《为Windows Vista编写安全的代码》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - Cryptographic Enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars
上传时间: 2016-01-07
上传用户:zxc23456789
This forced me to write about more interesting and comprehensive sorting methods, the result of which is this one. Through this writing I have tried to give in-depth coverage of the entire sort algorithm I hope Peter wouldn t mind reading it. This article assumes that you really don t know about the iterations, looping, and so forth hence, it explains these in detail first.
标签: comprehensive interesting methods sorting
上传时间: 2016-01-10
上传用户:athjac
today bought a book, reflected good to upload source code package. 1. Based on the struts of customer information management system 2. Struts-based personnel management system 3. Office log system 4. E-government management system 5. Food industry Invoicing System 6 SMS Data Acquisition System
标签: reflected custome package bought
上传时间: 2014-07-09
上传用户:baitouyu
ICA介绍课件。There has been a wide discussion about the application of Independence Component Analysis (ICA) in Signal Processing, Neural Computation and Finance, first introduced as a novel tool to separate blind sources in a mixed signal. The Basic idea of ICA is to reconstruct from observation sequences the hypothesized independent original sequences
标签: Independence application discussion Component
上传时间: 2016-01-12
上传用户:AbuGe
This directory contains the memtest 8051 firmware for the Anchor Chips EZ-USB chip. The purpose of this software is to test the different memory segments in the Ez-Usb chip. This example will output the string "good" on the 7 segment LED if the mem test passes, or it will output the first address where the memtest fails.
标签: directory the contains firmware
上传时间: 2013-12-16
上传用户:gdgzhym
To date tests are still the best solution mankind has found to deliver working software. This book is the sum of four years of research and practice in the testing field. The practice comes from my IT consulting background, first at Octo Technology and then at Pivolis the research comes from my involvement with open source development at night and on weekends.
标签: solution software mankind deliver
上传时间: 2014-01-11
上传用户:sclyutian
This the second tutorial of the Writing Device Drivers series. There seems to be a lot of interest in the topic, so this article will pick up where the first left off. The main focus of these articles will be to build up little by little the knowledge needed to write device drivers. In this article, we will be building on the same example source code used in part one. In this article, we will expand on that code to include Read functionality, Handle Input/Ouput Controls also known as IOCTLs, and learn a bit more about IRPs.
标签: the interest tutorial Drivers
上传时间: 2016-01-28
上传用户:lmeeworm
How the K-mean Cluster work Step 1. Begin with a decision the value of k = number of clusters Step 2. Put any initial partition that classifies the data into k clusters. You may assign the training samples randomly, or systematically as the following: Take the first k training sample as single-element clusters Assign each of the remaining (N-k) training sample to the cluster with the nearest centroid. After each assignment, recomputed the centroid of the gaining cluster. Step 3 . Take each sample in sequence and compute its distance from the centroid of each of the clusters. If a sample is not currently in the cluster with the closest centroid, switch this sample to that cluster and update the centroid of the cluster gaining the new sample and the cluster losing the sample. Step 4 . Repeat step 3 until convergence is achieved, that is until a pass through the training sample causes no new assignments.
标签: the decision clusters Cluster
上传时间: 2013-12-21
上传用户:gxmm
This handbook is a concise guide to architecting, designing, and building J2EE applications. Whether you re architect your first J2EE application or looking to keep your projects on-time and on-budget, you will refer to this handbook again and again.
标签: architecting applications designing handbook
上传时间: 2016-02-10
上传用户:zhoujunzhen
此范例可在window的DOS上执行.有9各TASK分别秀出时间.执行方式解压锁COPY到C碟然后BC45\SOURCE下修改TEST.C在BC45\TEST下执行MAKETEST.BAT就可编绎出执行档 to show the starting time and completion time of each task in the first round.
标签: TEST MAKETEST window SOURCE
上传时间: 2016-02-14
上传用户:zhouchang199