21 projects for "stock control software" with 2 filters applied:

  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 1
    jCasbin

    jCasbin

    An authorization library that supports access control models

    An authorization library that supports access control models like ACL, RBAC, ABAC for Golang, Java, C/C++, Node.js, Javascript, PHP, Laravel, Python, .NET (C#), Delphi, Rust, Ruby, Swift (Objective-C), Lua (OpenResty), Dart (Flutter) and Elixir. In Casbin, an access control model is abstracted into a CONF file based on the PERM metamodel (Policy, Effect, Request, Matchers). So switching or upgrading the authorization mechanism for a project is just as simple as modifying a configuration....
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    JPA Security is an Access Control Solution for the Java Persistence API. JPA Security enables you to configure access control to your JPA Entity Beans based on the currently authenticated user and its roles via XML or Annotations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Webiness

    Webiness

    Lightweight PHP framework

    Webiness is lightweight PHP framework based on MVC design pattern. It has a very straightforward installation process that requires only a minimal configuration, so it can save you a lot of hassle. Also, it canbe an ideal choice if you want to avoid PHP version conflict, as it works on all PHP versions from 5.3. Webiness extensively uses the lazy loading technique so, in most cases, it is faster then other frameworks. It can be used for rapid prototyping of web applications. Webiness is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    An Open Source Knowledge Base System

    An open source, web based, platform independent knowledge base system.

    Free open source knowledge base software. Extensively search-able, Versatile and easy to use. easy to set up and administer. Comment hover links let you read in an AJAX generated hover window, the comments to an article in the main list view without having to go to the comments page. Password protected user accounts, and group support, with read only guest user, full control admin, power user/moderator, and default data entry user with restricted privileges.
    Downloads: 0 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 5
    SIPve

    SIPve

    Videovigilancia, Control de Acceso y Carnetización

    Sistema Integrado de Protección Venezolano con capacidades de Videovigilancia, Control de Acceso y Carnetización para el resguardo físico de instalaciones.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Ralasafe Access Control Middleware focus on data-level privilege management, including database row/column and content privilege management. It also manages 2) login control; 3) function-level privilege management; and 4) URL privilege authentication
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Soutei is a trust-management system for access control in distributed systems. Soutei policies and credentials are written in a declarative logic-based language. Soutei policies are modular, concise, readable, supporting conditional delegation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Commons-SSH is a thin bridge between different Java SSH implementations libraries. It doesn't contain any crypto-related code and created to be used by projects who doesn't want to care about export control regulations (let client to decide)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    ENCAM is an asset management database and configuration backup tool for Cisco network devices. ENCAM pulls configuration data from devices, stores it, reports changes, analyzes configuration defects, generates asset lists and compliance reports.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 10
    Hiitch is a secure and advanced desktop social networking platform. It allows you to build a focused and private network of communities for your family, friends, company and etc. It gives you total control and freedom for your social networking needs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    The Security Annotation Framework (SAF) is an instance-level access control framework and field-level encryption framework driven by Java 5 annotations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Ease the pain of operating a Windows Vista system with User Account Control (UAC) enabled--similar to the sudo command available for *nix systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The goal of the project is to develop Role Based Access Control software which can be used in any application. The software can be deployed as a server which can cater to multiple applications. Rules can be written for fine grained access control.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The MACA objective is to provide user authentication, session management and authorization services independently of platform. Authorization servive is based on a contextual role-based access control model that extends NIST RBAC
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A robust and reliable user management sub-system is critical to an enterprise application system. Esecurity is a web services-based user management component that provides services for user authentication, access control, user profile management etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Execution monitor for Java Applications.<br/> BERSERK implements the Intercepting Filter design pattern. <br/> Allows composing and runtime editing of execution flow and intercept services with access control, logging or any user-defined filters.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A similar to Tripwire, file system integrity checking tool but develop in java and cross platform. This tools checking and source control using check sum algorithm like MD5, SHA and CRC.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    WebBTS - WebBTS is a tool created with PHP and MySQL to trace and mantain a bug database from the Web. With WebBTS you can manage bugs from a centralized place. WebBTS has suport to notify of operation on bugs via e-mail.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Terrier is a RBAC framework, business oriented and with focus on manageability and access control. Integrating all company tecnhnologies (java, ruby, delphi and others). The owner of a system can manage and delegate manageability to the systems, reducing
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The goal of Keen Manager is to design a simple and highly expandable control panel system for use by end-users and developers. It is also meant for having a multi-user authentication system in which each control panel can have it's own privilege system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Nubric (Near-real-time user behaviour and resource interaction control) is a framework for security and authentication-related modules written in Java. Its origin focus lies on network monitoring, dynamic, transparent firewalling and traffic control.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB