This is Practical Linux Forensics
2022-09-13 22:00:40 2.16MB linux
1
从DX的体系结构的角度讲解DX。读了本书后,不但了解了DX11的基本的函数使用,而且明白了函数的作用,函数间的联系。本书首先从理论出发,讲解DX11的体系结构。然后在用几个实例来说明前面所讲解的理论知识。建议阅读本书前先大体了解一下graphics pipeline方面的知识,不过书中也有讲解。看不懂时再查书也行。
2022-08-30 16:28:44 36.68MB Directx 11;体系结构
1
Practical SQL is an approachable and fast-paced guide to SQL (Structured Query Language), the standard programming language for defining, organizing, and exploring data in relational databases. The book focuses on using SQL to find the story your data tells, with the popular open-source database PostgreSQL and the pgAdmin interface as its primary tools. You’ll first cover the fundamentals of databases and the SQL language, then build skills by analyzing data from the U.S. Census and other federal and state government agencies. With exercises and real-world examples in each chapter, this book will teach even those who have never programmed before all the tools necessary to build powerful databases and access information quickly and efficiently.
2022-08-29 22:03:32 4.58MB SQL
1
软件认证标准
2022-08-26 11:24:32 4.63MB DO-178C
1
知识图谱Knowledge Graphs- A Practical Introduction across Disciplines
2022-08-18 21:05:01 33.75MB 知识图谱 人工智能 知识表示
1
Flare论文阅读总结(部分有参考知乎博主,侵删),本资源仅供本人使用
2022-08-16 22:05:13 534KB VR 人工智能 论文阅读
1
FreeRTOS资料英文版v1.0.5
2022-07-14 11:01:49 1.25MB freeRTOS
1
数据库无锁化设计指导文档
2022-07-08 11:06:23 565KB 数据库 无锁化
1
最优化的神书,尤其是凸规划方面,这本书可以帮助你解决很多这方面的问题。
2022-07-06 09:52:10 5.03MB 最优化
1
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code. The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM. What you’ll learn TPM 2.0 architecture fundamentals, including changes from TPM 1.2 TPM 2.0 security concepts Essential application development techniques A deep dive into the features of TPM 2.0 A primer on the execution environments available for application development. Learn as you go! Who this book is for Application software developers, OS developers, device-driver developers, and embedded-device specialists, who will benefit from mastering TPM 2.0 capabilities and building their own applications quickly. This book will give them the tools they need to experiment with and understand the technology. Software architects who need to understand the security guarantees provided by TPMs Managers who fund the projects that use TPMs. Non-technical users who may want to know why TPMs are on their computers and how to make use of them.
2022-07-04 01:54:27 5.34MB TPM 可信计算 Trused Computing
1