黑金PGL22G_demo&原理图&用户手册葵花宝典适合爱好开发板的道友们
2025/2/18 10:10:08 228.95MB 黑金开发板 PGL22G demo 原理图
1
基于(ISC)2CISSPCommonBodyofKnowledge,可以辅助allinone加深对8个域知识点了解,最新的知识点已经在2018年4月15日CISSP考试中广泛体现。
本学习指南重点突出知识点概念并伴有相应测试题,结合allinone8后面测试题、光盘题和《CISSPOfficial(ISC)2PracticeTests2018年第二版》英文版&官方练习题及解题详解(1300题左右),备考题库已足够了解所有知识点本书含21章节,各域对应的章节如下:1-4章对应Domain1SecurityandRiskMgmt第5章对应Domain2Assetsecurity资产安全第6,7,8,9,10章对应Domain3安全架构与工程第11,12章,通讯与网络安全第13,14章,身份与访问管理IAM第15章对应域安全评估与测试第16,17,18,19章对应域7安全运维第20,21章软件开发安全DevelopmentEditor:KellyTalbotTechnicalEditors:JeffParker,BobSipes,andDavidSeidlCopyEditor:KimWimpsettEditorialManager:PeteGaughanProductionManager:KathleenwisorExecutiveeditor:imminatelProofreader:AmyschneiderIndexer:JohnnaVanHoosedinseProjectCoordinator,Cover:brentSavageCoverDesigner:wileyCoverImage:@JeremyWoodhouse/GettyImages,Inc.CopyrightC2018byJohnWileySons,InC,Indianapolis,IndianaPublishedsimultaneouslyinCanadaISBN:978-1-119-47593-4ISBN:978-1-119-47595-8(ebk)ISBN:978-1-119-47587-3(ebk)ManufacturedintheUnitedStatesofamericaNopartofthispublicationmaybereproduced,storedinaretrievalsystemortransmittedianyformorbyanymeans,electronic,mechanical,photocopying,recording,scanningorotherwise,exceptaspermittedunderSections107or108ofthe1976UnitedStatesCopyrightAct,withouteitherthepriorwrittenpermissionofthePublisher,orauthorizationthroughpaymentoftheappropriateper-copyfeetotheCopyrightClearanceCenter,222RosewoodDrive,Danvers,MAO1923,(978)750-8400,fax(978)646-8600RequeststothePublisherforpermissionshouldbeaddressedtothepermissionsDepartment,JohnWileysons,Inc.111RiverStreet,Hoboken,NJo7030,(201)748-6011,fax(201)748-6008,oronlineathttp://www.wiley.com/go/permissionsLimitofliability/DisclaimerofWarranty:Thepublisherandtheauthormakenorepresentationsorwarrantieswithrespecttotheaccuracyorcompletenessofthecontentsofthisworkandspecificallydisclaimallwarranties,includingwithoutlimitationwarrantiesoffitnessforaparticularpurpose.Nowarrantymaybecreatedorextendedbysalesorpromotionalmaterials.Theadviceandstrategiescontainedhereinmaynotbesuitableforeverysituation.Thisworkissoldwiththeunderstandingthatthepublisherisnotengagedinrenderinglegal,accounting,orotherprofessionalservices.Ifprofessionalassistanceisrequiredtheservicesofacompetentprofessionalpersonshouldbesought.Neitherthepublishernortheauthorshallbeliablefordamagesarisingherefrom.ThefactthatanorganizationorWebsiteisreferredtointhisworkasacitationand/orapotentialsourceoffurtherinformationdoesnotmeanthattheauthororthepublisherendorsestheinformationtheorganizationorWebsitemayprovideorrecommendationsitmaymakeFurtherreadersshouldbeawarethatInternetWebsiteslistedinthisworkmayhavechangedordisappearedbetweenwhenthisworkwaswrittenandwhenitisreadForgeneralinformationonourotherproductsandservicesortoobtaintechnicalsupportpleasecontactourCustomerCareDepartmentwithintheU.S.at(877)762-2974,outsidetheUS.at(317)5723993orfax(317)572-4002Wileypublishesinavarietyofprintandelectronicformatsandbyprint-on-demand.Somematerialincludedwithstandardprintversionsofthisbookmaynotbeincludedine-booksorinprint-On-demand.IfthisbookreferstomediasuchasaCDorDVdthatisnotincludedintheversionyoupurchasedyoumaydownloadthismaterialathttp://booksupport.wilev.comFormoreinformationaboutwileyproductsvisitwww.wiley.comLibraryofCongressControlNumber:2018933561TRADEMARKS:Wiley,theWileylogo,andtheSybexlogoaretrademarksorregisteredtrademarksofJohnWileySons,Incand/oritsaffiliates,intheUnitedStatesandothercountries,andmaynotbeusedwithoutwrittenpermission.CISSPisaregisteredtrademarkof(ISC)2,Inc.AllothertrademarksarethepropertyoftheirrespectiveownersJohnWileySons,Incisnotassociatedwithanyproductorvendormentionedinthisbook.ToDewittLatimer,mymentor,friend,andcolleague.Imissyoudearly.MikeChappleToCathy,yourperspectiveontheworldandlifeoftensurprisesme,challengesme,andmakesmeloveyouevenmoreJamesmichaelstewartToNimfa,thanksforsharingyourlifewithmeforthepast26yearsandlettingmeshareminewithyouDarrilgibsonDearFuture(ISC)2MemberCongratulationsonstartingyourjourneytoCISSPRcertificationEarningyourCISSPisanexcitingandrewardingmilestoneinyourcybersecuritycareer.Notonlydoesitdemonstrateyourabilitytodevelopandmanagenearlyallaspectsofanorganizationscybersecurityoperations,butyoualsosignaltoemployersyourcommitmenttolife-longlearningandtakinganactiveroleinfulfillingthe(isc)2visionofinspiringasafeandsecurecyberworldThematerialinthisstudyguideisbaseduponthe(isc)2cisspCommonBodyofKnowledge.ItwillhelpyoupreparefortheexamthatwillassessyourcompetencyinthefollowingeightdomainsaSecurityandriskmanagement■AssetsecuritySecurityArchitectureandengineeringaCommunicationandNetworksecurityaIdentityandAccessManagement(IAM)SecurityAssessmentandTesting■SecurityOperationsSoftwareDevelopmentSecurityWhilethisstudyguidewillhelpyouprepare,passingthecisspexamdependsonyourmasteryofthedomainscombinedwithyourabilitytoapplythoseconceptsusingyourreal-worldexperienceiwishyouthebestofluckasyoucontinueonyourpathtobecomeaCISSPandcertifiedmemberof(Isc)2Sincerely,Davidshearer.CISSPCEO(ISC)2Ackn。
w|edgmentsWe'dliketoexpressourthankstoSybexforcontinuingtosupportthisproject.Extrathankstotheeightheditiondevelopmentaleditor,kellyTalbot,andtechnicaleditors,JeffParker,BobSipes,andDavidSeidlwhoperformedamazingfeatsinguidingustoimprovethisbookThanksaswelltoouragent,CaroleJelen,forcontinuingtoassistinnailingdowntheseprojectsMikejames.anddarrilSpecialthanksgototheinformationsecurityteamattheUniversityofNotreDame,whoprovidedhoursofinterestingconversationanddebateonsecurityissuesthatinspiredandinformedmuchofthematerialinthisbookIwouldliketothanktheteamatwileywhoprovidedinvaluableassistancethroughoutthebookdevelopmentprocess.ialsooweadebtofgratitudetomyliteraryagent,CaroleJelenofWatersideProductions.Mycoauthors,JamesMichaelStewartanddarrilGibsonweregreatcollaborators.JeffParker,BobSipes,andDavidSeidl,ourdiligentandknowledgeabletechnicaleditors,providedvaluableinsightaswebroughtthiseditiontopressIdalsoliketothankthemanypeoplewhoparticipatedintheproductionofthisbookbutwhomIneverhadthechancetomeet:thegraphicsteam,theproductionstaff,andallofthoseinvolvedinbringingthisbooktopress-MikeChappleThankstoMikeChappleandDarrilGibsonforcontinuingtocontributetothisprojectThanksalsotoallmycisspcoursestudentswhohaveprovidedtheirinsightandinputtoimprovemytrainingcoursewareandultimatelythistome.Tomyadoringwife,CathyBuildingalifeandafamilytogetherhasbeenmorewonderfulthanIcouldhaveeverimagined.ToSlaydeandremi:youaregrowingupsofastandlearningatanoutstandingpace,andyoucontinuetodelightandimpressmedaily.YouarebothgrowingintoamazingindividualsTomymom,Johnnie:ItiswonderfultohaveyouclosebyToMarkNomatterhowmuchtimehaspassedorhowlittleweseeeachother,Ihavebeenandalwayswillbeyourfriend.andfinally,asalways,toElvis:Youwerewayaheadofthecurrentbaconobsessionwithyourpeanutbutter/banana/baconsandwich;ithinkthat'sproofyoutraveledthroughtimeJamesmichaelStewartThankstoJimMinatelandCaroleJelenforhelpinggetthisupdateinplacebefore(IsC)2releasedtheobjectives.Thishelpedusgetaheadstartonthisnewedition,andweappreciateyourefforts.It'sbeenapleasureworkingwithtalentedpeoplelikeJamesMichaelStewartandMikeChappleThankstobothofyouforallyourworkandcollaborativeeffortsonthisproject.Thetechnicaleditors,JeffParkerBobSipes,andDavidSeidl,provideduswithsomeoutstandingfeedback,andthisbookisbetterbecauseoftheireffortsThankstotheteamatSybex(includingprojectmanagers,editors,andgraphicsartists)foralltheworkyoudidhelpingusgetthisbooktoprint.Last,thankstomywife,Nimfa,forputtingupwithmyoddhoursasIworkedonthisbookDarrilgibsonAbouttheauthorsMikeChapple,CISSP,PhD,Security+,CISA,CySA+,isanassociateteachingprofessorofIT,analytics,andoperationsattheUniversityofNotreDame.InthepasthewaschiefinformationofficerofBrandInstituteandaninformationsecurityresearcherwiththenationalSecurityagencyandtheu.s.airForcehisprimaryareasofexpertiseincludenetworkintrusiondetectionandaccesscontrols.mikeisafrequentcontributortoTechTarget'sSearchSecuritysiteandtheauthorofmorethan25booksincludingthecompanionbooktothisstudyguide:CISSPOfficial(ISC)2PracticeTests,theCompTIACSA+StudyGuide,andCyberwarfare:InformationOperationsinaConnectedWorld.MikeoffersstudygroupsfortheCISSP,SSCP,Security+,andcSa+certificationsonhiswebsiteatwww.certmike.comJamesMichaelStewart,CISSP,CEH,ECSA,CHFI,Security+Network+,hasbeenwritingandtrainingformorethan20years,withacurrentfocusonsecurity.hehasbeenteachingCiSsPtrainingcoursessince2002,nottomentionothercoursesonInternetsecurityandethicalhacking/penetrationtestingHeistheauthorofandcontributortomorethan75booksandnumerouscoursewaresetsonsecuritycertification,Microsofttopics,andnetworkadministrationincludingtheSecurity+(SY0-501)Reviewguide.Moreinformationaboutmichaelcanbefoundathiswebsiteatwww.impactonline.comDarrilGibson,CISSP,Security+,CASP,istheCeoofYODa(shortforYouCanDoAnything),andhehasauthoredorcoauthoredmorethan40books.Darrilregularlywrites,consults,andteachesonawidevarietyoftechnicalandsecuritytopicsandholdsseveralcertificationsHeregularlypostsblogarticlesathttp://blogs.getcertifiedgetahead.com/aboutcertificationtopicsandusesthatsitetohelppeoplestayabreastofchangesincertificationexams.Heloveshearingfromreaders,especiallywhentheypassanexamafterusingoneofhisbooks,andyoucancontacthimthroughthelebloggingsite.
2025/2/15 1:12:56 17.84MB CISSP OSG OSG8 Official
1
 针对无人机控制中灵活性的需求,在原有地面站结构的基础上,利用PC104作为硬件平台,融合虚拟串口、多线程编程、矩阵键盘等技术,设计了一种性能可靠、轻巧灵活的便携式地面站。
利用PC104中的GPIO口加入矩阵键盘,该键盘可以控制无人机飞行的全过程。
并且设计了地面飞控站部分的软件界面,包括功能菜单、虚拟仪表、控制区域等部分的设计,实现了虚拟仪表部分的数据显示功能。
经过实际调试,整个系统运行良好,很好的实现了对无人机的控制。
1
包括文本输入和输出!!!intmain(){ cout<<"三国时期,陆逊大败刘备,火烧连营八百里,妙在火攻!"<<endl; cout<<"以下是模拟当年战场"<<endl; PointMap[40][70];//摆阵初始化map setmap(Map);//输出地图 cout<<"战前军情:"<<endl;maplook(Map);//点火 setfire(Map);//输出地图 cout<<"战后军情:"<<endl;maplook(Map); return0;}
2025/2/10 11:51:34 1.1MB 数据结构 C++学习 火烧连营
1
激光雷达数据采集程序,Linux平台,当需要在ARM-Linux下执行时,将gcc改为arm-none-linux-gnueabi-gcc重新编译即可
2025/2/9 14:37:47 1.1MB 激光雷达 数据采集
1
HUAWEIUSG6000系列&NGFWModuleV100R001管理员指南04
2025/2/8 2:23:22 39.65MB HUAWEI USG6000
1
重点利用Matlab/Simulink及SimulinkCoder创建实时控制模型,并在ControlDeskNG中进行实时实验的开发及管理培训对象使用dSPACE产品进行快速控制原型系统开发(或硬件在环仿真测试)的工程应用人员能够使用Matlab/Simulink建立控制器离线模型并进行调试的工程应用人员目的在完成此次培训课程后,参训人员应能在Matlab/Simulink下建立实时控制模型利用ControlDeskNG开发实时测试环境并进行实验培训大纲dSPACE重点■利用Matlab/Simulink及Simulinkcoder创建实时控制模型,并在Contro|Deskng中进行实时实验的开发及管理培训对象使用dsPACE产品进行快速控制原型系统开发(或硬件在环仿真测试)的工程应用人员能够使用Matlab/Simulink建立控制器离线模型并进行调试的工程应用人员目的在完成此次培训课程后,参训人员应能在下建立实时控制模型利用开发实时测试环境并进行实验培训内容dSPACE1.RCP系统的硬件与软件2.RCP系统的安装■3.RTI集成建模与编译4.Contro|Deskng使用基础5.自由练习与解答dSPACEJria\signalprocessingand1.RCP系统的硬件与软件dSPACE典型的RCP开发流程RCP系统的硬件RCP系统的软件也990o1.1典型的RCP开发流程dSPACElxrescaled在离线环境下建立控制器的预研模型测试控制器模型在模型中集成硬件建立被控对象的理论模型的主主日产息Art-Mindp为控制器模型生成实时代码建立程以下载程序、观测变量以及标定参数1.2RCP系统的硬件dSPACE控制原型核心(处理器)IO资源IO资源扩展(信号调理与功率放大)dSPACE■一一■■■■■■■g■■■■■■■■■aa1.3RCP系统的软件dSPACEMATLABSIMULINKRTISimulinkcodersdSPACE(Real-TimeInterface5i-「m网理论分析,设计离线仿真测试利用模块库在模型根据模型生成C代在Contro|Deskng与优化中集成硬件I/O码中开发实验环境并进行实时测试实时系统的软件组成基于模型的控制策略开发与测试集合开发闭环控制系统所需的所有步骤自动代码生成直接访问实时系统一—测量、标定、分析以及报告Simulinkcoder,即早期的Rea-TimeWorkshop(RTW)2.dSPACERCP系统的安装dSPACE软件安装系统需求ACESetupdSPACESelectdSPACEInstallationManagerSelectthecomponentsthatyouwanttoinstall,anddearthecomponentsthatyoudonot硬件安装wanttoinstallDescriptonROP&HilLdSPACE专用通信板卡-IvExperimentSoftwaredSPACEsoftwareforrapidvLIbcontrolprototypingandhardware-in-theloopdSPACE板卡安装-IvControlDesksimulationvControlDeskBasicControlDeskStandardControlDeskTestAutomationMITR/MTR△r2939MBNextCancel2.1.1系统需求(R2014B适用)dSPACE操作系统Windows7sP1专业版、旗舰版及企业版(32或64位)√32或64位取决于Matlab版本,而非操作系统MATLAB兼容性2014b\2014a\2013b\2013a√MATLAB、Simulink\StateflowYMATLABCoderSimulinkCoder(Real-TimeWorkshopstateflowCoder)安装注意事项√Matlab与dSPACE相关软件的安装不得包含中文或特殊字符建议Matlab安装路径不含空格参考文档vSoftwareInstallationManagementGuidepdf
2025/2/7 3:34:16 6.39MB DSPACE
1
 随着工业应用对信号检测与传输的要求不断提高,新型智能仪表将在市场中占有越来越重要的地位。
本文在分析压力变送器基本工作原理的基础上,针对新形势下的生产要求,设计了基于MSC-51单片机的智能压力变送器的数据采集电路、看门狗电路以及接口电路。
并设计了相应的数据采集算法、通信协议以及其他软件功能。
1
Python&课堂&笔记(高淇&400;集第一季)
2025/1/29 10:28:05 2.58MB python
1
虚拟现实革命前夕:第四次工业革命的钥匙之一——VR&AR深度行业研究报告.pdf
2025/1/29 8:36:02 3.4MB vr AR 人工智能 第四次工业革命
1
共 829 条记录 首页 上一页 下一页 尾页
在日常工作中,钉钉打卡成了我生活中不可或缺的一部分。然而,有时候这个看似简单的任务却给我带来了不少烦恼。 每天早晚,我总是得牢记打开钉钉应用,点击"工作台",再找到"考勤打卡"进行签到。有时候因为工作忙碌,会忘记打卡,导致考勤异常,影响当月的工作评价。而且,由于我使用的是苹果手机,有时候系统更新后,钉钉的某些功能会出现异常,使得打卡变得更加麻烦。 另外,我的家人使用的是安卓手机,他们也经常抱怨钉钉打卡的繁琐。尤其是对于那些不太熟悉手机操作的长辈来说,每次打卡都是一次挑战。他们总是担心自己会操作失误,导致打卡失败。 为了解决这些烦恼,我开始思考是否可以通过编写一个全自动化脚本来实现钉钉打卡。经过一段时间的摸索和学习,我终于成功编写出了一个适用于苹果和安卓系统的钉钉打卡脚本。
2024-04-09 15:03 15KB 钉钉 钉钉打卡