obj\Debug\ResolveAssemblyReference.cacheobj\Debug\图书销售管理体系.CrystalReport1.rptobj\Debug\图书销售管理体系.CrystalReport2.rptobj\Debug\图书销售管理体系.CrystalReport3.rptobj\Debug\图书销售管理体系.Form1.resourcesobj\Debug\图书销售管理体系.frmMain.resourcesobj\Debug\图书销售管理体系.Properties.Resources.resourcesobj\Debug\图书销售管理体系.图书销售管理.BookJiben.resourcesobj\Debug\图书销售管理体系.图书销售管理.BookSale.resourcesobj\Debug\图书销售管理体系.图书销售管理.BookSaleDetil.resourcesobj\Debug\图书销售管理体系.图书销售管理.DataEnvi.resourcesobj\Debug\图书销售管理体系.图书销售管理.FrmPrice.resourcesobj\Debug\图书销售管理体系.图书销售管理.InRecord.resourcesobj\Debug\图书销售管理体系.图书销售管理.SaleDatia.resourcesobj\Debug\图书销售管理体系.体系管理.backupdatebase.resourcesobj\Debug\图书销售管理体系.体系管理.frmEditPwd.resourcesobj\Debug\图书销售管理体系.体系管理.FrmManger.resourcesobj\Debug\图书销售管理体系.体系管理.Our.resourcesobj\Debug\图书销售管理体系.体系管理.RestoreDataBase.resourcesobj\Debug\图书销售管理体系.csproj.GenerateResource.Cachebin\Debug\图书销售管理体系.exe.configbin\Debug\图书销售管理体系.exebin\Debug\图书销售管理体系.pdbobj\Debug\图书销售管理体系.exeobj\Debug\图书销售管理体系.pdb
2023/5/13 18:51:04 2.34MB 图书入库 图书销售 报表打印
1
WindowsCredentialsEditor(WCE)是一款成果渺小的windows平台内网渗透货物,它能够枚举上岸会话,并且能够削减、窜改以及删除了相关依据(譬如:LM/NThashes)。
这些成果在内网渗透中能够被行使,譬如,在windows平台上实施绕过hash大概从内存中患上到NT/LMhashes(也能够从交互式上岸、效率、短途桌面毗邻中患上到)以用于进一步的侵略。
反对于平台:WindowsXP,2003,Vista,7以及2008(未对于Vista举行实际测试,但应该反对于)。
WindowsCredentialsEditor已经更新至1.3beta版,新版本首要窜改:BugfixesExtendedsupporttoobtainNTLMhasheswithoutcodeinjectionAddedfeaturetodumplogincleartextpasswordsstoredbytheDigestAuthenticationpackage
2023/4/28 11:11:01 530KB wce
1
ThisbookaimstodevelopprofessionalandpracticalmicrocontrollerapplicationsintheARM-MDKenvironmentwithTexasInstrumentsMSP432P401RLaunchPadkits.ItintroducesARMCortex-M4MCUbyhighlightingthemostimportantelements,including:registers,pipelines,memory,andI/Oports.WiththeupdatedMSP432P401REvaluationBoard(EVB),MSP-EXP432P401R,thisMCUprovidesvariouscontrolfunctionswithmultipleperipheralstoenableuserstodevelopandbuildvariousmoderncontrolprojectswithrichcontrolstrategies.Micro-controllerprogra妹妹ingisapproachedwithbasicandstraightforwardprogra妹妹ingcodestoreducelearningcurves,andfurthermoretoenablestudentstobuildembeddedapplicationsinmoreefficientandinterestingways.Forauthenticexamples,37Classprogra妹妹ingprojectsarebuiltintothebookthatuseMSP432P401RMCU.Additionally,approximately40Labprogra妹妹ingprojectswithMSP432P401RMCUareincludedtobeassignedashomework.TableofContentsChapter1IntroductiontomicrocontrollersandthisbookChapter2MSP432microcontrollerarchitecturesChapter3MSP432microcontrollerdevelopmentkitsChapter4ARM®microcontrollersoftwareandinstructionsetChapter5MSP432microcontrollerinterruptsandexceptionsChapter6ARM®andMSP432™MCUmemorysystemChapter7MSP432™parallelI/Oportsprogra妹妹ingChapter8MSP432™serialI/Oportsprogra妹妹ingChapter9MSP432™16-bittimersandPWMmodulesChapter10MSP43232-bittimersandwatchdogtimerChapter11MSP432™floating-pointunit(FPU)Chapter12MSP432™memoryprotectionunit(MPU)AppendixA:DownloadandinstallKeilMDK-ARM5.15IDEandMSP432DFPAppendixB:DownloadandinstallMSPWaresoftwarepackageAppendixC:MSP432P401R-basedEVBhardwaresetupAppendixD:TheCMSIScore-specificintrinsicfunctions
2023/4/24 2:01:50 35.28MB MSP432
1
WhatthisbookcoversChapter1,HelloRust!,givesashortrecapoftheRustprogra妹妹inglanguageandwhatchangedinthe2018edition.Chapter2,CargoandCrates,discussesRust'scargobuildtool.Wewillexploretheconfigurationaswellasthebuildprocessandmodularizationoptions.Chapter3,StoringEfficiently,looksathowinRust,knowingwherevaluesarestoredisnotonlyimportantforperformance,butalsoimportantforunderstandingerrormessagesandthelanguageingeneral.Inthischapter,wethinkaboutstackandheapmemory.Chapter4,Lists,Lists,andMoreLists,coversthefirstdatastructures:lists.Usingseveralexamples,thischaptergoesintovariationsofsequentialdatastructuresandtheirimplementations.Chapter5,RobustTrees,continuesourjourneythroughpopulardatastructures:treesarenextonthelist.Inseveraldetailedexamples,weexploretheinnerworkingsoftheseefficientdesignsandhowtheyimproveapplicationperformanceconsiderably.Chapter6,ExploringMapsandSets,exploresthemostpopularkey-valuestores:maps.Inthischapter,techniquessurroundinghashmaps;hashing;andtheircloserelative,theset;aredescribedindetail.Chapter7,CollectionsinRust,attemptstoconnecttotheRustprogra妹妹er'sdailylife,goingintothedetailsoftheRuststd::collectionslibrary,whichcontainsthevariousdatastructuresprovidedbytheRuststandardlibrary.Chapter8,AlgorithmEvaluation,teachesyouhowtoevaluateandcomparealgorithms.Chapter9,OrderingThings,willlookatsortingvalues,animportanttaskinprogra妹妹ing—thischapteruncovershowthatcanbedonequicklyandsafely.Chapter10,FindingStuff,movesontosearching,whichisespeciallyimportantifthereisnofundamentaldatastructuretosupportit.Inthesecases,weusealgorithmstobeabletoquicklyfindwhatwearelookingfor.Chapter11,RandomandCombinatorial,iswherewewillseethat,outsideofsortingandsearching,
2023/4/22 19:21:15 12.7MB rust Algorithms
1
Stringalgorithmsareatraditionalareaofstudyincomputerscience.Inrecentyearstheirimportancehasgrowndramaticallywiththehugeincreaseofelectronicallystoredtextandofmolecularsequencedata(DNAorproteinsequences)producedbyvariousgenomeprojects.This1997bookisageneraltextoncomputeralgorithmsforstringprocessing.Inadditiontopurecomputerscience,thebookcontainsextensivediscussionsonbiologicalproblemsthatarecastasstringproblems,andonmethodsdevelopedtosolvethem.Itemphasisesthefundamentalideasandtechniquescentraltotoday'sapplications.Newapproachestothiscomplexmaterialsimplifymethodsthatuptonowhavebeenforthespecialistalone.Withover400exercisestoreinforcethematerialanddevelopadditionaltopics,thebookissuitableasatextforgraduateoradvancedundergraduatestudentsincomputerscience,computationalbiology,orbio-informatics.Itsdiscussionofcurrentalgorithmsandtechniquesalsomakesitareferenceforprofessionals.
2023/4/8 5:58:04 8.73MB Algori Algori
1
UtilizethenewenhancementsinTransact-SQLandsecurityfeaturesinSQLServer2016tobuildefficientdatabaseapplicationsWorkwithtemporaltablestogetinformationaboutdatastoredinthetableatanypointintimeAdetailedguidetoSQLServer2016,introducingyoutomultiplenewfeaturesandenhancementstoimproveyouroveralldevelopmentexperience
2023/4/4 5:01:25 13.95MB SQL Server
1
div+css实现bookstorediv+css实现网上书店网页div+css实现网上书店网页
2023/4/3 23:58:18 1.45MB html div css
1
KerasDeepLearningCookbookCopyright©2018PacktPublishingAllrightsreserved.Nopartofthisbookmaybereproduced,storedinaretrievalsystem,ortransmittedinanyformorbyanymeans,withoutthepriorwrittenpermissionofthepublisher,exceptinthecaseofbriefquotationsembeddedincriticalarticlesorreviews.Everyefforthasbeenmadeinthepreparationofthisbooktoensuretheaccuracyoftheinformationpresented.However,theinformationcontainedinthisbookissoldwithoutwarranty,eitherexpressorimplied.Neithertheauthors,norPacktPublishingoritsdealersanddistributors,willbeheldliableforanydamagescausedorallegedtohavebeencauseddirectlyorindirectlybythisbook.PacktPublishinghasendeavoredtoprovidetrademarkinformationaboutallofthecompaniesandproductsmentionedinthisbookbytheappropriateuseofcapitals.However,PacktPublishingcannotguaranteetheaccuracyofthisinformation.Co妹妹issioningEditor:AmeyVarangaonkarAcquisitionEditor:KaranJainContentDevelopmentEditor:KaranThakkarTechnicalEditor:SagarSawantCopyEditor:SafisEditingProjectCoordinator:NidhiJoshiProofreader:SafisEditingIndexer:PratikShirodkarGraphics:JishaChirayilProductionCoordinator:AparnaBhagatFirstpublished:October2018Productionreference:1301018PublishedbyPacktPublishingLtd.LiveryPlace35LiveryStreetBirminghamB32PB,UK.ISBN978-1-78862-175-5www.packtpub.com
2023/4/3 3:35:40 7.37MB deep learnin Keras
1
Thisbookintroducesyoutotheworldofdatastructuresandalgorithms.Datastructuredefinesthewaydataisarrangedincomputermemoryforfastandefficientaccesswhilealgorithmisasetofinstructiontosolveproblemsbymanipulatingthesedatastructures.DataStructuresalgorithmsInGoHemantjainCopyrightoHemantJain2017.AllRightReservedHemantJainassertsthemoralrighttobeidentifiedasheauthorofthisworkAllrightsreserved.Nopartofthispublicationmaybereproduced,storedinorintroducedintoaretrievalsystem,ortransmitted,inanyform,orbyanymeans(electrical,mechanical,photocopying,recordingorotherwise)withoutthepriorwrittenpermissionoftheauthor,exceptinthecaseofverybriefquotationsembodiedincriticalreviewsandcertainothernonco妹妹ercialusespermittedbycopyrightlaw.AnypersonwhodoesanyunauthorizedactinrelationtothispublicationmaybeliabletocriminalprosecutionandcivilclaimsfordamagesACKNOWLEDGEMENTTheauthorisverygratefultoGodALMIGhTYforhisgraceandblessingDeepestgratitudeforthehelpandsupportofmybrotherDrSumantJain.ThisbookwouldnothavebeenpossiblewithoutthesupportandencouragementheprovidedIwouldliketoexpressprofoundgratitudetomyguide/myfriendNaveenKaushikforhisinvaluableencouragement,supervisionandusefulsuggestionthroughoutthisbookwritingwork.hissupportandcontinuousguidanceenablemetocompletemyworksuccessfuFinallyyetimportantly,IamthankfultoLoveSinghal,AnilberryandotherswhohelpedmedirectlyorindirectlyincompletingthisbookHemantJainTABLEOFCONTENTSACKNOWLEDGEMENTTABLEOFCONTENTSChAPTERO:HOWTOUSETHISBOOKWHATTHISBOOKISABOUTPREPARATIONPLANSSUMMARYChAPTER1:NTRODUCTION-PROGRAMMIINGOVERVIEWINTRODUCTIONFIRSTGOPROGRAMvariablesconstantsBASICDATATYPESSTRINGCONDITIONSANDLOOPSFUNCTIONPARAMETERPASSINGCALLBYVALUEPOINTERSPARAMETERPASSING.CALLBYPOINTER/REFERENCESTRUCTURESMETHODSINTERFACEARRaySLICEMAP/DICTIONARYARRAYINTERVIEWQUESTIONSCONCEPTOFSTACKSYSTEMSTACKANDMETHODCALLSRECURSIVEFUNCTIONEXERCISESCHAPTER2:ALGORITHMSANALYSISINTRODUCTIONALGORITHMASYMPTOTICANALYSISBIG-ONOTATIONOMEGA-QNOTATIONTHETA-⊙NOTATIONCOMPLEXITYANALYSISOFALGORITHMSTIMECOMPLEXITYORDERDERIVINGTHERUNTIMEFUNCTIONOFANALGORITHMTIMECOMPLEXITYEXAMPLESMASTERTHEOREMMODIFIEDMASTERTHEOREMEXERCISECHAPTER3:APPROACHTOSOLVEALGORITHMDESIGNPROBLEMSINTRODUCTIONCONSTRAINTSIDEAGENERATIONCOMPLEXITIESCODINGTESTINGEⅹAMPLESUMMARYChaPTER4:ABSTRACTDATATYPEGOCollECtIonsABSTRACTDATATYPE(ADTDATA-STRUCTUREGOCOLLECTIONFRAMEWORKACKQUEUETREEBINARYTREEBINARYSEARCHTREES(BSTPRIORITYQUEUE(HEAPHASH-TABLEDICTIONARY/SYMBOLTABLEGRAPHSGRAPHALGORITHMSSORTINGALGORITHMSCOUNTINGSORTENDNOTEchaPTER5:SEARCHINGINTRODUCTIONWHYSEARCHING?DIFFERENTSEARCHINGALGORITHMSLINEARSEARCH-UNSORTEDINPUTLINEARSEARCH-SORTEDBINARYSEARCHSTRINGSEARCHINGALGORITHMSHASHINGANDSYMBOLTABLESHOWSORTINGISUSEFULINSELECTIONALGORITHM?PROBLEMSINSEARCHINGEXERCISECHAPTER6:SORTINGINTRODUCTIONTYPEOFSORTINGBUBBLE-SORTMODIFIED(IMPROVED)BUBBLE-SORTINSERTION-SORTSELECTION-SORTMERGE-SORTQUICK-SORTQUICKSELECTBUCKETSORTGENERALIZEDBUCKETSORTHEAP-SORTTREESORTINGEXTERNALSORT(EXTERNALMERGE-SORTICOMPARISONSOFTHEVARIOUSSORTINGALGORITHMSSELECTIONOFBESTSORTINGALGORITHMEXERCISEChAPTER7:LINKEDLISTINTRODUCTIONLINKEDLISTTYPESOFLINKEDLISTSINGLYLINKEDLISTDOUBLYLINKEDLISTCIRCULARLINKEDLISTDOUBLYCIRCULARLISTEXERCISEchapter8:STACKINTRODUCTIONTHESTACKABSTRACTDATATYPESTACKUSINGSLICESSTACKGENERICIMPLEMENTATIONSTACKUSINGLINKEDLISTPROBLEMSINSTACKUSESOFSTACKEXERCISEchaPTER9:QUEUEINTRODUCTIONTHEQUEUEABSTRACTDATATYPEQUEUEUSINGLISTQUEUEUSINGLINKEDLISTPROBLEMSINQUEUEEXERCISECHAPTER10:TREEINTRODUCTIONTERMINOLOGYINTREEBINARYTREETYPESOFBINARYTREESPROBLEMSINBINARYTREEBINARYSEARCHTREE(BST)PROBLEMSINBINARYSEARCHTREE(BSTISEGMENTTREEAVLTREESRED-BLACKTREESPLAYTREEB-TREEB+TREEB*TREEEXERCISECHAPTERIl:PRIORITYQUEUEINTRODUCTIONTYPESOFHEAPHEAPADTOPERATIONSOPERATIONONHEAPHEAP-SORTUSESOFHEAPPROBLEMSINHEAPPRIORITYQUEUEGENERICIMPLEMENTATION.PRIORITYQUEUEUSINGHEAPFROMCONTAINER.EXERCISECHAPTER12:HASH-TABLEINTRODUCTIONHASH-TABLEHASHIINGWITHOPENADDRESSINGHASHINGWITHSEPARATECHAININGPROBLEMSINHASHINGEXERCISEChaPTER13:GRAPHSINTRODUCTIONGRAPHREPRESENTATIONADJACENCYMATRIXADJACENCYLISTGRAPHTRAVERSALSDEPTHFIRSTTRAVERSALBREADTHFIRSTTRAVERSALPROBLEMSINGRAPHDIRECTEDACYCLICGRAPHTOPOLOGICALSORTMINIMUMSPANNINGTREES(MST)SHORTESTPATHALGORITHMSINGRAPHEXERCISEChAPTER14:STRINGALGORITHMSTRODUCTIONSTRINGMATCHINGDICTIONARY/SYMBOLTABLEPROBLEMSINSTRINGEXERCISECHAPTER15:ALGORITHMDESIGNTECHNIQUESNTRODUCTIONBRUTEFORCEALGORITHMGREEDYALGORITHMDIVIDE-AND-CONQUER,DECREASE-AND-CONQUERDYNAMICPROGRAMMINGREDUCTIONTRANSFORM-AND-CONQUERBACKTRACKINGBRANCH-AND-BOUNDAALGORITHMCONCLUSIONCHAPTER16:BRUTEFORCEALGORITHMINTRODUCTIONPROBLEMSINBRUTEFORCEALGORITHMCONCLUSIONCHAPTER17:GREEDYALGORITHMINTRODUCTIONPROBLEMSONGREEDYALGORITHMCHAPTER18:DIVIDE-AND-CONQUER,DECREASE-AND-CONQUER
2023/3/25 9:44:09 6.19MB Data Structures Algorithms
1
cissp官方进修指南第八版(英文),改版后2018最新进修指南。
不用看cbk那么费劲,就看这个版本九百多页,八个知识域全覆盖,还省事。
DevelopmentEditor:KellyTalbotTechnicalEditors:JeffParker,BobSipes,andDavidSeidlCopyEditor:KimWimpsettEditorialManager:PeteGaughanProductionManager:KathleenwisorExecutiveeditor:imminatelProofreader:AmyschneiderIndexer:JohnnaVanHoosedinseProjectCoordinator,Cover:brentSavageCoverDesigner:wileyCoverImage:@JeremyWoodhouse/GettyImages,Inc.CopyrightC2018byJohnWileySons,InC,Indianapolis,IndianaPublishedsimultaneouslyinCanadaISBN:978-1-119-47593-4ISBN:978-1-119-47595-8(ebk)ISBN:978-1-119-47587-3(ebk)ManufacturedintheUnitedStatesofamericaNopartofthispublicationmaybereproduced,storedinaretrievalsystemortransmittedianyformorbyanymeans,electronic,mechanical,photocopying,recording,scanningorotherwise,exceptaspermittedunderSections107or108ofthe1976UnitedStatesCopyrightAct,withouteitherthepriorwrittenpermissionofthePublisher,orauthorizationthroughpaymentoftheappropriateper-copyfeetotheCopyrightClearanceCenter,222RosewoodDrive,Danvers,MAO1923,(978)750-8400,fax(978)646-8600RequeststothePublisherforpermissionshouldbeaddressedtothepermissionsDepartment,JohnWileysons,Inc.111RiverStreet,Hoboken,NJo7030,(201)748-6011,fax(201)748-6008,oronlineathttp://www.wiley.com/go/permissionsLimitofliability/DisclaimerofWarranty:Thepublisherandtheauthormakenorepresentationsorwarrantieswithrespecttotheaccuracyorcompletenessofthecontentsofthisworkandspecificallydisclaimallwarranties,includingwithoutlimitationwarrantiesoffitnessforaparticularpurpose.Nowarrantymaybecreatedorextendedbysalesorpromotionalmaterials.Theadviceandstrategiescontainedhereinmaynotbesuitableforeverysituation.Thisworkissoldwiththeunderstandingthatthepublisherisnotengagedinrenderinglegal,accounting,orotherprofessionalservices.Ifprofessionalassistanceisrequiredtheservicesofacompetentprofessionalpersonshouldbesought.Neitherthepublishernortheauthorshallbeliablefordamagesarisingherefrom.ThefactthatanorganizationorWebsiteisreferredtointhisworkasacitationand/orapotentialsourceoffurtherinformationdoesnotmeanthattheauthororthepublisherendorsestheinformationtheorganizationorWebsitemayprovideorrecommendationsitmaymakeFurtherreadersshouldbeawarethatInternetWebsiteslistedinthisworkmayhavechangedordisappearedbetweenwhenthisworkwaswrittenandwhenitisreadForgeneralinformationonourotherproductsandservicesortoobtaintechnicalsupportpleasecontactourCustomerCareDepartmentwithintheU.S.at(877)762-2974,outsidetheUS.at(317)5723993orfax(317)572-4002Wileypublishesinavarietyofprintandelectronicformatsandbyprint-on-demand.Somematerialincludedwithstandardprintversionsofthisbookmaynotbeincludedine-booksorinprint-On-demand.IfthisbookreferstomediasuchasaCDorDVdthatisnotincludedintheversionyoupurchasedyoumaydownloadthismaterialathttp://booksupport.wilev.comFormoreinformationaboutwileyproductsvisitwww.wiley.comLibraryofCongressControlNumber:2018933561TRADEMARKS:Wiley,theWileylogo,andtheSybexlogoaretrademarksorregisteredtrademarksofJohnWileySons,Incand/oritsaffiliates,intheUnitedStatesandothercountries,andmaynotbeusedwithoutwrittenpermission.CISSPisaregisteredtrademarkof(ISC)2,Inc.AllothertrademarksarethepropertyoftheirrespectiveownersJohnWileySons,Incisnotassociatedwithanyproductorvendormentionedinthisbook.ToDewittLatimer,mymentor,friend,andcolleague.Imissyoudearly.MikeChappleToCathy,yourperspectiveontheworldandlifeoftensurprisesme,challengesme,andmakesmeloveyouevenmoreJamesmichaelstewartToNimfa,thanksforsharingyourlifewithmeforthepast26yearsandlettingmeshareminewithyouDarrilgibsonDearFuture(ISC)2MemberCongratulationsonstartingyourjourneytoCISSPRcertificationEarningyourCISSPisanexcitingandrewardingmilestoneinyourcybersecuritycareer.Notonlydoesitdemonstrateyourabilitytodevelopandmanagenearlyallaspectsofanorganizationscybersecurityoperations,butyoualsosignaltoemployersyourcommitmenttolife-longlearningandtakinganactiveroleinfulfillingthe(isc)2visionofinspiringasafeandsecurecyberworldThematerialinthisstudyguideisbaseduponthe(isc)2cisspCommonBodyofKnowledge.ItwillhelpyoupreparefortheexamthatwillassessyourcompetencyinthefollowingeightdomainsaSecurityandriskmanagement■AssetsecuritySecurityArchitectureandengineeringaCommunicationandNetworksecurityaIdentityandAccessManagement(IAM)SecurityAssessmentandTesting■SecurityOperationsSoftwareDevelopmentSecurityWhilethisstudyguidewillhelpyouprepare,passingthecisspexamdependsonyourmasteryofthedomainscombinedwithyourabilitytoapplythoseconceptsusingyourreal-worldexperienceiwishyouthebestofluckasyoucontinueonyourpathtobecomeaCISSPandcertifiedmemberof(Isc)2Sincerely,Davidshearer.CISSPCEO(ISC)2Ackn。
w|edgmentsWe'dliketoexpressourthankstoSybexforcontinuingtosupportthisproject.Extrathankstotheeightheditiondevelopmentaleditor,kellyTalbot,andtechnicaleditors,JeffParker,BobSipes,andDavidSeidlwhoperformedamazingfeatsinguidingustoimprovethisbookThanksaswelltoouragent,CaroleJelen,forcontinuingtoassistinnailingdowntheseprojectsMikejames.anddarrilSpecialthanksgototheinformationsecurityteamattheUniversityofNotreDame,whoprovidedhoursofinterestingconversationanddebateonsecurityissuesthatinspiredandinformedmuchofthematerialinthisbookIwouldliketothanktheteamatwileywhoprovidedinvaluableassistancethroughoutthebookdevelopmentprocess.ialsooweadebtofgratitudetomyliteraryagent,CaroleJelenofWatersideProductions.Mycoauthors,JamesMichaelStewartanddarrilGibsonweregreatcollaborators.JeffParker,BobSipes,andDavidSeidl,ourdiligentandknowledgeabletechnicaleditors,providedvaluableinsightaswebroughtthiseditiontopressIdalsoliketothankthemanypeoplewhoparticipatedintheproductionofthisbookbutwhomIneverhadthechancetomeet:thegraphicsteam,theproductionstaff,andallofthoseinvolvedinbringingthisbooktopress-MikeChappleThankstoMikeChappleandDarrilGibsonforcontinuingtocontributetothisprojectThanksalsotoallmycisspcoursestudentswhohaveprovidedtheirinsightandinputtoimprovemytrainingcoursewareandultimatelythistome.Tomyadoringwife,CathyBuildingalifeandafamilytogetherhasbeenmorewonderfulthanIcouldhaveeverimagined.ToSlaydeandremi:youaregrowingupsofastandlearningatanoutstandingpace,andyoucontinuetodelightandimpressmedaily.YouarebothgrowingintoamazingindividualsTomymom,Johnnie:ItiswonderfultohaveyouclosebyToMarkNomatterhowmuchtimehaspassedorhowlittleweseeeachother,Ihavebeenandalwayswillbeyourfriend.andfinally,asalways,toElvis:Youwerewayaheadofthecurrentbaconobsessionwithyourpeanutbutter/banana/baconsandwich;ithinkthat'sproofyoutraveledthroughtimeJamesmichaelStewartThankstoJimMinatelandCaroleJelenforhelpinggetthisupdateinplacebefore(IsC)2releasedtheobjectives.Thishelpedusgetaheadstartonthisnewedition,andweappreciateyourefforts.It'sbeenapleasureworkingwithtalentedpeoplelikeJamesMichaelStewartandMikeChappleThankstobothofyouforallyourworkandcollaborativeeffortsonthisproject.Thetechnicaleditors,JeffParkerBobSipes,andDavidSeidl,provideduswithsomeoutstandingfeedback,andthisbookisbetterbecauseoftheireffortsThankstotheteamatSybex(includingprojectmanagers,editors,andgraphicsartists)foralltheworkyoudidhelpingusgetthisbooktoprint.Last,thankstomywife,Nimfa,forputtingupwithmyoddhoursasIworkedonthisbookDarrilgibsonAbouttheauthorsMikeChapple,CISSP,PhD,Security+,CISA,CySA+,isanassociateteachingprofessorofIT,analytics,andoperationsattheUniversityofNotreDame.InthepasthewaschiefinformationofficerofBrandInstituteandaninformationsecurityresearcherwiththenationalSecurityagencyandtheu.s.airForcehisprimaryareasofexpertiseincludenetworkintrusiondetectionandaccesscontrols.mikeisafrequentcontributortoTechTarget'sSearchSecuritysiteandtheauthorofmorethan25booksincludingthecompanionbooktothisstudyguide:CISSPOfficial(ISC)2PracticeTests,theCompTIACSA+StudyGuide,andCyberwarfare:InformationOperationsinaConnectedWorld.MikeoffersstudygroupsfortheCISSP,SSCP,Security+,andcSa+certificationsonhiswebsiteatwww.certmike.comJamesMichaelStewart,CISSP,CEH,ECSA,CHFI,Security+Network+,hasbeenwritingandtrainingformorethan20years,withacurrentfocusonsecurity.hehasbeenteachingCiSsPtrainingcoursessince2002,nottomentionothercoursesonInternetsecurityandethicalhacking/penetrationtestingHeistheauthorofandcontributortomorethan75booksandnumerouscoursewaresetsonsecuritycertification,Microsofttopics,andnetworkadministrationincludingtheSecurity+(SY0-501)Reviewguide.Moreinformationaboutmichaelcanbefoundathiswebsiteatwww.impactonline.comDarrilGibson,CISSP,Security+,CASP,istheCeoofYODa(shortforYouCanDoAnything),andhehasauthoredorcoauthoredmorethan40books.Darrilregularlywrites,consults,andteachesonawidevarietyoftechnicalandsecuritytopicsandholdsseveralcertificationsHeregularlypostsblogarticlesathttp://blogs.getcertifiedgetahead.com/aboutcertificationtopicsandusesthatsitetohelppeoplestayabreastofchangesincertificationexams.Heloveshearingfromreaders,especiallywhentheypassanexamafterusingoneofhisbooks,andyoucancontacthimthroughthelebloggingsite.
2023/2/8 11:30:06 18.38MB cissp 官方英文版
1
共 34 条记录 首页 上一页 下一页 尾页
在日常工作中,钉钉打卡成了我生活中不可或缺的一部分。然而,有时候这个看似简单的任务却给我带来了不少烦恼。 每天早晚,我总是得牢记打开钉钉应用,点击"工作台",再找到"考勤打卡"进行签到。有时候因为工作忙碌,会忘记打卡,导致考勤异常,影响当月的工作评价。而且,由于我使用的是苹果手机,有时候系统更新后,钉钉的某些功能会出现异常,使得打卡变得更加麻烦。 另外,我的家人使用的是安卓手机,他们也经常抱怨钉钉打卡的繁琐。尤其是对于那些不太熟悉手机操作的长辈来说,每次打卡都是一次挑战。他们总是担心自己会操作失误,导致打卡失败。 为了解决这些烦恼,我开始思考是否可以通过编写一个全自动化脚本来实现钉钉打卡。经过一段时间的摸索和学习,我终于成功编写出了一个适用于苹果和安卓系统的钉钉打卡脚本。
2024-04-09 15:03 15KB 钉钉 钉钉打卡