《为Windows Vista编写安全的代码》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - Cryptographic Enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars
上传时间: 2016-01-07
上传用户:zxc23456789
一个简单的人工神经网络的代码。其初始输出是无意义的字符串,最终输出是著名的"Hello world!":)
上传时间: 2016-01-10
上传用户:冇尾飞铊
B树算法实现,非常难得!btree implementation for random lookups, transaction handling, sequential access methods, and a small embeddable footprint.
上传时间: 2014-01-10
上传用户:王小奇
This a naive implementation of BOOTP/TFTPBOOT, the protocols to use to bootstrap a computer through a TCP/IP network. The goal was to design a small footprint implementation to allow the code to be integrated into a monitor program stored in a ROM/FLASH, the footprint is about 7 KBytes for the test program. This code has not been yet tested in many environment. It should be seen at your starting point to integrate the network boot function to your board.
标签: implementation bootstrap protocols TFTPBOOT
上传时间: 2013-12-18
上传用户:极客
The Linux Enterprise Cluster explains how to take a number of inexpensive computers with limited resources, place them on a normal computer network, and install free software so that the computers act together like one powerful server. This makes it possible to build a very inexpensive and reliable business system for a small business or a large corporation. The book includes information on how to build a high-availability server pair using the Heartbeat package, how to use the Linux Virtual Server load balancing software, how to configure a reliable printing system in a Linux cluster environment, and how to build a job scheduling system in Linux with no single point of failure. The book also includes information on high availability techniques that can be used with or without a cluster, making it helpful for System Administrators even if they are not building a cluster. Anyone interested in deploying Linux in an environment where low cost computer reliability is important will find this book useful.
标签: inexpensive Enterprise computers explains
上传时间: 2014-11-29
上传用户:zhangliming420
FIST可堆叠文件系统,linux文件系统修改相关的开源软件,使得对linux文件系统功能的改进很简单了 The FiST (File System Translator) system combines two methods to solve the above problems in a novel way: a set of stackable file system templates for each operating system, and a high-level language that can describe stackable file systems in a cross-platform portable fashion. Using FiST, stackable file systems need only be described once. FiST s code generation tool, fistgen, compiles a single file system description into loadable kernel modules for several operating systems (currently Solaris, Linux, and FreeBSD). The project demonstrates that with FiST, code size and development time are reduced significantly, while imposing a small performance overhead of only 1-2%. These benefits are achieved, as well as portability, without changing existing operating systems or file system.
上传时间: 2014-01-10
上传用户:xsnjzljj
TinyLogin is a suite of tiny Unix utilities for handling logging into, being authenticated by, changing one s password for, and otherwise maintaining users and groups on an embedded system. It also provides shadow password support to enhance system security. TinyLogin is, as the name implies, very small, and makes an excellent complement to BusyBox on an embedded System. It can be used without BusyBox, of course, but I envision them being used together most of the time.
标签: authenticated TinyLogin utilities handling
上传时间: 2016-01-30
上传用户:253189838
Developing internationalized products is a continuous balancing act. Developers and their managers often grossly underestimate the level of effort and attention to detail required to create either a world-ready, single-binary application ready for use in many different markets, or high-quality, foreign-language editions of a product. If you are a developer, make sure your management understands what is involved.
标签: internationalized Developing Developers continuous
上传时间: 2014-12-05
上传用户:TRIFCT
thinkinjava2English Thinking in Java, 2nd Edition, Release 11 To be published by Prentice-Hall mid-June, 2000 Bruce Eckel, President, MindView, Inc. Planet PDF brings you the Portable Document Format (PDF) version of Thinking in Java (2nd Edition). Planet PDF is the premier PDF-related site on the web. There is news, software, white papers, interviews, product reviews, Web links, code samples, a forum, and regular articles by many of the most prominent and respected PDF experts in the world. Visit our sites for more detail: http://www.planetpdf.com/ http://www.codecuts.com/ http://www.pdfforum.com/ http://www.pdfstore.com/
标签: thinkinjava2English Prentice-Hall published Thinking
上传时间: 2014-01-15
上传用户:ANRAN
for the TI dm6446 platformBackground subtraction moduleMaintain a background model, which can distinguish background, foreground and theft/left pixelsShadow removal moduleDetect shadow regions in monochrome videosCamera shift detection and suppression moduleDetect of small camera shift, and suppress the false alarms due to themBlob extraction moduleExtract connected foreground and theft/left pixels as blobsTheft/left baggage distinguish moduleDistinguish theft blobs and left baggage blobs
标签: platformBackground moduleMaintain subtraction background
上传时间: 2013-12-17
上传用户:xinzhch