Résultat de la recherche - databases

Altova MissionKit Enterprise Edition 2014sp1

Altova MissionKit Enterprise Edition 2014sp1 Version d'essai 12102 

Altova MissionKit 2014 Enterprise Edition est une suite logicielle de développement d'outils UML, SQL et XML de puissance industrielle pour…

Altova MissionKit for Software Architect 2012

Altova MissionKit for Software Architect 2012 Version d'essai 9135 

2012 Altova MissionKit pour Enterprise Software Architects est une suite intégrée de XML, base de données et des outils UML…

Outlook Express Security 2.397

Outlook Express Security 2.397  2952 

Use Outlook Express Security to control access to Outlook Express and its databases. When it is active, Outlook Express becomes…

Spyware Detector 3.0

Spyware Detector 3.0 Version gratuite 3364 

Spyware Detector is a very cool looking Windows Anti-Spy Tool for Network users to monitor there Computer systems for more…

SpamAssassin for Windows 3.4.1

SpamAssassin for Windows 3.4.1 Version gratuite 3090 

SpamAssassin is a mail filter which attempts to identify spam using a variety of mechanisms including text analysis, Bayesian filtering,…

Trojan Killer 2.1.54

Trojan Killer 2.1.54  3351 

Once malware is detected, it is added to Trojan Killer database in 2-12 hours. Up-to-date databases and smart Trojan Killer’s…

ModelRight Professional 4.1.16

ModelRight Professional 4.1.16  2754 

ModelRight, Inc. provides a fresh approach to data modeling - and at an affordable price. ModelRight, our flagship product, streamlines…

Omega Core Audit 3.0.0

Omega Core Audit 3.0.0  2644 

Access Control, Continuous Audit Monitoring and Real-Time Protection for Oracle databases. Security applied at the core - from within the…

OraSchemaCompare 1.2.0.0

OraSchemaCompare 1.2.0.0  2612 

Schema comparison is an important and useful way to know the difference specially when schema upgrade is done and compare…

Crypt-o 3.2.348

Crypt-o 3.2.348  2607 

Crypt-o is a Client/Server password manager with many advanced features like strong data encryption, customizable databases, multi-user access, flexible permissions…

1 Next » Last »