Security Call Tree


Advertisement

JProfiler for Mac OS X  v.7.2.2

Allocation call tree Shows a call tree or methods, classes, packages or Java EE components with annotated allocations of selected classes. Allocation hot spots Shows a list of methods, classes, packages or Java EE components that allocate selected ...

JProfiler for Linux  v.7.2.2

Allocation call tree Shows a call tree or methods, classes, packages or Java EE components with annotated allocations of selected classes. Allocation hot spots Shows a list of methods, classes, packages or Java EE components that allocate selected ...





Advertisement

Cite-effect  v.386.1.3

After building a database, it reports variable's accesses within call tree(s), in a text format suitable for integration into editors (like jEdit or Emacs).

JWTM (Web Tree Menu)  v.1.1.003

JWTM (Drop Down Menu) is a tree java menu applet, a comprehensive solution for website navigation. JWTM is browser-independent and highly-configurable, it could be easily customized to fit your website needs and to achieve an unlimited variety of menu ...

AVG Internet Security Business Edition  v.2013.p.3272

AVG Internet Security Business Edition is ultimate protection that won't slow you down or get in your way. It keeps your business safe when emailing or going online. Includes server protection to avoid unexpected crashes and downtime.

Email ...

RedSun SharePoint Tree View Web Part  v.1.1.9.0

RedSun SharePoint Tree View web part, also known as "SPListTreeView", is an AJAX-based web part which enables you to manage your list or document library with hierarchical view in SharePoint 2010. Like navigating file system directories in Windows Explorer, ...

SSRS Security Manager  v.3.1

SSRS Security Manager: Manage, audit and have complete visibility of all your SQL Server Reporting Services security. Using a simple tree form you have an overview colour coding that alert you to a security issue. Drill down to an item by item level and ...

Easy Tree Generator  v.2.0

Easy Tree Generator is nice and useful utility for creating low-polygonal 3D tree and bush models for purpose of game and entertainment applications development. Is it easy to use and have simple and comfortable user interface. With Easy Tree Generator ...

Advanced Call Center

All the features you'd expect are supported: call monitoring and logging, Caller ID with pop-ups and voice alerts, "white" and "black" lists, customizable and personalized greetings, and conversation recording. ACC can send call notifications to your ...

Call Corder

Call Corder records telephone conversations directly to your hard disk with a single push of button, optionally playing a legal disclaimer before recording (ideal for use in business environment). It stores calls as standard Windows sound files, adding ...

Windows Security Officer  v.7.5.5.56

Windows Security Officer is an autonomous provider of log-on and resource restriction security application integrated with, yet independent of, the Windows operating system. It has the capability of providing extremely strong, secure control of who can ...

Internet Explorer Security Pro

Internet Explorer Security is an utility that customizes many aspects of the Internet Explorer Web browser. It's a snap to use and provides the tools you need to retain and manage your Web browser settings. It lets you disable individual menu items and ...

GFI LANguard Network Security Scanner

is a complete network vulnerability management solution that allows you to scan, detect, assess and remediate any security vulnerabilities on your network. It performs over 15,000 vulnerability assessments, identifies all possible security threats and ...

Agelong Tree

Agelong Tree is a computer program intended for building family trees, storing and displaying information about people and events in their lives. Agelong Tree has a wide spectrum of features: it automatically builds a family tree for any person, has a ...

HIPAA Security Rule Assistant  v.11.5

HIPAA Security Rule Assistant provides HIPAA covered entities a program to learn and understand the HIPAA Security Rule. It contains Risk Analysis worksheet, sample policy templates, sample disaster recovery plan, and a sample Incident Report form. It ...

Pages : < 1 | 2
Newest Reviews