8B10B编解码及FPGA实现(转)
8B10B编解码及FPGA实现(转)
Cloud Computing.pdf
Cloud Computing Networking
Web Security.pdf
Web attack techniques can be divided into several stages. In the Web 1.0 era, people were more concerned about server-side dynamic scripting security issues, such as an executable script (commonly known as web shell) uploaded to the server to obtain permission. The popularity of dynamic scripting languages and insufficient cognition of web technologies on security issues in the early stages caused a lot of issues, such as the PHP language still having to rely on good code specifications to ensure that no file contains a loophole, but not on the language itself to prevent the occurrence of such security issues. SQL injection is a milestone in the history of web security; it first appeared in about 1999 and quickly became a major threat to web security. Programmers worked hard to amend the loopholes in the system and to contain the attacks, as otherwise hackers can access important and sensitive data through SQL injection attacks and can even access the system through the database. SQL injection attack is as effective, if not better, than a direct attack, which makes it popular with hackers. Vulnerability to SQL injection attacks is therefore still an important concern in the web security field.
THE PRACTICE OF NETWORK SECURITY MONITORING
The goal of this book is to help you start detecting
and responding to digital intrusions using networkcentric
operations, tools, and techniques.
TCPIP协议初始化
TCP/IP协议在Linux下的初始化流程
Microsoft SharePoint Developer Ref
Microsoft SharePoint Developer Ref
DNP V3.0 Protocol
DNP V3.0 Protocol. DNP is a industrial protocol, and applys in many field
MatlabControlSystemsEngineering
MATLAB offers an integrated environment in which you can design control systems.
KFC管理制度
在竞争激烈的快餐市场中,西式快餐总能立于潮头,是因为它有着第一流的管理。西式快餐提出的目标是100%的顾客满意。即顾客在西式快餐所能得到的服务要多于他原来所期望得到的服务。这就要求员工要有敬业精神,对顾客的服务要细致入微。优质的产品(Q),快速友善的服务(S),清洁卫生(C)的用餐环境以及物超所值(V)是西式快餐管理的四大要素。
Resource Optimization and Security for Cloud Services 123
This book is a research monograph. It covers the state of
the art in the resource optimization and security of cloud
services. The book includes a study of trustworthiness,
percentile response time, service availability and
authentication among cloud service stations or sites that may
be owned by different service providers.
wolfSSL-Manual
This manual is written as a technical guide to the wolfSSL, formerly CyaSSL, embedded SSL library. It will explain how to build and get started with wolfSSL, provide an overview of build options, features, portability enhancements, support, and much more
SMTP_STARTTLS
SMTP Service Extension for Secure SMTP over Transport Layer Security
C指针经验总结
要了解指针,多多少少会出现一些比较复杂的类型,所以我先介绍
一下如何完全理解一个复杂类型,要理解复杂类型其实很简单,一
个类型里会出现很多运算符,他们也像普通的表达式一样,有优先
级,其优先级和运算优先级一样,所以我总结了一下其原则:
从变量名处起,根据运算符优先级结合,一步一步分析
Programming Interviews Exposed
Before starting your job search, there are some preliminary tasks to perform. There’s no point
applying for jobs without knowing what you like, for example. Just being a good coder isn’t
enough—you have to understand what the market wants and how you can adapt your own skills
to find the right job for yourself
CareerCup top 150 Questions
Studying helps, but nothing can prepare you like the real thing. Each CareerCup interviewer
has given over a hundred interviews at Google, Microsoft, or Amazon. To nail your interview,
sit down with a trained interviewer and get their experienced feedback
Google面试题目
Hacking a google interview handout, it is very good, you can reference a lot of from it
The Algorithm Design Manual
非常好的算法设计指导英文书。 This book is intended as a manual on algorithm design, providing access to
combinatorial algorithm technology for both students and computer professionals.
It is divided into two parts: Techniques and Resources.
数据结构及其习题答案
本书是《Data Structure and Algorithm Analysis In C》及其习题答案。作者更加精炼并强化了他对算法及数据结构方面创新的处理方法。通过C程序来实现。
Linux 2.4.x Initialization for IA-32
Linux 2.4.x Initialization for IA-32Linux 2.4.x Initialization for IA-32
programming-interviews-exposed
programming-interviews-exposed, a good book
Learning the vi Editor
Learning the vi EditorLearning the vi EditorLearning the vi Editor
Linux2.6 内核的 Initrd 机制解析
Linux2.6 内核的 Initrd 机制解析Linux2.6 内核的 Initrd 机制解析
Linux 信号signal处理机制
Linux 信号signal处理机制,Linux 信号signal处理机制
ARM Procedure Call Standard
ARM Procedure Call Standard, ARM Procedure Call Standard
Embedded FreeBSD Cookbook
Embedded FreeBSD Cookbook, linux