Welcome![Sign In][Sign Up]
Location:
Search - Database Security

Search list

[Technology Managementasp安全问题

Description: ASP漏洞全接触——入门篇 ASP数据库问题安全之我见 如何解决登陆漏洞问题-ASP loophole Keys -- Introduction Part ASP database security issues, I see how to solve the problem of landing loopholes
Platform: | Size: 103017 | Author: 习俗 | Hits:

[Software Engineeringsafede

Description: 数据库的安全措施,主要是用于数据库的作业用的-database security measures, the database is used mainly to the operation of
Platform: | Size: 6492 | Author: 米虫 | Hits:

[Linux-UnixMySQL数据库安全配置_实用技巧来个内外兼修(1)

Description: MySQL数据库安全配置_实用技巧来个内外兼修(1)-MySQL database security configuration _ practical skills to 000 Out (1)
Platform: | Size: 6814 | Author: 李振东 | Hits:

[Other resourceORACLE_train2

Description: 为了保证数据库数据的安全可靠性和正确有效,DBMS必须提供统一的数据保护功能。数据保护也为数据控制,主要包括数据库的安全性、完整性、并发控制和恢复。-database data in order to ensure the safety and reliability of correct and effective, DBMS must provide centralized data protection. Data protection for data control, including database security, integrity, concurrency control and recovery.
Platform: | Size: 22714 | Author: kiki | Hits:

[SQL Serversupermarket-database

Description: 小型超市管理系统 目录 1、项目计划 1.1系统开发目的 1.2背景说明 1.3项目确立 1.4应用范围 1.5定义 1.6参考资料 2、逻辑分析与详细分析 2.1系统功能 2.2数据流图 2.3用户类型与职能 2.4系统开发步骤 2.5系统环境需求 2.6系统安全问题 3、基于UML的建模 3.1语义规则 3.2 UML模型 3.3系统实现图 4、概要设计文档 5、逻辑设计文档 6、物理设计文档 7、小结 -Small supermarket management system directory 1 project 1.1 Background 1.2 The purpose of system development projects that 1.3 range 1.5 to establish 1.4 Applications 1.6 Reference 2 definition, logical analysis and detailed analysis of 2.1 system 2.2 Data Flow Graph 2.3 user types and functions of system development steps 2.4 2.5 system environment needs security issues 2.6 system 3, based on the UML Modeling 3.1 semantic rules 3.2 UML Model 3.3 System Figure 4, a summary of design documents 5, logic design document 6, the physical design documents 7, Summary
Platform: | Size: 61440 | Author: jiangxiaohua | Hits:

[Database systemDataBase

Description: 数据库基础教程:《数据库原理与应用》 第1章 绪论 第2章 创建数据库 第3章 数据表 第4章 查询 第5章 其他数据库对象 第6章 数据库理论基础 第7章 数据库设计 第8章 SQL概述 第9章 创建数据库 第10章 数据库表 第11章 查询 第12章 数据更新 第13章 视图 第14章 规则与默认 第15章 事务管理 第16章 数据库的安全性与权限管理 第17章 数据库的发展与展望 第18章 Access实验与实训 第19章 SQL语言实验与实训-Database Essentials: Principle and Application of the database, Chapter 1 Introduction Chapter 2 to create a database in Chapter 3 Data Sheet Chapter 4 inquiries Chapter 5 other database objects Chapter 6 theoretical foundation database Chapter 7 database design SQL outlined in Chapter 8 Chapter 9 to create a database Chapter 10 database tables Chapter 11 inquiries Chapter 12 Data Update Chapter 13 view Chapter 14 rules and default Chapter 15 Management Chapter 16 of database security and rights management of chapter 17 of the development of database and prospect of Chapter 18 Access Experiment and Training Chapter 19 SQL language experiment and Training
Platform: | Size: 4762624 | Author: 刘浩 | Hits:

[Otherdatabase

Description: 三种典型的数据库系统( 关系、层次、网状) 关系数据库标准SQL 关系数据库理论 数据库设计 数据库的安全保护 数据库新技术发展 -Three typical database system (the relationship between the level of mesh) relational database standard SQL relational database theory database design database security protection database development of new technologies
Platform: | Size: 637952 | Author: 张某某 | Hits:

[Windows DevelopDATABASE_SECURITY

Description: database security and mandatory security model
Platform: | Size: 9216 | Author: aaaa | Hits:

[BooksHandbook[1].of.Database.Security.0387485325

Description: this is a book for data base security
Platform: | Size: 4950016 | Author: ahmad | Hits:

[MySQLxueshengxinxiguanlixitong

Description: 内容丰富,录入、修改、删除模块,方便的数据导出功能.数据库的安全管理.-Rich in content, input, modify, delete module, convenient data export capability. Database Security Management.
Platform: | Size: 1319936 | Author: 闫瑞敏 | Hits:

[Other Embeded programRFID-security-system

Description: This project aimed to develop a wireless system to detect and allow only the authorized persons. The system was based on Radio Frequency Identification (RFID) technology and consists of a passive RFID tag. The passive micro transponder tag collects power from the 125 KHz magnetic field generated by the base station, gathers information about the Tag ID and sends this information to the base station. The base station receives, decodes and checks the information available in its Database and Manchester code was used to send those information. The system performed as desired with a 10cm diameter antenna attached to the transponder. The Base Station is built by using the Popular 8051 family Microcontroller. It gets the tag ID and if the tag ID is stored in its memory then the microcontroller will allow the person inside. RFID Reader Module, are also called as interrogators.
Platform: | Size: 111616 | Author: Binu | Hits:

[JSP/JavaapplicationContext-security

Description: spring security 用户数据库 配置-spring security configuration user database
Platform: | Size: 1024 | Author: yaozhen | Hits:

[Web ServerWebDemo_spring-security

Description: 初学spring security权限管理时自己跑通的源码,使用了oracle作为数据库.工程架构是ibatis+spring+struts-Beginners spring security through rights management to run their own source code when using the oracle as the database. Engineering framework is ibatis+ spring+ struts
Platform: | Size: 38623232 | Author: 张辽 | Hits:

[Windows Developweb-security-code-problem

Description: web代码安全问题总结 :数据库安全性 ;web代码安全性 ;服务器安全性-code for security problems web: database security web code security server security
Platform: | Size: 8192 | Author: 戴明军 | Hits:

[SQL ServerSQL-security-control

Description: 主要综述了数据库(特别是sql server 2005)的安全控制方案,包括登录,角色名转换等-Major review of the database (especially sql server 2005) security control programs, including login, role name conversion
Platform: | Size: 2155520 | Author: cheryl | Hits:

[OracleThe-database-security-manual

Description: 数据库安全方面的资料,对从事计算机安全方面的非常有帮助-The database security manual
Platform: | Size: 2239488 | Author: a | Hits:

[WEB CodeSQL-Server-2005-database-application

Description: 第一部分为SQL Server 2005 数据库管理部分,主要介绍了SQL Server 2005 的基本 特点、安装过程、数据库管理、数据库配置、数据库安全和Report Services 报表设计等;第二部分为实例部 分,使用Visual Basic、Visual C++、ASP 和ASP.NET(Visual C#)等多种经典开发工具开发C/S(Client / Server) 模式和B/S(Browser / Server)模式的网络数据库应用程序。-The book tells the SQL Server 2005 configuration, management and development of basic knowledge, as well as methods and techniques to develop database applications. The book is divided into two parts: the first part of the SQL Server 2005 database management component, introduces the SQL Server 2005 Characteristics of the installation process, database management, database configuration, database security, and Report Services reports design the second part is an instance of the Ministry of Points, using Visual Basic, Visual C++, ASP, and ASP.NET (Visual C#), a variety of classic development tools to develop the C/S (Client/Server) Mode and B/S (Browser/Server) mode network database application.
Platform: | Size: 13383680 | Author: 李欢 | Hits:

[OtherDatabase-vulnerability-scanning

Description: 数据库漏洞扫描是一种方便且高效的实现数据库安全测评的手段。其依据丰 富的现有漏洞库,通过创建和执行安全策略,对数据库进行全面测评,防患于未 然。虽然无法检测未知漏洞,但是从某种意义上漏洞扫描系统已经足以应对绝大 多数的黑客攻击和内部攻击,因为大部分的黑客攻击行为是利用已知漏洞进行 的。通过实际调研发现目前现有的数据库漏洞扫描系统依然存在一些问题:扫描 过程无脚本环境验证、漏洞库不公开、无漏洞验证和利用功能。本文深入研究了 数据库漏洞扫描相关技术,针对数据库漏洞提出了一种漏洞库的多维层次存储方 案和一种漏洞描述方法VDMSL,有助于打破现阶段数据库漏洞扫描领域技术封 闭的局势,并基于此描述方法设计实现了一款数据库漏洞扫描系统。-Database vulnerability scanning is a convenient and efficient means of database security evaluation. Create and enforce security policies in accordance with its existing vulnerability database, the database to conduct a comprehensive evaluation and take preventive measures. Although it is impossible to detect unknown vulnerabilities, but from a sense vulnerability scanning system has been adequate to deal with the majority of hacker attacks and internal attacks, because the majority of hacker attacks are carried out using known vulnerabilities. Actual study found that the existing database vulnerability scanning system still exist some problems: the scanning process scripting environment validation vulnerability database is not open, vulnerability validation and use of functions. Depth study of database vulnerability scanning technology, a multi-dimensional level of a vulnerability database storage program and a vulnerability for database vulnerability to description the method VDMSL,
Platform: | Size: 1183744 | Author: 张非 | Hits:

[OtherEffective-Oracle-Database-10g-Security-by-Design.

Description: This nice book for database security and contains different topics of database security.we found it useful for our course on database security-This is nice book for database security and contains different topics of database security.we found it useful for our course on database security
Platform: | Size: 3092480 | Author: maj | Hits:

[OS programInformation-Security-Technology

Description: 信息安全相关资料,适合初学者。包括:SSL安全协议、数据库安全、数字签名、网络防火墙技术发展现状与趋势-Information security-related material for beginners. Include: SSL security protocol, database security, digital signatures, development and trends of network firewall technology
Platform: | Size: 64512 | Author: Anastasia | Hits:
« 12 3 4 5 6 7 8 9 10 ... 33 »

CodeBus www.codebus.net