Description: ASP漏洞全接触——入门篇
ASP数据库问题安全之我见
如何解决登陆漏洞问题-ASP loophole Keys -- Introduction Part ASP database security issues, I see how to solve the problem of landing loopholes Platform: |
Size: 103017 |
Author:习俗 |
Hits:
Description: 数据库的安全措施,主要是用于数据库的作业用的-database security measures, the database is used mainly to the operation of Platform: |
Size: 6492 |
Author:米虫 |
Hits:
Description: 为了保证数据库数据的安全可靠性和正确有效,DBMS必须提供统一的数据保护功能。数据保护也为数据控制,主要包括数据库的安全性、完整性、并发控制和恢复。-database data in order to ensure the safety and reliability of correct and effective, DBMS must provide centralized data protection. Data protection for data control, including database security, integrity, concurrency control and recovery. Platform: |
Size: 22714 |
Author:kiki |
Hits:
Description: 小型超市管理系统
目录
1、项目计划
1.1系统开发目的
1.2背景说明
1.3项目确立
1.4应用范围
1.5定义
1.6参考资料
2、逻辑分析与详细分析
2.1系统功能
2.2数据流图
2.3用户类型与职能
2.4系统开发步骤
2.5系统环境需求
2.6系统安全问题
3、基于UML的建模
3.1语义规则
3.2 UML模型
3.3系统实现图
4、概要设计文档
5、逻辑设计文档
6、物理设计文档
7、小结
-Small supermarket management system directory 1 project 1.1 Background 1.2 The purpose of system development projects that 1.3 range 1.5 to establish 1.4 Applications 1.6 Reference 2 definition, logical analysis and detailed analysis of 2.1 system 2.2 Data Flow Graph 2.3 user types and functions of system development steps 2.4 2.5 system environment needs security issues 2.6 system 3, based on the UML Modeling 3.1 semantic rules 3.2 UML Model 3.3 System Figure 4, a summary of design documents 5, logic design document 6, the physical design documents 7, Summary Platform: |
Size: 61440 |
Author:jiangxiaohua |
Hits:
Description: 三种典型的数据库系统( 关系、层次、网状)
关系数据库标准SQL
关系数据库理论
数据库设计
数据库的安全保护
数据库新技术发展
-Three typical database system (the relationship between the level of mesh) relational database standard SQL relational database theory database design database security protection database development of new technologies Platform: |
Size: 637952 |
Author:张某某 |
Hits:
Description: This project aimed to develop a wireless system to detect and allow only the authorized persons. The system was based on Radio Frequency Identification (RFID) technology and consists of a passive RFID tag. The passive micro transponder tag collects power from the 125 KHz magnetic field generated by the base station, gathers information about the Tag ID and sends this information to the base station. The base station receives, decodes and checks the information available in its Database and Manchester code was used to send those information. The system performed as desired with a 10cm diameter antenna attached to the transponder. The Base Station is built by using the Popular 8051 family Microcontroller. It gets the tag ID and if the tag ID is stored in its memory then the microcontroller will allow the person inside.
RFID Reader Module, are also called as interrogators. Platform: |
Size: 111616 |
Author:Binu |
Hits:
Description: 初学spring security权限管理时自己跑通的源码,使用了oracle作为数据库.工程架构是ibatis+spring+struts-Beginners spring security through rights management to run their own source code when using the oracle as the database. Engineering framework is ibatis+ spring+ struts Platform: |
Size: 38623232 |
Author:张辽 |
Hits:
Description: 主要综述了数据库(特别是sql server 2005)的安全控制方案,包括登录,角色名转换等-Major review of the database (especially sql server 2005) security control programs, including login, role name conversion Platform: |
Size: 2155520 |
Author:cheryl |
Hits:
Description: 第一部分为SQL Server 2005 数据库管理部分,主要介绍了SQL Server 2005 的基本
特点、安装过程、数据库管理、数据库配置、数据库安全和Report Services 报表设计等;第二部分为实例部
分,使用Visual Basic、Visual C++、ASP 和ASP.NET(Visual C#)等多种经典开发工具开发C/S(Client / Server)
模式和B/S(Browser / Server)模式的网络数据库应用程序。-The book tells the SQL Server 2005 configuration, management and development of basic knowledge, as well as methods and techniques to develop database applications.
The book is divided into two parts: the first part of the SQL Server 2005 database management component, introduces the SQL Server 2005
Characteristics of the installation process, database management, database configuration, database security, and Report Services reports design the second part is an instance of the Ministry of
Points, using Visual Basic, Visual C++, ASP, and ASP.NET (Visual C#), a variety of classic development tools to develop the C/S (Client/Server)
Mode and B/S (Browser/Server) mode network database application. Platform: |
Size: 13383680 |
Author:李欢 |
Hits:
Description: 数据库漏洞扫描是一种方便且高效的实现数据库安全测评的手段。其依据丰
富的现有漏洞库,通过创建和执行安全策略,对数据库进行全面测评,防患于未
然。虽然无法检测未知漏洞,但是从某种意义上漏洞扫描系统已经足以应对绝大
多数的黑客攻击和内部攻击,因为大部分的黑客攻击行为是利用已知漏洞进行
的。通过实际调研发现目前现有的数据库漏洞扫描系统依然存在一些问题:扫描
过程无脚本环境验证、漏洞库不公开、无漏洞验证和利用功能。本文深入研究了
数据库漏洞扫描相关技术,针对数据库漏洞提出了一种漏洞库的多维层次存储方
案和一种漏洞描述方法VDMSL,有助于打破现阶段数据库漏洞扫描领域技术封
闭的局势,并基于此描述方法设计实现了一款数据库漏洞扫描系统。-Database vulnerability scanning is a convenient and efficient means of database security evaluation. Create and enforce security policies in accordance with its existing vulnerability database, the database to conduct a comprehensive evaluation and take preventive measures. Although it is impossible to detect unknown vulnerabilities, but from a sense vulnerability scanning system has been adequate to deal with the majority of hacker attacks and internal attacks, because the majority of hacker attacks are carried out using known vulnerabilities. Actual study found that the existing database vulnerability scanning system still exist some problems: the scanning process scripting environment validation vulnerability database is not open, vulnerability validation and use of functions. Depth study of database vulnerability scanning technology, a multi-dimensional level of a vulnerability database storage program and a vulnerability for database vulnerability to description the method VDMSL, Platform: |
Size: 1183744 |
Author:张非 |
Hits:
Description: This nice book for database security and contains different topics of database security.we found it useful for our course on database security-This is nice book for database security and contains different topics of database security.we found it useful for our course on database security Platform: |
Size: 3092480 |
Author:maj |
Hits:
Description: 信息安全相关资料,适合初学者。包括:SSL安全协议、数据库安全、数字签名、网络防火墙技术发展现状与趋势-Information security-related material for beginners. Include: SSL security protocol, database security, digital signatures, development and trends of network firewall technology Platform: |
Size: 64512 |
Author:Anastasia |
Hits: