CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - security system
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - security system - List
[
Software Engineering
]
wangshangxixiguanli
DL : 0
近年来,随着计算机技术的发展和互联网时代的到来,我们已经进入了信息时代,也有人称为数字化时代,在这数字化的时代里,学校的教学管理都受到了极大的挑战。Internet技术持续迅猛的发展,也给传统的办学提出了新的模式。通过设计和建设网络拓扑架构、网络安全系统、数据库基础结构、信息共享与管理、信息的发布与管理,从而方便管理者、老师和学生间信息发布、信息交流和信息共享。以现代计算技术、网络技术为基础的数字化教学主要是朝着信息化、网络化、现代化的目标迈进。作为新型的办学模式,它们具有对于教育、教学过程来说极为宝贵的特性,可以为新型办学模式的建构提供理想的环境。在此开发的大学信息学院管理信息系统,旨在探索一种以互联网为基础的办学模式。通过这种新的模式,为信息学院营造一种新的办学环境,使管理突破时空限制,扩大教学规模,提高工作效率和办学水平,使学校管理者、教师和学生可以在任何时候、任何地点通过网络进行学习与交流。-In recent years, with development of computer technology and the advent of the Internet era, We have entered the information age, it was also known as the digital era, and in this digital era, schools have been teaching management a great challenge. Internet technologies continue rapid development, but also to the traditional school of new models. Through the design and construction of network topology architecture, network security system, database infrastructure, information sharing and management, information publishing and management, thus facilitating administrators, teachers and students between the release of information, exchange of information and sharing of information. With modern technology, network technology based on the Digital Teaching is mainly towards information technolo
Update
: 2025-02-17
Size
: 737kb
Publisher
:
jiafeimao
[
Other
]
rsa
DL : 0
网络安全体制中的RSA算法的一些相关文章-Network security system of the RSA algorithm in a number of related articles
Update
: 2025-02-17
Size
: 4.6mb
Publisher
:
刘
[
SCM
]
CSA_car_security_system_sch
DL : 0
car security system is more important for us
Update
: 2025-02-17
Size
: 28kb
Publisher
:
csallon
[
WEB Code
]
RFID-Security
DL : 0
Radio Frequency Identification [RFID] systems have become popular for automated identification and supply chain applications. This article describes the technical fundamentals of RFID systems and the associated standards. Specifically, we address the security and privacy aspects of this relatively new and heterogeneous radio technology. We discuss the related security requirements, the threats and the implemented mechanisms. Then the current security and privacy proposals and their enhancements are presented. Finally we discuss the role of this technology in Ubiquitous Computing-The automated identification of objects with electromagnetic fields is the major purpose of the RFID [Radio Frequency Identification] technology. An RFID system basically consists of transponders [tags], readers [scanners] and application systems for further processing of the acquired data. There is a large variety of different RFID systems: they may use low, high or ultra high frequencies, the transponder may emit only a fixed identifier or possess significant memory and processing capabilities. Transponders may incorporate no security features at all or realise effective security protocols similar to smartcards. Most transponders are passively powered by the radio field emitted by the reader but there are also active tags with a separate power supply. The transponder design is also little uniform: there are e.g. tiny tags with a size of several millimetres, very thin “smart labels” or standard ID-1 cards
Update
: 2025-02-17
Size
: 349kb
Publisher
:
胡利建
[
Firewall-Security
]
Cryptography.and.Network.Security.4th.Edition
DL : 0
本书系统地介绍了密码编码学与网络安全的基本原理和应用技术。全书主要包括下列四个部分:对称密码部分讨论了对称密码的算法和设计原理;公钥加密和散列函数部分讨论了公钥密码的算法和设计原理、报文鉴别码和散列函数的应用等;网络安全应用部分讨论了系统层的安全问题,包括电子邮件安全、IP安全以及Web 安全等;系统安全部分讨论了入侵者和病毒造成的威胁及相应的对策、防火墙和可信系统的应用等。-This book systematically describes encryption and network security study of the basic principles and application technology. Book include the following four parts: symmetric cryptography, symmetric cryptography, discussed some of the algorithms and design principles public-key encryption and hash function discussed some public key cryptography algorithms and design principles, message authentication code and the application of hash function etc. network security part of the system application layer security issues, including e-mail security, IP security and Web security system security is discussed in part caused by the intruder and virus threats and appropriate countermeasures, firewalls and trusted systems and so on.
Update
: 2025-02-17
Size
: 12.39mb
Publisher
:
秦中元
[
Delphi VCL
]
TMS.Security.System.v2.4.Full.Source.Delphi
DL : 0
delphi组件,用于与操作系统安全有关的操作,控件中对底层的API函数,作了大量封装。哈哈,用起来就一个字“爽”-delphi components, with the operating system for security-related operations, controls on the bottom of the API function, made a large number of packages. Haha, to use one word on the " Smooth"
Update
: 2025-02-17
Size
: 1.28mb
Publisher
:
LWM
[
Windows Develop
]
avr
DL : 0
Hello guys, I ve built this GSM security system as my semester project using T290i mobile and controlled my car using it. Please leave your comments about it. If any one needs help in implementing such a system, I can help. Some of the functions it can perform are: * start and stop the engine (without using the key) * stop the engine if somebody starts it with a key ( by cutting off ignition) * lock and unlock the doors * send a text message to the owner if an intruder is detected (by monitoring the doors) * switch the heater/air conditioner on and off
Update
: 2025-02-17
Size
: 1.89mb
Publisher
:
Asif
[
Other Embeded program
]
RFID-security-system
DL : 0
This project aimed to develop a wireless system to detect and allow only the authorized persons. The system was based on Radio Frequency Identification (RFID) technology and consists of a passive RFID tag. The passive micro transponder tag collects power from the 125 KHz magnetic field generated by the base station, gathers information about the Tag ID and sends this information to the base station. The base station receives, decodes and checks the information available in its Database and Manchester code was used to send those information. The system performed as desired with a 10cm diameter antenna attached to the transponder. The Base Station is built by using the Popular 8051 family Microcontroller. It gets the tag ID and if the tag ID is stored in its memory then the microcontroller will allow the person inside. RFID Reader Module, are also called as interrogators.
Update
: 2025-02-17
Size
: 109kb
Publisher
:
Binu
[
Software Engineering
]
fingerprint-and-password-security-system-thesis.z
DL : 0
Nice document on Fingerprint recognition system Very good thesis
Update
: 2025-02-17
Size
: 1.55mb
Publisher
:
pannu
[
Delphi VCL
]
Delphi-VCL-TMSSecuritySystem
DL : 0
TMS Security System 2.4 for Delphi - FullSource
Update
: 2025-02-17
Size
: 1.45mb
Publisher
:
ThotAcc
[
SCM
]
AT89S52-GSM-Final
DL : 0
基于AT89S52的GSM安防系统 本人最近弄了个基于AT89S52的GSM安防系统,想到当初由一个新手开始做这个的时候在找案例参考基本都看不懂。所以我做好这个项目后,就把它无私贡献给大家。希望对有兴趣的朋友有所帮助。这是一整套的成品,里面有说明文档,99SE的原理图和PCB,还有全套代码。在这里需要说明一点的是,由于本人孤军做此项目,所以很多地方都不是很完善。 该程序已经实现发生警报,然后通过GSM发送短信到目标号码,然后由目标再回发相应的控制短信去控制。 更多请查看附件里面的说明文档-AT89S52 based on the GSM security system I recently broke a AT89S52 of GSM based security systems, originally thought of starting from a novice to do this when looking for the basic reference case are read. So I do this project, put it selflessly to the party. Want to help friends who are interested. This is a set of finished product, which has documentation, 99SE schematic and PCB, have a complete code. Need to point out here is that, because I alone in doing this project, many places are not quite perfect. The program has been achieved alarm occurred, and then send text messages to the destination GSM number, and then issued by the goal of returning to the corresponding control messages to control. Please see attachment for more documentation inside
Update
: 2025-02-17
Size
: 3.58mb
Publisher
:
友
[
Software Engineering
]
security-system-BF533-
DL : 0
基于ADI的Blackfin533的家庭安全系统设计-Blackfin533 based on ADI' s Home Security System
Update
: 2025-02-17
Size
: 375kb
Publisher
:
recochun
[
Delphi VCL
]
TMS-Security-System-QS
DL : 0
TMS Security System Quick Start documentation.
Update
: 2025-02-17
Size
: 127kb
Publisher
:
Kebo
[
Delphi VCL
]
TMS-Security-System-v2.4.3.1(DelphiXE2)
DL : 0
The TMS Security System facilitates the definition of user rights on a menu or form level. In its user management features the TMS Security System relies on user/group profiles stored in a database. The users can be grouped and can inherit rights in this way. Thereby you can integrate a highly sophisticated and close grained user management that closes all potential loopholes via shortcuts with minimal effort. Only if the user has been granted the specific right by the administrator he can see or use the specific function assigned by the administrator. The administrator can configure the rights at run-time thereby preventing a restart of the program when changing assignments. For doing so he can use an easy to handle, intuitive GUI that enables the administrator to create new users or to group or delete them directly from the application.
Update
: 2025-02-17
Size
: 2.7mb
Publisher
:
volod3000
[
Industry research
]
(CAN)-Application-in-Security-System
DL : 0
Can Application in Security system
Update
: 2025-02-17
Size
: 873kb
Publisher
:
bedreddin
[
Other
]
Home-Security-System-12-08-28
DL : 0
用matlab编写的家庭安全监控系统,运用无线网络摄像头,同软件实时监控家庭实际情况。-Home Security System write by matlab.
Update
: 2025-02-17
Size
: 394kb
Publisher
:
张三
[
VHDL-FPGA-Verilog
]
Security-System
DL : 0
The security system implemented monitors the state of eight doors (open or closed) and shows the state in leds when the selector indicate it. Also the number corresponding to the desired door is shown in a 7seg display.
Update
: 2025-02-17
Size
: 658kb
Publisher
:
dokuro
[
Other
]
Microprocessor-based-home-security-system
DL : 0
Microprocessor based home security system Microprocessor based home security system Microprocessor based home security system-Microprocessor based home security system Microprocessor based home security system Microprocessor based home security system Microprocessor based home security system Microprocessor based home security system
Update
: 2025-02-17
Size
: 4kb
Publisher
:
ag
[
Other
]
ATM Security System
DL : 0
Atm security system using GSM
Update
: 2025-02-17
Size
: 9kb
Publisher
:
Kishor
[
Other
]
(App) Delphi Component - Tms Security System
DL : 0
TMS Security system pack delphi 7 source code
Update
: 2025-02-17
Size
: 479kb
Publisher
:
mzille
«
1
2
3
4
5
6
7
8
9
10
...
50
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.