• 博客(0)
  • 资源 (17)

空空如也

Professional Python, Luke Sneeringer, 2016

英文版本,python编程书籍。 INTRODUCTION PART I FUNCTIONS CHAPTER 1 Decorators CHAPTER 2 Context Managers CHAPTER 3 Generators PART II CLASSES CHAPTER 4 Magic Methods CHAPTER 5 Metaclasses CHAPTER 6 Class Factories CHAPTER 7 Abstract Base Classes PART III DATA CHAPTER 8 Strings and Unicode CHAPTER 9 Regular Expressions PART IV EVERYTHING ELSE CHAPTER 10 Python 2 Versus Python 3 CHAPTER 11 Unit Testing CHAPTER 12 CLI Tools CHAPTER 13 asyncio CHAPTER 14 Style

2017-11-01

CSA云计算安全技术要求

云安盟"云计算安全技术要求" 2016年10月发布,四标准合一文档。完整目录。 起草单位: 华为技术有限公司、 阿里云计算有限公司、 腾讯云计算(北京) 有限责任公司、 中兴通讯股份有限公司、 北京百度网讯科技有限公司 ------------------------------------------------------------------- 云计算安全技术要求 第 1 部分: 总则 云计算安全技术要求 第 2 部分: IaaS 安全技术要求 云计算安全技术要求 第 3 部分: PaaS 安全技术要求 云计算安全技术要求 第 4 部分: SaaS 安全技术要求

2017-04-09

security guidance for critical areas of focus in cloud computing v3.0

CSA guidance, security guidance for critical areas of focus in cloud computing V3.0

2017-04-09

云安全指南中文版 v3.0

云计算关键领域安全指南 V3.0 中文版本

2017-04-09

Single Root I/O Virtualization and Sharing Specification Revision 1.1

Single Root I/O Virtualization and Sharing Specification Revision 1.1. 英文版本

2017-03-04

Practical guide to TPM2.0 ppt

intel资深专家。《A Practical Guide to TPM 2.0》一书的作者编写的ppt。

2017-01-15

A Practical Guide to TPM 2.0

intel资深专家编写。 Chapter 1: History of the TPM Chapter 2: Basic Security Concepts Chapter 3: Quick Tutorial on TPM 2.0 Chapter 4: Existing Applications That Use TPMs Chapter 5: Navigating the Specification Chapter 6: Execution Environment Chapter 7: TPM Software Stack Chapter 8: TPM Entities Chapter 9: Hierarchies Chapter 10: Keys Chapter 11: NV Indexes Chapter 12: Platform Configuration Registers Chapter 13: Authorizations and Sessions Chapter 14: Extended Authorization (EA) Policies Chapter 15: Key Management Chapter 16: Auditing TPM Commands Chapter 17: Decrypt/Encrypt Sessions Chapter 18: Context Management Chapter 19: Startup, Shutdown, and Provisioning Chapter 20: Debugging Chapter 21: Solving Bigger Problems with the TPM 2.0 Chapter 22: Platform Security Technologies

2017-01-15

Building the Infrastructure for Cloud Security

intel资深专家编写. Chapter 1: Introduction to Trust and Intel Trusted Execution Technology Chapter 2: Fundamental Principles of Intel TXT Chapter 3: Getting It to Work: Provisioning Intel TXT Chapter 4: Foundation for Control: Establishing Launch Control Policy Chapter 5: Raising Visibility for Trust: The Role of Attestation Chapter 6: Trusted Computing: Opportunities in Software Chapter 7: Creating a More Secure Datacenter and Cloud Chapter 8: The Future of Trusted Computing

2017-01-15

android tutorial

android tutorial general

2014-07-19

TI-Android-ICS-BootTimeOptimization

TI-Android-ICS-BootTimeOptimization

2014-07-19

Efficient Android Threading.Asynchronous processing techniques.2014

Efficient Android Threading.Asynchronous processing techniques.2014

2014-07-19

Learning Android Intents Jan 2014

Learning Android Intents Jan 2014

2014-07-19

Learn Java for Android Development 3rd Edition

Learn Java for Android Development 3rd Edition

2014-07-19

Learn Java for Android Development

Learn Java for Android Development

2014-07-19

android recipes--A problem-solution approach 3rd

android recipes--A problem-solution approach 3rd

2014-07-19

android in Practice 3rd

android in practice 3rd 第三版

2014-07-19

android in action

android in action, 3rd

2014-07-19

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除