搜索资源列表
kill360.rar
- 破坏S360安全卫士的云查杀 点一下就可以实现 这个代码感觉很简单 但是很实用,S360 destruction killing the security guards of the cloud can be achieved by clicking on the feeling of this code is very simple but very practical
code
- 其中包括,云安全系统,楼宇自动控制,智能安防报警系统等的源代码-These include, cloud security systems, building automation, intelligent security alarm system, source code
ZhuoRanHIPS
- 病毒在计算机运行之后将根据自身的目的呈现出一系列的动作,包括写注册表项,生成文件,远程线程注入等等。本系统通过拦截系统调用对程序行为进行监控,将监控的行为信息交给监控中心和网络服务器分析处理,根据程序行为分析判断病毒,云安全概念的加入,本地特征库极小,占用系统资源很少。本系统设想根据这一系列的动作所组成的行为进行智能的逻辑判断该程序是不是病毒。-Will be followed by the virus in the computer is running according to their
Cloud_Security-and-privacy
- 云安全的概念和建构,介绍了云安全的思想和思路-Cloud security concept and construction, introduced the ideas and thoughts cloud security
201012114204669
- 卓然主动防御源码(可执行文件+完整源码+完整作品报告,卓然驱动级云安全主动防御系统 目录 开发目的 2 系统特性 4 一. 使用RootiKit技术,精确拦截*,曝光恶意行为 4 二. 提供详细行为描述信息,帮助用户判断 4 三. 云安全概念融入,精确判断文件安全级别 4 四. 支持白名单、黑名单,引入云规则,减少提醒 4 五. 多模块相互配合,将*及其衍生物一网打尽 4 -Zoran active defense source (executable+
1
- 云中的安全:云计算安全优势、安全防护、安全联盟-Cloud security
123
- 电子科技大学教授关于安全办公云系统介绍,前景规划说明等-University of Electronic Science and Technology Office Cloud security system introduced
5.Ensuring-Data-Storage-Security-in-Cloud-Computi
- Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application sof
cloud-computing
- Cloud computing is an evolving paradigm with tremendous momentum, but its unique aspects exacerbate security and privacy challenges. This article explores the roadblocks and solutions to providing a trustworthy cloud computing environment.
Ensuring-Data-Storage-Security-in-Cloud-Computing
- Describes Cloud computing and its needs.
Data-Storage-Security-in-Cloud-Computing
- Data security in cloud computing
Cloud-security
- Research papers useful to learn how to secure a cloud environnement
Cloud
- Cloud security - virtualization - Cloud computing drivers
ACHIEVING-DATA-SECURITY-IN-CLOUD-COMPUTING
- Data security in cloud computing....how to achieve...abstract document-Data security in cloud computing....how to achieve...abstract document..
Cloud-Security-with-Virtualized-Defense
- Cloud Security with Virtualized Defense
Cloud-Security-Issues
- Cloud Security Issues
Study-on-Cloud-Computing-Security
- 分析了云计算对信息安全领域中技术、标准、监管等各方面带来的挑战 提出云计算安全参考框架及该框架下的主要研究内容。-Analyzes the challenges of cloud computing in all aspects of information security technologies, standards, regulatory brought proposed cloud security reference framework and main contents unde
Analysis-of-Cloud-Security
- Define cloud and its characteristics firstly , and then give cloud computing architecture in detail , lastly introduce the security issues of cloud computing and give corresponding security mechanism against these security issues.-Define cloud an
Ensuring Data Storage Security in Cloud Computing
- Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application sof
Another-Cloud
- In this work another scenario for cloud security in cloudsoim is developed