BRU-3:野兽派徽标生成器
1
Art-Net4中文文档
2021-01-28 03:21:09 671KB Art-Net 灯光
1
本书详尽地介绍了计算机安全的理论与实践,阐释了该领域最基本和最普遍的知识,包括计算机安全的本质和面临的挑战,策略与安全的关系,密码学的角色与应用,策略实现机制,保障技术和方法学,脆弱性分析和入侵检测等。同时把计算机系统、网络、人为因素和密码学等概念融为一体,本书可作为信息安全、计算机等相关专业本科生、研究生的教科书和学习参考书,也可作为维护网络和计算机系统安全的管理人员、信息安全技术开发人员的工具书和参考书。 The importance of computer security has increased dramatically during the past few years. Bishop provides a monumental reference for the theory and practice of computer security. This is a textbook intended for use at the advanced undergraduate and introductory graduate levels, non-University training courses, as well as reference and self-study for security professionals. Comprehensive in scope, this covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. Bishop treats the management and engineering issues of computer. Excellent examples of ideas and mechanisms show how disparate techniques and principles are combined (or not) in widely-used systems. Features a distillation of a vast number of conference papers, dissertations and books that have appeared over the years, providing a valuable synthesis. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies. Preface Goals Philosophy Organization Roadmap Dependencies Background UndergraduateLevel GraduateLevel Practitioners SpecialAcknowledgment Acknowledgments PART1:INTRODUCTION ChapterIAnOverviewofComputerSecurity 1.1TheBasicComponents 1.2Threats 1.3PolicyandMechanism 1.4AssumptionsandTrust 1.5Assurance 1.6OperationalIssues 1.7HumanIssues 1.8TyingItAllTogether 1.9Summary 1.10ResearchIssues 1.11FurtherReading 1.12Exercises PART2:FOUNDATIONS Chapter2AccessControlMatrix 2.1ProtectionState 2.2AccessControlMatrixModel 2.3ProtectionStateTransitions 2.4Copying,Owning,andtheAttenuationofPrivilege 2.5Summary 2.6ResearchIssues 2.7FurtherReading 2.8Exercises Chapter3FoundationalResults 3.1TheGeneralQuestion 3.2BasicResults 3.3TheTake-GrantP
2020-12-22 21:18:32 9.16MB 计算机安全 理论 PDF
1
版本:4.13.1 编译的 artTemplate.js ,使用简洁语法,引入template-web.js即可。更多帮助文档可以自己百度,很简洁的一款
2020-02-19 03:06:37 6KB template artTemplate
1
Stephen Lucas 的著作 原书第10版 教你如何演讲
2020-02-13 03:11:18 12.46MB public speaking
1
Numerical Recipes - The Art of Scientific Computing(3rd) 英文无水印pdf 第3版 pdf所有页面使用FoxitReader和PDF-XChangeViewer测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 本资源转载自网络,如有侵权,请联系上传者或csdn删除
2020-01-29 03:12:14 20.41MB Numerical Recipes Art Scientific
1
Hacking The Art Of Exploitation 2nd Edition 英文版
2020-01-17 03:05:31 3.7MB 黑客 黑客攻击利用
1
Numerical Recipes 3rd Edition: The Art of Scientific Computing 科学计算艺术第二版第三版C++、无水印清晰版。附带相对应的源代码。以下为该书英文简介: Do you want easy access to the latest methods in scientific computing? This greatly expanded third edition of Numerical Recipes has it, with wider coverage than ever before, many new, expanded and updated sections, and two completely new chapters. The executable C++ code, now printed in colour for easy reading, adopts an object-oriented style particularly suited to scientific applications. Co-authored by four leading scientists from academia and industry, Numerical Recipes starts with basic mathematics and computer science and proceeds to complete, working routines. The whole book is presented in the informal, easy-to-read style that made earlier editions so popular.
2020-01-16 03:15:53 17.02MB 科学计算艺术 pdf C++ 源代码
1
怎样画出你看到的,绘画初学者很实用,想学美术的程序员可以
2020-01-03 11:28:07 30.41MB draw book art 程序员美术
1
The.Art.of.UNIX.programming 这本书的另一个特色是它的百科全书般的博大与庞杂,Raymond凭借他对Unix系统的无比熟悉,如同一位资深导游一般,游刃有余地带着一干读者在Unix系统地大观园里纵横捭阖、几出几进,时而历数各种开发工具,时而盘点众多文档格式,如数家珍般介绍着关于Unix系统的零零种种。如果没有一段时间的Unix经验的读者,恐怕真是要像刘姥姥一般感到晕头转向了;而如果你像我一样经常生活在Unix下,依然能够发现自己其实一直“视若无睹”地忽略了不少大观园里的景致。而当Raymond 为你点开这些迷雾的时候,读者不禁要如梦初醒般大呼痛快了
1