数据集目录:2dplanes.arffabalone.arffailerons.arffAmazon_initial_50_30_10000.arffanneal.arffanneal.ORIG.arffarrhythmia.arffaudiology.arffaustralian.arffauto93.arffautoHorse.arffautoMpg.arffautoPrice.arffautos.arffauto_price.arffbalance-scale.arffbank.arffbank32nh.arffbank8FM.arffbaskball.arffbodyfat.arffbolts.arffbreast-cancer.arffbreast-w.arffbreastTumor.arffbridges_version1.arffbridges_version2.arffcal_housing.arffcar.arffcholesterol.arffcleveland.arffcloud.arffcmc.arffcolic.arffcolic.ORIG.arffcontact-lenses.arffcpu.arffcpu.with.vendor.arffcpu_act.arffcpu_small.arffcredit-a.arffcredit-g.arffcylinder-bands.arffdelta_ailerons.arffdelta_elevators.arffdermatology.arffdetroit.arffdiabetes.arffdiabetes_numeric.arffechoMonths.arffecoli.arffelevators.arffelusage.arffeucalyptus.arffeye_movements.arfffishcatch.arffflags.arfffried.arfffruitfly.arffgascons.arffglass.arffgrub-damage.arffheart-c.arffheart-h.arffheart-statlog.arffhepatitis.arffhouse_16H.arffhouse_8L.arffhousing.arffhungarian.arffhypothyroid.arffionosphere.arffiris.2D.arffiris.arffkdd_coil_test-1.arffkdd_coil_test-2.arffkdd_coil_test-3.arffkdd_coil_test-4.arffkdd_coil_test-5.arffkdd_coil_test-6.arffkdd_coil_test-7.arffkdd_coil_train-1.arffkdd_coil_train-3.arffkdd_coil_train-4.arffkdd_coil_train-5.arffkdd_coil_train-6.arffkdd_coil_train-7.arffkdd_el_nino-small.arffkdd_internet_usage.arffkdd_ipums_la_97-small.arffkdd_ipums_la_98-small.arffkdd_ipums_la_99-small.arffkdd_JapaneseVowels_test.arffkdd_JapaneseVowels_train.arffkdd_synthetic_control.arffkdd_SyskillWebert-Bands.arffkdd_SyskillWebert-BioMedical.arffkdd_SyskillWebert-Goats.arffkdd_SyskillWebert-Sheep.arffkdd_UNIX_user_data.arffkin8nm.arffkr-vs-kp.arfflabor.arfflandsat_test.arfflandsat_train.arffletter.arffliver-disorders.arfflongley.arfflowbwt.arfflung-cancer.arfflymph.arffmachine_cpu.arffmbagrade.arffmeta.arffmfeat-factors.arffmfeat-fourier.arffmfea
2023/6/6 15:27:36 19.67MB arff weka 数据集
1
IDAPro7.3移除水印版,详情请参考https://bbs.pediy.com/thread-260671.htm
2023/6/4 1:29:33 314.97MB ida
1
制造Wireshark的OUI数据库的解析器库。
使用Wireshark的OUI数据库将MAC地址转换为制造商。
通过在初始化时将整个文件读入内存来优化快速查找功能。
将MAC地址范围映射到制造商和注释(描述)。
包含对网络掩码和数据库中其他奇怪内容的完全支持。
请参阅。
由MichaelHuang(coolbho3k)撰写。
安装与PyPipipinstallmanuf或手动gitclonehttps://github.com/coolbho3k/manufcdmanufpythonsetup.pyinstall用法作为图书馆:>>>frommanufimportmanuf>>>p=manuf.MacParser(update=True)>>>p.get_all('BC:EE:7B:00:00:00')Vendor(manuf='AsustekC',comment='ASUSTekCOMPUTERINC.')>>>p.get_manuf('BC:EE:7B:00:00:00')'AsustekC'>>
2023/3/13 8:13:47 1.02MB python library networking mac-address
1
cissp官方进修指南第八版(英文),改版后2018最新进修指南。
不用看cbk那么费劲,就看这个版本九百多页,八个知识域全覆盖,还省事。
DevelopmentEditor:KellyTalbotTechnicalEditors:JeffParker,BobSipes,andDavidSeidlCopyEditor:KimWimpsettEditorialManager:PeteGaughanProductionManager:KathleenwisorExecutiveeditor:imminatelProofreader:AmyschneiderIndexer:JohnnaVanHoosedinseProjectCoordinator,Cover:brentSavageCoverDesigner:wileyCoverImage:@JeremyWoodhouse/GettyImages,Inc.CopyrightC2018byJohnWileySons,InC,Indianapolis,IndianaPublishedsimultaneouslyinCanadaISBN:978-1-119-47593-4ISBN:978-1-119-47595-8(ebk)ISBN:978-1-119-47587-3(ebk)ManufacturedintheUnitedStatesofamericaNopartofthispublicationmaybereproduced,storedinaretrievalsystemortransmittedianyformorbyanymeans,electronic,mechanical,photocopying,recording,scanningorotherwise,exceptaspermittedunderSections107or108ofthe1976UnitedStatesCopyrightAct,withouteitherthepriorwrittenpermissionofthePublisher,orauthorizationthroughpaymentoftheappropriateper-copyfeetotheCopyrightClearanceCenter,222RosewoodDrive,Danvers,MAO1923,(978)750-8400,fax(978)646-8600RequeststothePublisherforpermissionshouldbeaddressedtothepermissionsDepartment,JohnWileysons,Inc.111RiverStreet,Hoboken,NJo7030,(201)748-6011,fax(201)748-6008,oronlineathttp://www.wiley.com/go/permissionsLimitofliability/DisclaimerofWarranty:Thepublisherandtheauthormakenorepresentationsorwarrantieswithrespecttotheaccuracyorcompletenessofthecontentsofthisworkandspecificallydisclaimallwarranties,includingwithoutlimitationwarrantiesoffitnessforaparticularpurpose.Nowarrantymaybecreatedorextendedbysalesorpromotionalmaterials.Theadviceandstrategiescontainedhereinmaynotbesuitableforeverysituation.Thisworkissoldwiththeunderstandingthatthepublisherisnotengagedinrenderinglegal,accounting,orotherprofessionalservices.Ifprofessionalassistanceisrequiredtheservicesofacompetentprofessionalpersonshouldbesought.Neitherthepublishernortheauthorshallbeliablefordamagesarisingherefrom.ThefactthatanorganizationorWebsiteisreferredtointhisworkasacitationand/orapotentialsourceoffurtherinformationdoesnotmeanthattheauthororthepublisherendorsestheinformationtheorganizationorWebsitemayprovideorrecommendationsitmaymakeFurtherreadersshouldbeawarethatInternetWebsiteslistedinthisworkmayhavechangedordisappearedbetweenwhenthisworkwaswrittenandwhenitisreadForgeneralinformationonourotherproductsandservicesortoobtaintechnicalsupportpleasecontactourCustomerCareDepartmentwithintheU.S.at(877)762-2974,outsidetheUS.at(317)5723993orfax(317)572-4002Wileypublishesinavarietyofprintandelectronicformatsandbyprint-on-demand.Somematerialincludedwithstandardprintversionsofthisbookmaynotbeincludedine-booksorinprint-On-demand.IfthisbookreferstomediasuchasaCDorDVdthatisnotincludedintheversionyoupurchasedyoumaydownloadthismaterialathttp://booksupport.wilev.comFormoreinformationaboutwileyproductsvisitwww.wiley.comLibraryofCongressControlNumber:2018933561TRADEMARKS:Wiley,theWileylogo,andtheSybexlogoaretrademarksorregisteredtrademarksofJohnWileySons,Incand/oritsaffiliates,intheUnitedStatesandothercountries,andmaynotbeusedwithoutwrittenpermission.CISSPisaregisteredtrademarkof(ISC)2,Inc.AllothertrademarksarethepropertyoftheirrespectiveownersJohnWileySons,Incisnotassociatedwithanyproductorvendormentionedinthisbook.ToDewittLatimer,mymentor,friend,andcolleague.Imissyoudearly.MikeChappleToCathy,yourperspectiveontheworldandlifeoftensurprisesme,challengesme,andmakesmeloveyouevenmoreJamesmichaelstewartToNimfa,thanksforsharingyourlifewithmeforthepast26yearsandlettingmeshareminewithyouDarrilgibsonDearFuture(ISC)2MemberCongratulationsonstartingyourjourneytoCISSPRcertificationEarningyourCISSPisanexcitingandrewardingmilestoneinyourcybersecuritycareer.Notonlydoesitdemonstrateyourabilitytodevelopandmanagenearlyallaspectsofanorganizationscybersecurityoperations,butyoualsosignaltoemployersyourcommitmenttolife-longlearningandtakinganactiveroleinfulfillingthe(isc)2visionofinspiringasafeandsecurecyberworldThematerialinthisstudyguideisbaseduponthe(isc)2cisspCommonBodyofKnowledge.ItwillhelpyoupreparefortheexamthatwillassessyourcompetencyinthefollowingeightdomainsaSecurityandriskmanagement■AssetsecuritySecurityArchitectureandengineeringaCommunicationandNetworksecurityaIdentityandAccessManagement(IAM)SecurityAssessmentandTesting■SecurityOperationsSoftwareDevelopmentSecurityWhilethisstudyguidewillhelpyouprepare,passingthecisspexamdependsonyourmasteryofthedomainscombinedwithyourabilitytoapplythoseconceptsusingyourreal-worldexperienceiwishyouthebestofluckasyoucontinueonyourpathtobecomeaCISSPandcertifiedmemberof(Isc)2Sincerely,Davidshearer.CISSPCEO(ISC)2Ackn。
w|edgmentsWe'dliketoexpressourthankstoSybexforcontinuingtosupportthisproject.Extrathankstotheeightheditiondevelopmentaleditor,kellyTalbot,andtechnicaleditors,JeffParker,BobSipes,andDavidSeidlwhoperformedamazingfeatsinguidingustoimprovethisbookThanksaswelltoouragent,CaroleJelen,forcontinuingtoassistinnailingdowntheseprojectsMikejames.anddarrilSpecialthanksgototheinformationsecurityteamattheUniversityofNotreDame,whoprovidedhoursofinterestingconversationanddebateonsecurityissuesthatinspiredandinformedmuchofthematerialinthisbookIwouldliketothanktheteamatwileywhoprovidedinvaluableassistancethroughoutthebookdevelopmentprocess.ialsooweadebtofgratitudetomyliteraryagent,CaroleJelenofWatersideProductions.Mycoauthors,JamesMichaelStewartanddarrilGibsonweregreatcollaborators.JeffParker,BobSipes,andDavidSeidl,ourdiligentandknowledgeabletechnicaleditors,providedvaluableinsightaswebroughtthiseditiontopressIdalsoliketothankthemanypeoplewhoparticipatedintheproductionofthisbookbutwhomIneverhadthechancetomeet:thegraphicsteam,theproductionstaff,andallofthoseinvolvedinbringingthisbooktopress-MikeChappleThankstoMikeChappleandDarrilGibsonforcontinuingtocontributetothisprojectThanksalsotoallmycisspcoursestudentswhohaveprovidedtheirinsightandinputtoimprovemytrainingcoursewareandultimatelythistome.Tomyadoringwife,CathyBuildingalifeandafamilytogetherhasbeenmorewonderfulthanIcouldhaveeverimagined.ToSlaydeandremi:youaregrowingupsofastandlearningatanoutstandingpace,andyoucontinuetodelightandimpressmedaily.YouarebothgrowingintoamazingindividualsTomymom,Johnnie:ItiswonderfultohaveyouclosebyToMarkNomatterhowmuchtimehaspassedorhowlittleweseeeachother,Ihavebeenandalwayswillbeyourfriend.andfinally,asalways,toElvis:Youwerewayaheadofthecurrentbaconobsessionwithyourpeanutbutter/banana/baconsandwich;ithinkthat'sproofyoutraveledthroughtimeJamesmichaelStewartThankstoJimMinatelandCaroleJelenforhelpinggetthisupdateinplacebefore(IsC)2releasedtheobjectives.Thishelpedusgetaheadstartonthisnewedition,andweappreciateyourefforts.It'sbeenapleasureworkingwithtalentedpeoplelikeJamesMichaelStewartandMikeChappleThankstobothofyouforallyourworkandcollaborativeeffortsonthisproject.Thetechnicaleditors,JeffParkerBobSipes,andDavidSeidl,provideduswithsomeoutstandingfeedback,andthisbookisbetterbecauseoftheireffortsThankstotheteamatSybex(includingprojectmanagers,editors,andgraphicsartists)foralltheworkyoudidhelpingusgetthisbooktoprint.Last,thankstomywife,Nimfa,forputtingupwithmyoddhoursasIworkedonthisbookDarrilgibsonAbouttheauthorsMikeChapple,CISSP,PhD,Security+,CISA,CySA+,isanassociateteachingprofessorofIT,analytics,andoperationsattheUniversityofNotreDame.InthepasthewaschiefinformationofficerofBrandInstituteandaninformationsecurityresearcherwiththenationalSecurityagencyandtheu.s.airForcehisprimaryareasofexpertiseincludenetworkintrusiondetectionandaccesscontrols.mikeisafrequentcontributortoTechTarget'sSearchSecuritysiteandtheauthorofmorethan25booksincludingthecompanionbooktothisstudyguide:CISSPOfficial(ISC)2PracticeTests,theCompTIACSA+StudyGuide,andCyberwarfare:InformationOperationsinaConnectedWorld.MikeoffersstudygroupsfortheCISSP,SSCP,Security+,andcSa+certificationsonhiswebsiteatwww.certmike.comJamesMichaelStewart,CISSP,CEH,ECSA,CHFI,Security+Network+,hasbeenwritingandtrainingformorethan20years,withacurrentfocusonsecurity.hehasbeenteachingCiSsPtrainingcoursessince2002,nottomentionothercoursesonInternetsecurityandethicalhacking/penetrationtestingHeistheauthorofandcontributortomorethan75booksandnumerouscoursewaresetsonsecuritycertification,Microsofttopics,andnetworkadministrationincludingtheSecurity+(SY0-501)Reviewguide.Moreinformationaboutmichaelcanbefoundathiswebsiteatwww.impactonline.comDarrilGibson,CISSP,Security+,CASP,istheCeoofYODa(shortforYouCanDoAnything),andhehasauthoredorcoauthoredmorethan40books.Darrilregularlywrites,consults,andteachesonawidevarietyoftechnicalandsecuritytopicsandholdsseveralcertificationsHeregularlypostsblogarticlesathttp://blogs.getcertifiedgetahead.com/aboutcertificationtopicsandusesthatsitetohelppeoplestayabreastofchangesincertificationexams.Heloveshearingfromreaders,especiallywhentheypassanexamafterusingoneofhisbooks,andyoucancontacthimthroughthelebloggingsite.
2023/2/8 11:30:06 18.38MB cissp 官方英文版
1
OpenCV在TI达芬奇以及OMAP平台下的移植与功能评估Intoday’sadvancingmarket,thegrowingperformanceanddecreasingpriceofembeddedprocessorsareopeningmanydoorsfordeveloperstodesignhighlysophisticatedsolutionsfordifferentendapplications.Thecomplexitiesofthesesystemscancreatebottlenecksfordevelopersintheformoflongerdevelopmenttimes,morecomplicateddevelopmentenvironmentsandissueswithapplicationstabilityandquality.DeveloperscanaddresstheseproblemsusingsophisticatedsoftwarepackagessuchasOpenCV,butmigratingthissoftwaretoembeddedplatformsposesitsownsetofchallenges.Thispaperwillreviewhowtomitigatesomeoftheseissues,includingC++implementation,memoryconstraints,floating-pointsupportandopportunitiestomaximizeperformanceusingvendor-optimizedlibrariesandintegratedacceleratorsorco-processors.Finally,wewillintroduceaneweffortbyTexasInstruments(TI)tooptimizevisionsystemsbyrunningOpenCVontheC6000™digitalsignalprocessor(DSP)architecture.BenchmarkswillshowtheadvantageofusingtheDSPbycomparingtheperformanceofaDSP+ARM®system-on-chip(SoC)processoragainstanARM-onlydevice.
2020/1/3 4:58:28 342KB OpenCV Davinci OMAP dsp
1
该存储库包含一切文档页面以及主网站的共享文件。
设置新存储库gitsubmoduleaddhttps://github.com/amphp/amphp.github.iodocs/.shared#copy.gitignore,_config.ymlandGemfilefromanotherrepository#adjustnavigationandpathsin_config.ymlcddocsln-s.shared/assetassetbundleinstall--pathvendor/bundlebundleexecjek
2019/3/24 6:56:02 858KB jekyll github-pages documentation amphp
1
Versiontag:[0A]VendorID=xxxVendorinfo=xxxxFeaturename=xxxxFeaturevers=x
2015/5/23 14:45:13 249KB Sentlm
1
猫眼电影-小程序截图源码简介app├──common├──img├──pages├──utils├──vendor├──app.js├──app.json├──app.wxss└──config.jsserver├──db├──node_modules├──public├──schemas├──views├──package.json└──server.js关于微信小程序自从16年9月微信传出要发布一种与公众号一样形状的开放能力——小程序,便密切关注。
小程序是除传统web端和APP外一种崭新的服务载体,一时间‘别开发APP了’的声音此起彼伏。
本着热爱新奇的技术,对小程序的快捷统一,不需要额外适配各移动端,对开发人员的友好使我格外期盼微信这一新产品的上线。
9月22号小程序内测第一时间下载了官方开发工具,熟悉开发文档,并和众多互联网从业人员一样好奇小程序的入口在微信的哪里。
熟悉和试着开发小程序的各种能力,编写各种小demo。
11月3号小程序公测拿到了小程序开发资格,这样就能在移动端上预览自己的项目
2022/9/6 8:55:18 10.09MB 微信小程序
1
安全性最高的OAuth2和OpenIDConnect框架。
构建简单,功能强大且可扩展。
此库实现同行评审,覆盖在同行评审假冒弱点及对策各种数据库的攻击方案,让您的应用程序的安全当黑客渗透或泄漏您的数据库。
OpenIDConnect是根据实现的,并且包括所有流:代码,隐式,混合。
该库考虑并实现了:OAuth2和OpenIDConnect是困难的协议。
如果您想获得快速胜利,我们强烈建议您看一下。
Hydra是一种安全,高功能的云原生OAuth2和OpenIDConnect服务,它与可以想象的每种身份验证方法集成在一起,并基于Fosite构建。
目录动机之所以写Fosite,是因为我们的OAuth2和OpenIDConnect服务需要安全且可扩展的OAuth2库。
我们必须意识到没有满足我们要求的东西,所以我们决定自己构建它。
API稳定性核心公共API几乎是稳定的,因为大多数更改只会影响内部工作。
我们强烈建议vendoringfosite使用或类似的工具。
例该示例没有很好的视觉效果,但应使您了解可以使用Fosite和几行代码进行操作的想法。
2022/9/5 23:49:18 1.56MB golang security oauth library
1
安全性最高的OAuth2和OpenIDConnect框架。
构建简单,功能强大且可扩展。
此库实现同行评审,覆盖在同行评审假冒弱点及对策各种数据库的攻击方案,让您的应用程序的安全当黑客渗透或泄漏您的数据库。
OpenIDConnect是根据实现的,并且包括所有流:代码,隐式,混合。
该库考虑并实现了:OAuth2和OpenIDConnect是困难的协议。
如果您想获得快速胜利,我们强烈建议您看一下。
Hydra是一种安全,高功能的云原生OAuth2和OpenIDConnect服务,它与可以想象的每种身份验证方法集成在一起,并基于Fosite构建。
目录动机之所以写Fosite,是因为我们的OAuth2和OpenIDConnect服务需要安全且可扩展的OAuth2库。
我们必须意识到没有满足我们要求的东西,所以我们决定自己构建它。
API稳定性核心公共API几乎是稳定的,因为大多数更改只会影响内部工作。
我们强烈建议vendoringfosite使用或类似的工具。
例该示例没有很好的视觉效果,但应使您了解可以使用Fosite和几行代码进行操作的想法。
2022/9/5 23:49:18 1.56MB golang security oauth library
1
共 25 条记录 首页 上一页 下一页 尾页
在日常工作中,钉钉打卡成了我生活中不可或缺的一部分。然而,有时候这个看似简单的任务却给我带来了不少烦恼。 每天早晚,我总是得牢记打开钉钉应用,点击"工作台",再找到"考勤打卡"进行签到。有时候因为工作忙碌,会忘记打卡,导致考勤异常,影响当月的工作评价。而且,由于我使用的是苹果手机,有时候系统更新后,钉钉的某些功能会出现异常,使得打卡变得更加麻烦。 另外,我的家人使用的是安卓手机,他们也经常抱怨钉钉打卡的繁琐。尤其是对于那些不太熟悉手机操作的长辈来说,每次打卡都是一次挑战。他们总是担心自己会操作失误,导致打卡失败。 为了解决这些烦恼,我开始思考是否可以通过编写一个全自动化脚本来实现钉钉打卡。经过一段时间的摸索和学习,我终于成功编写出了一个适用于苹果和安卓系统的钉钉打卡脚本。
2024-04-09 15:03 15KB 钉钉 钉钉打卡