您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Java简单讲义及习题

  2. JAVA简单讲义和习题from麻省理工."This course focuses on introducing the language, libraries, tools and concepts of JavaTM. The course is specifically targeted at students who intend to take 6.170 in the following term and feel they would struggle because they l
  3. 所属分类:Java

    • 发布日期:2009-10-25
    • 文件大小:1048576
    • 提供者:leonliuxue
  1. WINDOWS程序调试.pdf

  2. 常见问题 前言 简介 第一部分调试策略 第1章 调试的过程 1.1 错误的调试五步曲 1.2 正确的调试五步曲 1.3 确定错误的存在 1.4 收集错误信息 1.5 分析错误信息 1.6 消除错误 1.7 修改的验证 1.8 巧妙地而不是艰苦地调试 1.9 推荐阅读 第2章 编写便于调试的C++代码 2.1 设计 2.2 C++编程风格 2.3 C++语言 2.4 Visual C++编译器 2.5 推荐阅读 第3章 使用断言 3.1 断言的局限性 3.2 断言的类型 3.3 更多的MFC断言
  3. 所属分类:C++

    • 发布日期:2009-11-16
    • 文件大小:13631488
    • 提供者:chenhui1007
  1. Makefile的调试.pdf

  2. Debugging makefiles is somewhat of a black art. Unfortunately, there is no such thing as a makefile debugger to examine how a particular rule is being evaluated or a variable expanded. Instead, most debugging is performed with simple print statement
  3. 所属分类:其它

    • 发布日期:2010-02-24
    • 文件大小:305152
    • 提供者:leo_he
  1. object-oriented programming with ANSI c

  2. Object-oriented programming is the current cure-all — although it has been around for much more then ten years. At the core, there is little more to it then finally applying the good programming principles which we have been taught for more then twe
  3. 所属分类:C

    • 发布日期:2010-03-05
    • 文件大小:1048576
    • 提供者:amuseme_lu
  1. A study of peer-to-peer botnets 国外的一片硕士论文

  2. Botnets pose a great threat to all resources connected to the Internet. Systems not properly secured may potentially become part of a botnet army, while all systems are potential targets of a botnet attack. Two important facets in mitigating the thr
  3. 所属分类:网络基础

    • 发布日期:2010-05-01
    • 文件大小:920576
    • 提供者:borelist
  1. An analysis of the Slapper worm

  2. During the past decade, security bugs’ impact on a society dependent on a seamless and secure flow of information has become painfully evident. We’ve all learned the implications of security bugs and breaches the hard way, in a defensive and after-t
  3. 所属分类:专业指导

    • 发布日期:2010-05-01
    • 文件大小:231424
    • 提供者:borelist
  1. Linux命令行_学习参考

  2. 很好的linux命令行学习和参考书籍 Part 1 – Introduction.........................................................................1 1 – Introduction................................................................................................2 Why Use The Command
  3. 所属分类:Linux

    • 发布日期:2010-07-02
    • 文件大小:1048576
    • 提供者:gjhdy
  1. Hack Proofing Sun Solaris 8

  2. Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, an
  3. 所属分类:Web开发

    • 发布日期:2010-10-03
    • 文件大小:6291456
    • 提供者:sunxianbin
  1. Defensive.Database.Programming.with.SQL.Server

  2. Defensive.Database.Programming.with.SQL.Server
  3. 所属分类:其它

    • 发布日期:2010-12-17
    • 文件大小:3145728
    • 提供者:DoomLord
  1. defensive database programming

  2. Book about defensive database programming
  3. 所属分类:SQLServer

    • 发布日期:2011-03-12
    • 文件大小:3145728
    • 提供者:hwequal
  1. Developing Quality Metadata

  2. Data and metadata drives the TV production and broadcast scheduling systems. Metadata helps to manage content and when you examine a broadcast infrastructure, a lot of what is happening is to do with the manipulation of nonvideo data formats. Intera
  3. 所属分类:项目管理

    • 发布日期:2011-03-17
    • 文件大小:7340032
    • 提供者:cztgl
  1. Practical Mod Perl

  2. Practical Mod Perl Copyright Preface What You Need to Know Who This Book Is For How This Book Is Organized Reference Sections Filesystem Conventions Apache and Perl Versions Typographic Conventions Command Interpreter Program (Shell) Conven
  3. 所属分类:Perl

    • 发布日期:2008-04-05
    • 文件大小:2097152
    • 提供者:osoon
  1. Defensive Security Handbook: Best Practices for Securing Infrastructure

  2. Defensive Security Handbook: Best Practices for Securing Infrastructure by Lee Brotherston English | 3 Apr. 2017 | ASIN: B06Y18XC5Y | 268 Pages | AZW3 | 3.88 MB Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware a
  3. 所属分类:系统安全

    • 发布日期:2017-04-05
    • 文件大小:3145728
    • 提供者:u013003382
  1. Defensive.Security.Handbook.2017.4.pdf

  2. Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For compa
  3. 所属分类:其它

    • 发布日期:2017-07-24
    • 文件大小:30408704
    • 提供者:xinconan1992
  1. Defensive Security Handbook(O

  2. Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For compa
  3. 所属分类:系统安全

    • 发布日期:2017-07-27
    • 文件大小:30408704
    • 提供者:vanridin
  1. Defensive Security Handbook(O

  2. 内容简介: Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For
  3. 所属分类:其它

    • 发布日期:2017-11-21
    • 文件大小:60817408
    • 提供者:javry
  1. defensive database programming

  2. defensive database programming
  3. 所属分类:SQLServer

    • 发布日期:2018-11-30
    • 文件大小:8388608
    • 提供者:i1999
  1. 防御式编程 Defensive Programming.PPT完整版(精品课件)

  2. 防御式编程 Defensive Programming.PPT完整版(精品课件) 大纲: 保护程序免遭非法输入数据的破坏 断言 错误处理技术 异常 隔离程序 辅助调试代码
  3. 所属分类:C/C++

    • 发布日期:2019-04-15
    • 文件大小:928768
    • 提供者:weixin_44909041
  1. defensive-investing:这是一个脚本,它将分析股票以确定它是否是一个良好的购买机会。 股票评估的标准是基于本杰明·格雷厄姆(Benjamin Graham)的《聪明的投资者》(The Intelligent Investor

  2. 防御性投资 这是一个脚本,它将分析股票以确定它是否是一个良好的购买机会。 股票评估的标准是基于本杰明·格雷厄姆(Benjamin Graham)的《聪明的投资者》(The Intelligent Investor)一书中的建议,该书在1973年修订版中得到了杰森·茨威格(Jason Zweig)的评论。
  3. 所属分类:其它

    • 发布日期:2021-03-14
    • 文件大小:14336
    • 提供者:weixin_42168902
  1. Offensive-Defensive-Weight:进攻防守重量-熊体育分析-源码

  2. Offensive-Defensive-Weight:进攻防守重量-熊体育分析
  3. 所属分类:其它

    • 发布日期:2021-03-08
    • 文件大小:2048
    • 提供者:weixin_42131785
« 12 3 »