• 论文写作助手:EndNote一点通

    论文写作助手:EndNote一点通。2008,扫描版

    4
    162
    19.44MB
    2011-12-31
    15
  • 《Trusted Computing》 by Chris Mitchell

    1. Introduction to trusted computing, 2. Trusted computing technologies, 3. Applications of trusted computing, and 4. The future of trusted computing.

    5
    121
    5.1MB
    2011-09-15
    9
  • Oracle Security

    authors: Marlene Theriault William Heney Publisher: O'Reilly First Edition October 1998 (目录) Security in an oracle System Chapter 1 Oracle and Security What’s It All About? The Oracle Security Model Procedures, Policies, and Plans If I Had a Hammer... Chapter 2 Oracle System Files What’s in the Files? The Instance and the Database: Starting an Oracle Database Types of Database Files Chapter 3 Oracle Database Objects The User Interface: User Versus Schema Objects Tables Table Triggers Views Stored Programs Synonyms Privileges Roles Profiles Chapter 4 The Oracle Data Dictionary Creating and Maintaining the Data Dictionary The Data Dictionary Views About SQL.BSQ Views Used for Security The Composition of the Views Chapter 5 Oracle Default Roles and User Accounts About the Defaults The CONNECT Role The RESOURCE Role The DBA Role The SYSDBA and SYSOPER Roles Using the Default Roles Default User Accounts Segmenting Authority in the Database Chapter 6 Profiles, Passwords, and Synonyms Profiles Passwords Synonyms Implementing Security Chapter 7 Developing a Database Security Plan About the Security Policy and Security Plan Types of Accounts Standards for Accounts Standards for Usernames Standards for Passwords Standards for Roles Standards for Views Standards for the Oracle Security Server Standards for Employees Sample Security Plan Index Sample Security Plan Checklist Chapter 8 Installing and Starting Oracle Segmenting Application Processing Installing Oracle Securely Connecting to the Database Without a Password Installing and Configuring SQL*Net Setting Up Initialization Parameters for Security Chapter 9 Developing a Simple Security Application The Application Overview Preparing the Role-Object Matrix Views Roles Grants Application Control of Access Chapter 10 Developing an Audit Plan Why Audit? Where to Audit How Auditing Works Auditing and Performance Default Auditing Types of Auditing Purging Audit Information Chapter 11 Developing a Sample Audit Application About the Audit Trail Application About Performance and Storage Using the Audit Data in Reports SQL Scripts to Generate Scripts Chapter 12 Backing Up and Recovering the Database What Are the Backup Options? What’s New for Oracle8? What Are the Recovery Options? Chapter 13 Using the Oracle Enterprise Manager What Is the OEM? The DBA Toolkit and Security OEM and the Job Scheduler OEM and the Event Management System Chapter 14 Maintaining User Accounts Application Design Requirements Running the Application Documenting the User State A Sample Script Enhanced Oracle Security Chapter 15 Using the Oracle Security Server About Cryptography Ways to Authenticate Users What’s in the OSS? Configuring and Using the OSS Chapter 16 Using the Internet and the Web Web Basics Evaluating Web Assets and Risks Protecting a Web Site Getting Users Involved Chapter 17 Using Extra-Cost Options Trusted Oracle Advanced Networking Option Oracle Application Server Appendix References Oracle Books Security Books Oracle Electronic References Security Electronic References (英文版)

    0
    122
    1.3MB
    2011-06-12
    10
  • 数据挖掘概念与技术(韩这炜)(英文版)(第二版)(第二部分/总二部分)

    Data Mining: Concepts and Techniques Second Edition Jiawei Han University of Illinois at Urbana-Champaign Micheline Kamber。 请注意。这本书上传时分成了二部分,要两部分放一起才能解压。这是第二部分。

    0
    43
    11.17MB
    2010-06-22
    3
  • 数据挖掘概念与技术(韩家炜)(英文版)(第二版)(第一部分/总二部分)

    Data Mining:Concepts and Techniques Second Edition Jiawei Han University of Illinois at Urbana-Champaign Micheline Kamber。 请注意,要下载两部分放在一起才能解压。这是第一部分。

    4
    75
    14.31MB
    2010-06-22
    9
  • Computer Security Technology Planning Study. volunm 2

    经典论文,需要的人认为是宝,不需要的人一点用处都没有

    0
    55
    1.02MB
    2010-05-08
    10
  • 安全编码(Writing scure code)(英文版)(第二版)

    答谢大家,零分资源!(已测可用)。其实已有人上传,但有人居然要10分,故再传上来。

    2
    104
    2.21MB
    2010-05-04
    10
  • Unix操作系统设计英文版(The Design of The Unix Operating System-Maurice J.Bach)

    经典不用多说。Unix操作系统设计英文版(The Design of Unix System):djvu格式,可以使用windjview打开。 也可以转换成PDF格式(转换后变成170多m)。转换方法可见:http://hi.baidu.com/sonqiang/blog/item/8051f98009c4afdf9023d950.html

    5
    106
    4.66MB
    2010-03-10
    9
  • malware detection(病毒扫描)经典教材

    Springer出版的关于病毒检测的教材,现有的主流技术都有讲到。 pdf格式。

    5
    124
    18.49MB
    2009-11-27
    6
  • partitionMagic魔法分区9.0(支持sata硬盘)

    有些人标的是9.0版,但实际上是8.0的版本。我找了很久才找到这个真正的9.0版本。

    3
    87
    5.23MB
    2009-09-30
    10
关注 私信
上传资源赚积分or赚钱