Résultat de la recherche - ACL

TIFManagerBean 2.3

TIFManagerBean 2.3 Version gratuite 14326 

C'est actuellement le meilleur Java Bean qui peut être incorporé dans une application Oracle Forms pour effectuer le Document Capture,…

Visual Web Ripper 2.121.8

Visual Web Ripper 2.121.8 Version d'essai 16407 

Visual Web Ripper peut extraire des données de la plupart des jeux de cadres et des iframes. Visual Web Ripper…

Touch N Go 1.0.61228.0

Touch N Go 1.0.61228.0  4933 

Touch N Go is a Biometric Framework (SDK or API) that allows programmers to integrate fingerprint recognition in their application…

PNaCL ToraTora 1.0.3

PNaCL ToraTora 1.0.3 Version gratuite 4332 

AES File Encrypt by PNaCl sandbox. So safely. Encrypt mode is CBC. Key is derived by PBKDF2. It is convenient…

Omega DB Scanner Standalone 2.1.0

Omega DB Scanner Standalone 2.1.0 Version gratuite 4747 

Omega DB Scanner Standalone is an out-of-box, software-only solution. This Standalone and Free Edition is a simple client-side solution that…

Omega Core Audit 3.0.0

Omega Core Audit 3.0.0  4778 

Access Control, Continuous Audit Monitoring and Real-Time Protection for Oracle databases. Security applied at the core - from within the…

Secure Oracle Auditor 3.0.20.0024

Secure Oracle Auditor 3.0.20.0024  4335 

Secure Oracle Auditor (SOA) the most comprehensive Risk Management Software for Oracle database security which conducts vulnerability assessments and security…

OraSchemaCompare 1.2.0.0

OraSchemaCompare 1.2.0.0  4287 

Schema comparison is an important and useful way to know the difference specially when schema upgrade is done and compare…

JRecoverer Database Bundle 1.5.0

JRecoverer Database Bundle 1.5.0  4817 

Audit and recovery of Oracle Database, MySQL, PostgreSQL, Microsoft SQL Server passwords. Account information import from databases. Password recovery using…

JRecoverer for Oracle Database Passwords 1.4.1

JRecoverer for Oracle Database Passwords 1.4.1  4838 

Audit and recovery of Oracle Database passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks,…

« First « Prev 1 2 ... 11 12 ... 12 13 Next » Last »