自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+

霏雯

君子居之,何陋之有!

  • 博客(0)
  • 资源 (14)
  • 收藏
  • 关注

空空如也

IEEE oui 17 Feb 2022

IEEE oui 17 Feb 2022

2022-02-17

IEEE oui 17 Feb 2022

IEEE oui 17 Feb 2022

2022-02-17

IEEE OUI 17 Feb 2022

IEEE OUI 17 Feb 2022

2022-02-17

IEEE_oui_Jul_2019.csv

An organizationally unique identifier (OUI) is a 24-bit number that uniquely identifies a vendor, manufacturer, or other organization. OUIs are purchased from the Institute of Electrical and Electronics Engineers (IEEE) Registration Authority by the assignee (IEEE term for the vendor, manufacturer, or other organization). They are used to uniquely identify a particular piece of equipment through derived identifiers such as MAC addresses,[1][2] Subnetwork Access Protocol protocol identifiers, World Wide Names for Fibre Channel devices.[3] In MAC addresses, the OUI is combined with a 24-bit number (assigned by the assignee of the OUI) to form the address. The first three octets of the address are the OUI.

2019-07-30

IEEE_oui_Jul_2019.txt

An organizationally unique identifier (OUI) is a 24-bit number that uniquely identifies a vendor, manufacturer, or other organization. OUIs are purchased from the Institute of Electrical and Electronics Engineers (IEEE) Registration Authority by the assignee (IEEE term for the vendor, manufacturer, or other organization). They are used to uniquely identify a particular piece of equipment through derived identifiers such as MAC addresses,[1][2] Subnetwork Access Protocol protocol identifiers, World Wide Names for Fibre Channel devices. In MAC addresses, the OUI is combined with a 24-bit number (assigned by the assignee of the OUI) to form the address. The first three octets of the address are the OUI.

2019-07-30

Everything curl

Everything curl is an extensive guide to everything there is to know about curl, the project, the command-line tool, the library, how everything started and how it came to be what it is today. How we work on developing it further, what it takes to use it, how you can contribute with code and bug reports and why all those millions of existing users use it. This book is meant to be interesting and useful to both casual readers and the somewhat more experienced developers, and offers something for you all to pick and choose from. Don't read it from front to back. Read the chapters you are curious about and go back and forth as you see fit.

2018-07-29

An introduction to Ajax: The history of Ajax...

The history of Ajax is similar to many other apparent overnight sensations. Although Ajax seemed to come out of nowhere, in reality it had been percolating for a while. Several years of work spread across the Web went into creating the tools and patterns that came together under the Ajax banner. Throughout the dHTML era of the original Internet bubble and into the dark years after the dot-com crash, developers around the world were unlocking the unexpected power of JavaScript to bring new and exciting application patterns to the web.

2018-07-29

AdvancED-DOM-Scripting

Too often our DOM scripting adventures are focused on the new glittery features and stray from the basics of good, clean web application design. As a result, I’ve emphasized best practices throughout the book and provided solutions that focus on usability and accessibility for both the end user and you, the developer or designer. You can keep this book next to your computer as a reference or read it cover to cover—it’s up to you. Either way, after working through the mix of theory, code, examples, and case studies you’ll find inside, you’ll be well on your way to understanding exactly how and why these advanced con- cepts work—not just what they do to your document.

2018-07-29

Practical Vim: Edit Text at the Speed of Thought

Vim is a fast and efficient text editor that will make you a faster and more efficient developer. It's available on almost every OS--if you master the techniques in this book, you'll never need another text editor. Practical Vim shows you 120 vim recipes so you can quickly learn the editor's core functionality and tackle your trickiest editing and writing tasks. Vim, like its classic ancestor vi, is a serious tool for programmers, web developers, and sysadmins. No other text editor comes close to Vim for speed and efficiency; it runs on almost every system imaginable and supports most coding and markup languages. Learn how to edit text the "Vim way:" complete a series of repetitive changes with The Dot Formula, using one keystroke to strike the target, followed by one keystroke to execute the change. Automate complex tasks by recording your keystrokes as a macro. Run the same command on a selection of lines, or a set of files. Discover the "very magic" switch, which makes Vim's regular expression syntax more like Perl's. Build complex patterns by iterating on your search history. Search inside multiple files, then run Vim's substitute command on the result set for a project-wide search and replace. All without installing a single plugin! You'll learn how to navigate text documents as fast as the eye moves--with only a few keystrokes. Jump from a method call to its definition with a single command. Use Vim's jumplist, so that you can always follow the breadcrumb trail back to the file you were working on before. Discover a multilingual spell-checker that does what it's told. Practical Vim will show you new ways to work with Vim more efficiently, whether you're a beginner or an intermediate Vim user. All this, without having to touch the mouse.

2018-07-29

IEEE oui.txt - 2018.7.17

This product was previously referred to as an OUI (Organizationally Unique Identifier) and is still referred to as such in many standards. OUI is an IEEE Registration Authority (RA) specific term that is referred to in various standards and may be used to identify companies on the IEEE Public Listing. A MA-L assignment includes an OUI and the right to generate various extended identifiers based on that OUI. It is most often used to create IEEE 802-defined MAC addresses (EUI-48 and EUI-64).

2018-07-29

Penetration Testing with the Bash shell

This book teaches you to take your problem solving capabilities to the next level with the Bash shell, to assess network and application level security by leveraging the power of the command-line tools available with Kali Linux. The book begins by introducing some of the fundamental bash scripting and information processing tools. Building on this, the next few chapters focus on detailing ways to customize your Bash shell using functionalities such as tab completion and rich text formatting. After the fundamental customization techniques and general purpose tools have been discussed, the book breaks into topics such as the command-line-based security tools in the Kali Linux operating system. The general approach in discussing these tools is to involve general purpose tools discussed in previous chapters to integrate security assessment tools. This is a one stop solution to learn Bash and solve information security problems.

2018-07-29

Hacking the Hacker Learn From the Experts Who Take Down Hackers

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top.

2018-07-29

IntelD845EPI电子版手册,BIOS更新程序,

IntelD845EPI电子版手册,词汇表,BIOS更新程序. IntelD845EPI这款老板子不支持U盘启动,通过刷新BIOS可以实现此功能.附带电子版技术手册.

2009-06-29

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除