-
网络防火墙
基于winsock2的网络封包截获技术,源代码清楚的记录的防火墙技术的实现过程,对初学者大有帮助.(WinSock2 based on the network packets intercepted technology, the source code clear record of firewall technology to the implementation process for beginners great help.)
- 2005-05-17 13:28:09下载
- 积分:1
-
防火墙PDF2
防火墙技术文档PDF2.rar(firewall technical documentation PDF2.rar)
- 2004-12-22 11:54:02下载
- 积分:1
-
m0n0wall_handbook_chinese
m0n0wall防火墙嵌入式系统的中文手册(m0n0wall firewall Embedded System, the Chinese handbook)
- 2010-03-10 14:33:23下载
- 积分:1
-
baoguolv
包过滤防火墙程序源代码,本软件用VC++6.0开发,主要有用户应用程序和驱动程序两部分组成
(
Packet filtering firewall program source code, the software with VC++6.0, mainly composed of two parts of the user application and driver)
- 2012-05-16 00:43:02下载
- 积分:1
-
Clavister_Hardware_Specifications
claver firewall hardware config
- 2012-08-12 05:18:04下载
- 积分:1
-
Firewall_Blocker
Enable / Disable Windows XP Firewall Through .Net Code, No Need API Functions, Read And Write As DWORD Values.
- 2010-03-14 02:58:32下载
- 积分:1
-
24746
Windows防火墙对象应用源码,程序创建易语言对象实现Windows防火墙的操作。(Windows Firewall target application source code , the program creates easy language object that implements the Windows Firewall operation.)
- 2015-09-09 17:08:16下载
- 积分:1
-
ScanPort_coder
Syn_ScanPort0 高速SYN端口扫描器的VC源代码(SYN port Syn_ScanPort0 high-speed scanner VC source code)
- 2007-12-24 20:11:33下载
- 积分:1
-
151
真彩防火墙按钮源码,例程程序结合易语言模块彗星真彩控件模块.ec,实现真彩防火墙按钮效果。(TFT firewall button source , routine program combined with easy language module comet true color control module .ec, true-color firewall button effects .)
- 2016-11-09 12:57:14下载
- 积分:1
-
PrinciplesofInformationSystemsSecurity
应用的角度介绍计算机信息系统安全原理,并将有关内容按照如下体系梳理:第1篇攻防技术:内容包括恶意程序、网络攻击(黑客)、隔离技术(防火墙、物理隔离和电磁防护)、安全监控(IDS、网络诱骗和审计)、紧急响应和取证;第2篇安全信任体系:内容包括加密与信息隐藏、认证、安全协议;第3篇安全体系结构和评估标准。
(Perspective on the application of computer information system security principles, and the contents sorted according to the following system: the first an offensive and defensive techniques: including malicious programs, network attacks (hackers), isolation technology (firewalls, physical isolation and electromagnetic protection), security monitoring (IDS, network trap and audit), emergency response and forensics No. 2 security trust system: the content includes encryption and information hiding, authentication, security protocols the first three security architecture and evaluation criteria.)
- 2009-12-21 12:42:49下载
- 积分:1