自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+
  • 博客(0)
  • 资源 (27)
  • 收藏
  • 关注

空空如也

8B10B编解码及FPGA实现(转)

8B10B编解码及FPGA实现(转)

2022-04-20

eMMC完全解读、一份很好的eMMC学习资料

eMMC完全解读

2022-04-20

A Developer's Guide to Amazon SimpleDB.pdf

A Developer's Guide to Amazon SimpleDB

2019-09-24

Cloud Computing.pdf

Cloud Computing Networking

2019-09-24

Web Security.pdf

Web attack techniques can be divided into several stages. In the Web 1.0 era, people were more concerned about server-side dynamic scripting security issues, such as an executable script (commonly known as web shell) uploaded to the server to obtain permission. The popularity of dynamic scripting languages and insufficient cognition of web technologies on security issues in the early stages caused a lot of issues, such as the PHP language still having to rely on good code specifications to ensure that no file contains a loophole, but not on the language itself to prevent the occurrence of such security issues. SQL injection is a milestone in the history of web security; it first appeared in about 1999 and quickly became a major threat to web security. Programmers worked hard to amend the loopholes in the system and to contain the attacks, as otherwise hackers can access important and sensitive data through SQL injection attacks and can even access the system through the database. SQL injection attack is as effective, if not better, than a direct attack, which makes it popular with hackers. Vulnerability to SQL injection attacks is therefore still an important concern in the web security field.

2019-09-24

THE PRACTICE OF NETWORK SECURITY MONITORING

The goal of this book is to help you start detecting and responding to digital intrusions using networkcentric operations, tools, and techniques.

2018-09-03

TCPIP协议初始化

TCP/IP协议在Linux下的初始化流程

2018-09-03

Microsoft SharePoint Developer Ref

Microsoft SharePoint Developer Ref

2018-09-03

DNP V3.0 Protocol

DNP V3.0 Protocol. DNP is a industrial protocol, and applys in many field

2018-09-03

MatlabControlSystemsEngineering

MATLAB offers an integrated environment in which you can design control systems.

2018-09-03

KFC管理制度

在竞争激烈的快餐市场中,西式快餐总能立于潮头,是因为它有着第一流的管理。西式快餐提出的目标是100%的顾客满意。即顾客在西式快餐所能得到的服务要多于他原来所期望得到的服务。这就要求员工要有敬业精神,对顾客的服务要细致入微。优质的产品(Q),快速友善的服务(S),清洁卫生(C)的用餐环境以及物超所值(V)是西式快餐管理的四大要素。

2018-09-03

Resource Optimization and Security for Cloud Services 123

This book is a research monograph. It covers the state of the art in the resource optimization and security of cloud services. The book includes a study of trustworthiness, percentile response time, service availability and authentication among cloud service stations or sites that may be owned by different service providers.

2018-09-03

wolfSSL-Manual

This manual is written as a technical guide to the wolfSSL, formerly CyaSSL, embedded SSL library. It will explain how to build and get started with wolfSSL, provide an overview of build options, features, portability enhancements, support, and much more

2015-08-16

SMTP_STARTTLS

SMTP Service Extension for Secure SMTP over Transport Layer Security

2015-08-16

C指针经验总结

要了解指针,多多少少会出现一些比较复杂的类型,所以我先介绍 一下如何完全理解一个复杂类型,要理解复杂类型其实很简单,一 个类型里会出现很多运算符,他们也像普通的表达式一样,有优先 级,其优先级和运算优先级一样,所以我总结了一下其原则: 从变量名处起,根据运算符优先级结合,一步一步分析

2014-06-03

Programming Interviews Exposed

Before starting your job search, there are some preliminary tasks to perform. There’s no point applying for jobs without knowing what you like, for example. Just being a good coder isn’t enough—you have to understand what the market wants and how you can adapt your own skills to find the right job for yourself

2014-06-03

CareerCup top 150 Questions

Studying helps, but nothing can prepare you like the real thing. Each CareerCup interviewer has given over a hundred interviews at Google, Microsoft, or Amazon. To nail your interview, sit down with a trained interviewer and get their experienced feedback

2014-06-03

Google面试题目

Hacking a google interview handout, it is very good, you can reference a lot of from it

2014-06-03

The Algorithm Design Manual

非常好的算法设计指导英文书。 This book is intended as a manual on algorithm design, providing access to combinatorial algorithm technology for both students and computer professionals. It is divided into two parts: Techniques and Resources.

2014-06-03

数据结构及其习题答案

本书是《Data Structure and Algorithm Analysis In C》及其习题答案。作者更加精炼并强化了他对算法及数据结构方面创新的处理方法。通过C程序来实现。

2014-06-03

Linux 2.4.x Initialization for IA-32

Linux 2.4.x Initialization for IA-32Linux 2.4.x Initialization for IA-32

2010-09-09

programming-interviews-exposed

programming-interviews-exposed, a good book

2010-09-09

Learning the vi Editor

Learning the vi EditorLearning the vi EditorLearning the vi Editor

2010-09-09

Linux2.6 内核的 Initrd 机制解析

Linux2.6 内核的 Initrd 机制解析Linux2.6 内核的 Initrd 机制解析

2010-09-09

Linux 信号signal处理机制

Linux 信号signal处理机制,Linux 信号signal处理机制

2010-09-09

ARM Procedure Call Standard

ARM Procedure Call Standard, ARM Procedure Call Standard

2010-09-09

Embedded FreeBSD Cookbook

Embedded FreeBSD Cookbook, linux

2010-09-09

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除