. Platform: |
Size: 2564096 |
Author:xadas |
Hits:
Description: Cryptography for developers eBook by Tom St Denis, Simon Johnson.
-Special examples of Cryptography goals: Privacy, Integrity, Authentication
-Full Discussion of Large Integer Arithmetic, Public Key Algoritms
Platform: |
Size: 3670016 |
Author:Alexander |
Hits:
Description: 开发者的加密技术,本书主要对软件开发者提供加密技术向导-Cryptography for Developers, the book mainly for software developers to provide encryption wizard Platform: |
Size: 2864128 |
Author:lee |
Hits:
Description: Cryptography is a well-established science that has been a significant historical influence for more than 2,000 years. Traditionally its main users were governments and the military, although it is worth noting that The Kama Sutra of Vatsyayana contains a recommendation that women should study the art of understanding writing in cypher (full details of all works cited are given in References and further reading.-Cryptography is a well-established science that has been a significant historical influence for more than 2,000 years. Traditionally its main users were governments and the military, although it is worth noting that The Kama Sutra of Vatsyayana contains a recommendation that women should study the art of understanding writing in cypher (full details of all works cited are given in References and further reading.
Platform: |
Size: 3634176 |
Author:Marcus Arcus |
Hits: