您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Game development and production

  2. Foreword ............................... xvii Preface ................................xix Acknowledgments ..........................xxi Part I—Introduction to Game Development Chapter 1 What Does This Book Cover? ............3 How to Make a Game....
  3. 所属分类:iOS

    • 发布日期:2009-12-29
    • 文件大小:6291456
    • 提供者:osoon
  1. Achieving Data Access Control in Cloud Computing

  2. Abstract—Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. Promising as it is, this paradigm also brings forth many new challenges for data security and a
  3. 所属分类:网络安全

    • 发布日期:2011-08-16
    • 文件大小:275456
    • 提供者:yuanjiawei1030
  1. IFPUG_Counting_Practices_Manual_4.1英文版

  2. Function points are the leading metric of the software world. Although function points originated as a sizing mechanism for software projects, the power and utility of function points have expanded into new uses far beyond that basic purpose. As the
  3. 所属分类:其它

    • 发布日期:2011-12-15
    • 文件大小:1048576
    • 提供者:liuxj_10000
  1. Data just right

  2. Large-scale data analysis ("Big Data") is suddenly of crucial importance to virtually every enterprise. Mobile and social technologies are generating massive datasets, and distributed cloud computing is providing better ways to analyzing and process
  3. 所属分类:其它

    • 发布日期:2014-07-21
    • 文件大小:2097152
    • 提供者:regoo029
  1. Managing Your Outsourced IT Services Provider(Apress,2015)

  2. Managing Your Outsourced IT Services Provider teaches executives and managers of organizations how to unleash the full potential of their outsourced IT services workforce and IT-enabled business processes safely and profitably. Drawing on two decade
  3. 所属分类:专业指导

    • 发布日期:2015-04-23
    • 文件大小:1048576
    • 提供者:vanridin
  1. 多态设计游戏示例

  2. 使用多态设计一个游戏的示例
  3. 所属分类:Java

    • 发布日期:2016-07-23
    • 文件大小:8192
    • 提供者:hoho_12
  1. Defensive Security Handbook: Best Practices for Securing Infrastructure

  2. Defensive Security Handbook: Best Practices for Securing Infrastructure by Lee Brotherston English | 3 Apr. 2017 | ASIN: B06Y18XC5Y | 268 Pages | AZW3 | 3.88 MB Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware a
  3. 所属分类:系统安全

    • 发布日期:2017-04-05
    • 文件大小:3145728
    • 提供者:u013003382
  1. Defensive.Security.Handbook.2017.4.pdf

  2. Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For compa
  3. 所属分类:其它

    • 发布日期:2017-07-24
    • 文件大小:30408704
    • 提供者:xinconan1992
  1. Defensive Security Handbook(O

  2. Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For compa
  3. 所属分类:系统安全

    • 发布日期:2017-07-27
    • 文件大小:30408704
    • 提供者:vanridin
  1. Defensive Security Handbook(O

  2. 内容简介: Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For
  3. 所属分类:其它

    • 发布日期:2017-11-21
    • 文件大小:60817408
    • 提供者:javry
  1. the art of master searching engine optimisation

  2. FOREWORD xvii PREFACE xix 1 SEARCH: REFLECTING CONSCIOUSNESS AND CONNECTING COMMERCE 1 The Mission of Search Engines 2 The Market Share of Search Engines 2 The Human Goals of Searching 2 Determining Searcher Intent: A Challenge for Both Marketers an
  3. 所属分类:机器学习

    • 发布日期:2018-02-25
    • 文件大小:71303168
    • 提供者:weixin_36254274
  1. 从EMS供应商到OTMS供应商

  2. By Dan Shea   本文介绍,随着光电子学的使用增加,PCB装配制造商必须改变其制造工艺和商业模式,以适应这个新的光学技术。  光在通信技术中的使用不再局限在光纤网络。光现在可以在计算机和许多其它产品与设备中将信息从家里和办公室传来传去。在电子曾经为计算设备基础的地方,现在被光子占有。这个进化正在整个光子供应链上产生新的产品、市场和制造的压力。  光电子(OE, optoeletronics)市场是以速度来界定的。随着需求的急剧震荡,技术进化与产品会聚的步伐是难以置信的。为了满足这个挑战
  3. 所属分类:其它

    • 发布日期:2020-12-09
    • 文件大小:125952
    • 提供者:weixin_38500222
  1. A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function

  2. With the advent of cloud computing, more and more individuals and companies are motivated to outsource their data and services to clouds. As for the privacy and security reasons, sensitive data should be encrypted prior to outsourcing. However, encry
  3. 所属分类:其它

    • 发布日期:2021-02-09
    • 文件大小:465920
    • 提供者:weixin_38661852
  1. Secure searchable encryption: a survey

  2. Cloud computing facilitates convenient and on-demand network access to a centralized pool of resources. Currently, many users prefer to outsource data to the cloud in order to mitigate the burden of local storage. However, storing sensitive data on r
  3. 所属分类:其它

    • 发布日期:2021-01-20
    • 文件大小:815104
    • 提供者:weixin_38670531