- 博客(0)
- 资源 (17)
空空如也
Professional Python, Luke Sneeringer, 2016
英文版本,python编程书籍。
INTRODUCTION
PART I FUNCTIONS
CHAPTER 1 Decorators
CHAPTER 2 Context Managers
CHAPTER 3 Generators
PART II CLASSES
CHAPTER 4 Magic Methods
CHAPTER 5 Metaclasses
CHAPTER 6 Class Factories
CHAPTER 7 Abstract Base Classes
PART III DATA
CHAPTER 8 Strings and Unicode
CHAPTER 9 Regular Expressions
PART IV EVERYTHING ELSE
CHAPTER 10 Python 2 Versus Python 3
CHAPTER 11 Unit Testing
CHAPTER 12 CLI Tools
CHAPTER 13 asyncio
CHAPTER 14 Style
2017-11-01
CSA云计算安全技术要求
云安盟"云计算安全技术要求" 2016年10月发布,四标准合一文档。完整目录。
起草单位: 华为技术有限公司、 阿里云计算有限公司、 腾讯云计算(北京) 有限责任公司、 中兴通讯股份有限公司、 北京百度网讯科技有限公司
-------------------------------------------------------------------
云计算安全技术要求 第 1 部分: 总则
云计算安全技术要求 第 2 部分: IaaS 安全技术要求
云计算安全技术要求 第 3 部分: PaaS 安全技术要求
云计算安全技术要求 第 4 部分: SaaS 安全技术要求
2017-04-09
security guidance for critical areas of focus in cloud computing v3.0
CSA guidance, security guidance for critical areas of focus in cloud computing
V3.0
2017-04-09
Single Root I/O Virtualization and Sharing Specification Revision 1.1
Single Root I/O Virtualization and Sharing Specification Revision 1.1.
英文版本
2017-03-04
A Practical Guide to TPM 2.0
intel资深专家编写。
Chapter 1: History of the TPM
Chapter 2: Basic Security Concepts
Chapter 3: Quick Tutorial on TPM 2.0
Chapter 4: Existing Applications That Use TPMs
Chapter 5: Navigating the Specification
Chapter 6: Execution Environment
Chapter 7: TPM Software Stack
Chapter 8: TPM Entities
Chapter 9: Hierarchies
Chapter 10: Keys
Chapter 11: NV Indexes
Chapter 12: Platform Configuration Registers
Chapter 13: Authorizations and Sessions
Chapter 14: Extended Authorization (EA) Policies
Chapter 15: Key Management
Chapter 16: Auditing TPM Commands
Chapter 17: Decrypt/Encrypt Sessions
Chapter 18: Context Management
Chapter 19: Startup, Shutdown, and Provisioning
Chapter 20: Debugging
Chapter 21: Solving Bigger Problems with the TPM 2.0
Chapter 22: Platform Security Technologies
2017-01-15
Building the Infrastructure for Cloud Security
intel资深专家编写.
Chapter 1: Introduction to Trust and Intel Trusted Execution Technology
Chapter 2: Fundamental Principles of Intel TXT
Chapter 3: Getting It to Work: Provisioning Intel TXT
Chapter 4: Foundation for Control: Establishing Launch Control Policy
Chapter 5: Raising Visibility for Trust: The Role of Attestation
Chapter 6: Trusted Computing: Opportunities in Software
Chapter 7: Creating a More Secure Datacenter and Cloud
Chapter 8: The Future of Trusted Computing
2017-01-15
Efficient Android Threading.Asynchronous processing techniques.2014
Efficient Android Threading.Asynchronous processing techniques.2014
2014-07-19
Learn Java for Android Development 3rd Edition
Learn Java for Android Development 3rd Edition
2014-07-19
android recipes--A problem-solution approach 3rd
android recipes--A problem-solution approach 3rd
2014-07-19
空空如也
TA创建的收藏夹 TA关注的收藏夹
TA关注的人