PostgreSQL 8.0 Documentation..................................................................246 16.2. Creating a Database Cluster ........................................................................................246 16.3 ...................284 16.7. Secure TCP/IP Connections with SSL ........................................................................284 16.8. Secure TCP/IP Connections with SSH Tunnels............ ......................................................303 19.2.4.1. Ident Authentication over TCP/IP......................................................303 19.2.4.2. Ident Authentication over Local0 码力 | 1422 页 | 9.92 MB | 1 年前3
 PostgreSQL 8.0 Documentation..................................................................233 16.2. Creating a Database Cluster .................................................................................233 16.3. Starting .......................269 16.7. Secure TCP/IP Connections with SSL .................................................................270 16.8. Secure TCP/IP Connections with SSH Tunnels............... ......................................................287 19.2.4.1. Ident Authentication over TCP/IP...............................................287 19.2.4.2. Ident Authentication over Local Sockets0 码力 | 1332 页 | 9.76 MB | 1 年前3
 PostgreSQL 8.1.11 Documentation..................................................................267 16.2. Creating a Database Cluster ........................................................................................267 16.3 ...................279 16.7. Secure TCP/IP Connections with SSL ........................................................................280 16.8. Secure TCP/IP Connections with SSH Tunnels............ ......................................................335 20.2.4.1. Ident Authentication over TCP/IP......................................................335 20.2.4.2. Ident Authentication over Local0 码力 | 1582 页 | 12.19 MB | 1 年前3
 PostgreSQL 8.1 Documentation..................................................................266 16.2. Creating a Database Cluster ........................................................................................266 16.3 ...................278 16.7. Secure TCP/IP Connections with SSL ........................................................................279 16.8. Secure TCP/IP Connections with SSH Tunnels............ ......................................................333 20.2.4.1. Ident Authentication over TCP/IP......................................................333 20.2.4.2. Ident Authentication over Local0 码力 | 1548 页 | 11.54 MB | 1 年前3
 PostgreSQL 8.2 Documentation..................................................................280 16.2. Creating a Database Cluster ........................................................................................280 16.3 ...................292 16.7. Secure TCP/IP Connections with SSL ........................................................................293 16.8. Secure TCP/IP Connections with SSH Tunnels............ ......................................................352 20.2.4.1. Ident Authentication over TCP/IP......................................................352 20.2.4.2. Ident Authentication over Local0 码力 | 1748 页 | 13.12 MB | 1 年前3
 PostgreSQL 8.2 Documentation..................................................................280 16.2. Creating a Database Cluster ........................................................................................280 16.3 ...................292 16.7. Secure TCP/IP Connections with SSL ........................................................................293 16.8. Secure TCP/IP Connections with SSH Tunnels............ ......................................................352 20.2.4.1. Ident Authentication over TCP/IP......................................................352 20.2.4.2. Ident Authentication over Local0 码力 | 1762 页 | 5.43 MB | 1 年前3
 PostgreSQL 14.10 Documentation................................................................. 581 19.2. Creating a Database Cluster ....................................................................... 581 19.3. Starting the Database .............................................................. 595 19.6. Upgrading a PostgreSQL Cluster ................................................................ 596 19.7. Preventing Server Spoofing ......................... 600 19.9. Secure TCP/IP Connections with SSL ......................................................... 601 19.10. Secure TCP/IP Connections with GSSAPI Encryption ...........0 码力 | 3032 页 | 13.27 MB | 1 年前3
 PostgreSQL 14.10 DocumentationAccount ............................................................. 552 19.2. Creating a Database Cluster ................................................................. 552 19.3. Starting the Database .............................................................. 566 19.6. Upgrading a PostgreSQL Cluster .......................................................... 567 19.7. Preventing Server Spoofing TCP/IP Connections with SSL .................................................... 571 19.10. Secure TCP/IP Connections with GSSAPI Encryption ............................. 575 19.11. Secure TCP/IP Connections0 码力 | 2871 页 | 13.38 MB | 1 年前3
 PostgreSQL 17beta1 US Documentation................................................................. 628 18.2. Creating a Database Cluster ....................................................................... 628 18.3. Starting the Database .............................................................. 642 18.6. Upgrading a PostgreSQL Cluster ................................................................ 643 18.7. Preventing Server Spoofing ......................... 647 18.9. Secure TCP/IP Connections with SSL ......................................................... 648 18.10. Secure TCP/IP Connections with GSSAPI Encryption ...........0 码力 | 3188 页 | 14.32 MB | 1 年前3
 PostgreSQL 13.14 Documentation................................................................. 566 18.2. Creating a Database Cluster ....................................................................... 566 18.3. Starting the Database .............................................................. 580 18.6. Upgrading a PostgreSQL Cluster ................................................................ 581 18.7. Preventing Server Spoofing ......................... 585 18.9. Secure TCP/IP Connections with SSL ......................................................... 586 18.10. Secure TCP/IP Connections with GSSAPI Encryption ...........0 码力 | 2940 页 | 12.89 MB | 1 年前3
共 44 条
- 1
 - 2
 - 3
 - 4
 - 5
 













