Offizieller Lieferant
Als offizieller und autorisierter Distributor beliefern wir Sie mit legitimen Lizenzen direkt von mehr als 200 Softwareherstellern.
Sehen Sie alle unsere Marken.
Lizenzierung: ...
Preise: ...
Kompatibilität: Einrichtungsbetriebssystem Windows 7 Windows Vista Windows XP Windows ME Windows 2000 Windows 98 Windows NT 4.0 Windows 95 Produktarchitektur 32Bit Produkttyp Komponente Komponententyp ActiveX OCX ActiveX DLL Erstellt unter Verwendung von ActiveX Template Library (ATL).NET-fähig/.NET RCW geprüft ...
Bildschirmabzüge: An Encryption Method object represents a particular encryption algorithm offered by the library. Objects of this type are assigned to the Xceed Encryption control's EncryptionMethod property ... in order to specify the underlying encryption method to use. ...
Beschreibung: Add strong encryption and decryption capability to your Windows desktop and web applications. Xceed Encryption Library is an ActiveX component that supports the latest industry-standard strong ... encryption algorithms and offers both symmetrical and public-key cryptography. It allows you to encrypt or decrypt memory buffers, strings, blobs, streaming data or files. Does not depend on the Microsoft ... CryptoAPI. The Xceed Encryption Library is an ActiveX component that allows Windows applications to encrypt and decrypt data using the latest industry standard strong encryption algorithms. The library ...
Preise: ...
Lizenzierung: ...
Kompatibilität: Operating System for Deployment Windows 7 Windows Vista Windows XP Windows ME Windows 2000 Windows 98 Windows NT 4.0 Windows 95 Architecture of Product 32Bit Product Type Component Component Type ActiveX OCX ActiveX DLL Built Using ActiveX Template Library (ATL).NET Ready/Tested with.NET RCW No ...
Bildschirmabzüge: The Hashing Method object represents a particular hashing algorithm offered by the library. Objects of this type are assigned to the Xceed Hashing control's HashingMethod property in order to determine the hashing algorithm to use when calling Xceed Hashing control methods that hash data. ...
Bildschirmabzüge: Encrypting and decrypting entirely in memory requires five steps; Specify the encryption method to use; Specify the Secret Key to use; Tell the library to encrypt; Obtain the encrypted data and Make ...