可清除电脑上隐藏的COM口,防止有重复的端口或端口过多导致设备USB口异常或无法通讯,对手机测试方面很实用
2025/2/18 4:27:28 20.54MB 批处理
1
基于(ISC)2CISSPCommonBodyofKnowledge,可以辅助allinone加深对8个域知识点了解,最新的知识点已经在2018年4月15日CISSP考试中广泛体现。
本学习指南重点突出知识点概念并伴有相应测试题,结合allinone8后面测试题、光盘题和《CISSPOfficial(ISC)2PracticeTests2018年第二版》英文版&官方练习题及解题详解(1300题左右),备考题库已足够了解所有知识点本书含21章节,各域对应的章节如下:1-4章对应Domain1SecurityandRiskMgmt第5章对应Domain2Assetsecurity资产安全第6,7,8,9,10章对应Domain3安全架构与工程第11,12章,通讯与网络安全第13,14章,身份与访问管理IAM第15章对应域安全评估与测试第16,17,18,19章对应域7安全运维第20,21章软件开发安全DevelopmentEditor:KellyTalbotTechnicalEditors:JeffParker,BobSipes,andDavidSeidlCopyEditor:KimWimpsettEditorialManager:PeteGaughanProductionManager:KathleenwisorExecutiveeditor:imminatelProofreader:AmyschneiderIndexer:JohnnaVanHoosedinseProjectCoordinator,Cover:brentSavageCoverDesigner:wileyCoverImage:@JeremyWoodhouse/GettyImages,Inc.CopyrightC2018byJohnWileySons,InC,Indianapolis,IndianaPublishedsimultaneouslyinCanadaISBN:978-1-119-47593-4ISBN:978-1-119-47595-8(ebk)ISBN:978-1-119-47587-3(ebk)ManufacturedintheUnitedStatesofamericaNopartofthispublicationmaybereproduced,storedinaretrievalsystemortransmittedianyformorbyanymeans,electronic,mechanical,photocopying,recording,scanningorotherwise,exceptaspermittedunderSections107or108ofthe1976UnitedStatesCopyrightAct,withouteitherthepriorwrittenpermissionofthePublisher,orauthorizationthroughpaymentoftheappropriateper-copyfeetotheCopyrightClearanceCenter,222RosewoodDrive,Danvers,MAO1923,(978)750-8400,fax(978)646-8600RequeststothePublisherforpermissionshouldbeaddressedtothepermissionsDepartment,JohnWileysons,Inc.111RiverStreet,Hoboken,NJo7030,(201)748-6011,fax(201)748-6008,oronlineathttp://www.wiley.com/go/permissionsLimitofliability/DisclaimerofWarranty:Thepublisherandtheauthormakenorepresentationsorwarrantieswithrespecttotheaccuracyorcompletenessofthecontentsofthisworkandspecificallydisclaimallwarranties,includingwithoutlimitationwarrantiesoffitnessforaparticularpurpose.Nowarrantymaybecreatedorextendedbysalesorpromotionalmaterials.Theadviceandstrategiescontainedhereinmaynotbesuitableforeverysituation.Thisworkissoldwiththeunderstandingthatthepublisherisnotengagedinrenderinglegal,accounting,orotherprofessionalservices.Ifprofessionalassistanceisrequiredtheservicesofacompetentprofessionalpersonshouldbesought.Neitherthepublishernortheauthorshallbeliablefordamagesarisingherefrom.ThefactthatanorganizationorWebsiteisreferredtointhisworkasacitationand/orapotentialsourceoffurtherinformationdoesnotmeanthattheauthororthepublisherendorsestheinformationtheorganizationorWebsitemayprovideorrecommendationsitmaymakeFurtherreadersshouldbeawarethatInternetWebsiteslistedinthisworkmayhavechangedordisappearedbetweenwhenthisworkwaswrittenandwhenitisreadForgeneralinformationonourotherproductsandservicesortoobtaintechnicalsupportpleasecontactourCustomerCareDepartmentwithintheU.S.at(877)762-2974,outsidetheUS.at(317)5723993orfax(317)572-4002Wileypublishesinavarietyofprintandelectronicformatsandbyprint-on-demand.Somematerialincludedwithstandardprintversionsofthisbookmaynotbeincludedine-booksorinprint-On-demand.IfthisbookreferstomediasuchasaCDorDVdthatisnotincludedintheversionyoupurchasedyoumaydownloadthismaterialathttp://booksupport.wilev.comFormoreinformationaboutwileyproductsvisitwww.wiley.comLibraryofCongressControlNumber:2018933561TRADEMARKS:Wiley,theWileylogo,andtheSybexlogoaretrademarksorregisteredtrademarksofJohnWileySons,Incand/oritsaffiliates,intheUnitedStatesandothercountries,andmaynotbeusedwithoutwrittenpermission.CISSPisaregisteredtrademarkof(ISC)2,Inc.AllothertrademarksarethepropertyoftheirrespectiveownersJohnWileySons,Incisnotassociatedwithanyproductorvendormentionedinthisbook.ToDewittLatimer,mymentor,friend,andcolleague.Imissyoudearly.MikeChappleToCathy,yourperspectiveontheworldandlifeoftensurprisesme,challengesme,andmakesmeloveyouevenmoreJamesmichaelstewartToNimfa,thanksforsharingyourlifewithmeforthepast26yearsandlettingmeshareminewithyouDarrilgibsonDearFuture(ISC)2MemberCongratulationsonstartingyourjourneytoCISSPRcertificationEarningyourCISSPisanexcitingandrewardingmilestoneinyourcybersecuritycareer.Notonlydoesitdemonstrateyourabilitytodevelopandmanagenearlyallaspectsofanorganizationscybersecurityoperations,butyoualsosignaltoemployersyourcommitmenttolife-longlearningandtakinganactiveroleinfulfillingthe(isc)2visionofinspiringasafeandsecurecyberworldThematerialinthisstudyguideisbaseduponthe(isc)2cisspCommonBodyofKnowledge.ItwillhelpyoupreparefortheexamthatwillassessyourcompetencyinthefollowingeightdomainsaSecurityandriskmanagement■AssetsecuritySecurityArchitectureandengineeringaCommunicationandNetworksecurityaIdentityandAccessManagement(IAM)SecurityAssessmentandTesting■SecurityOperationsSoftwareDevelopmentSecurityWhilethisstudyguidewillhelpyouprepare,passingthecisspexamdependsonyourmasteryofthedomainscombinedwithyourabilitytoapplythoseconceptsusingyourreal-worldexperienceiwishyouthebestofluckasyoucontinueonyourpathtobecomeaCISSPandcertifiedmemberof(Isc)2Sincerely,Davidshearer.CISSPCEO(ISC)2Ackn。
w|edgmentsWe'dliketoexpressourthankstoSybexforcontinuingtosupportthisproject.Extrathankstotheeightheditiondevelopmentaleditor,kellyTalbot,andtechnicaleditors,JeffParker,BobSipes,andDavidSeidlwhoperformedamazingfeatsinguidingustoimprovethisbookThanksaswelltoouragent,CaroleJelen,forcontinuingtoassistinnailingdowntheseprojectsMikejames.anddarrilSpecialthanksgototheinformationsecurityteamattheUniversityofNotreDame,whoprovidedhoursofinterestingconversationanddebateonsecurityissuesthatinspiredandinformedmuchofthematerialinthisbookIwouldliketothanktheteamatwileywhoprovidedinvaluableassistancethroughoutthebookdevelopmentprocess.ialsooweadebtofgratitudetomyliteraryagent,CaroleJelenofWatersideProductions.Mycoauthors,JamesMichaelStewartanddarrilGibsonweregreatcollaborators.JeffParker,BobSipes,andDavidSeidl,ourdiligentandknowledgeabletechnicaleditors,providedvaluableinsightaswebroughtthiseditiontopressIdalsoliketothankthemanypeoplewhoparticipatedintheproductionofthisbookbutwhomIneverhadthechancetomeet:thegraphicsteam,theproductionstaff,andallofthoseinvolvedinbringingthisbooktopress-MikeChappleThankstoMikeChappleandDarrilGibsonforcontinuingtocontributetothisprojectThanksalsotoallmycisspcoursestudentswhohaveprovidedtheirinsightandinputtoimprovemytrainingcoursewareandultimatelythistome.Tomyadoringwife,CathyBuildingalifeandafamilytogetherhasbeenmorewonderfulthanIcouldhaveeverimagined.ToSlaydeandremi:youaregrowingupsofastandlearningatanoutstandingpace,andyoucontinuetodelightandimpressmedaily.YouarebothgrowingintoamazingindividualsTomymom,Johnnie:ItiswonderfultohaveyouclosebyToMarkNomatterhowmuchtimehaspassedorhowlittleweseeeachother,Ihavebeenandalwayswillbeyourfriend.andfinally,asalways,toElvis:Youwerewayaheadofthecurrentbaconobsessionwithyourpeanutbutter/banana/baconsandwich;ithinkthat'sproofyoutraveledthroughtimeJamesmichaelStewartThankstoJimMinatelandCaroleJelenforhelpinggetthisupdateinplacebefore(IsC)2releasedtheobjectives.Thishelpedusgetaheadstartonthisnewedition,andweappreciateyourefforts.It'sbeenapleasureworkingwithtalentedpeoplelikeJamesMichaelStewartandMikeChappleThankstobothofyouforallyourworkandcollaborativeeffortsonthisproject.Thetechnicaleditors,JeffParkerBobSipes,andDavidSeidl,provideduswithsomeoutstandingfeedback,andthisbookisbetterbecauseoftheireffortsThankstotheteamatSybex(includingprojectmanagers,editors,andgraphicsartists)foralltheworkyoudidhelpingusgetthisbooktoprint.Last,thankstomywife,Nimfa,forputtingupwithmyoddhoursasIworkedonthisbookDarrilgibsonAbouttheauthorsMikeChapple,CISSP,PhD,Security+,CISA,CySA+,isanassociateteachingprofessorofIT,analytics,andoperationsattheUniversityofNotreDame.InthepasthewaschiefinformationofficerofBrandInstituteandaninformationsecurityresearcherwiththenationalSecurityagencyandtheu.s.airForcehisprimaryareasofexpertiseincludenetworkintrusiondetectionandaccesscontrols.mikeisafrequentcontributortoTechTarget'sSearchSecuritysiteandtheauthorofmorethan25booksincludingthecompanionbooktothisstudyguide:CISSPOfficial(ISC)2PracticeTests,theCompTIACSA+StudyGuide,andCyberwarfare:InformationOperationsinaConnectedWorld.MikeoffersstudygroupsfortheCISSP,SSCP,Security+,andcSa+certificationsonhiswebsiteatwww.certmike.comJamesMichaelStewart,CISSP,CEH,ECSA,CHFI,Security+Network+,hasbeenwritingandtrainingformorethan20years,withacurrentfocusonsecurity.hehasbeenteachingCiSsPtrainingcoursessince2002,nottomentionothercoursesonInternetsecurityandethicalhacking/penetrationtestingHeistheauthorofandcontributortomorethan75booksandnumerouscoursewaresetsonsecuritycertification,Microsofttopics,andnetworkadministrationincludingtheSecurity+(SY0-501)Reviewguide.Moreinformationaboutmichaelcanbefoundathiswebsiteatwww.impactonline.comDarrilGibson,CISSP,Security+,CASP,istheCeoofYODa(shortforYouCanDoAnything),andhehasauthoredorcoauthoredmorethan40books.Darrilregularlywrites,consults,andteachesonawidevarietyoftechnicalandsecuritytopicsandholdsseveralcertificationsHeregularlypostsblogarticlesathttp://blogs.getcertifiedgetahead.com/aboutcertificationtopicsandusesthatsitetohelppeoplestayabreastofchangesincertificationexams.Heloveshearingfromreaders,especiallywhentheypassanexamafterusingoneofhisbooks,andyoucancontacthimthroughthelebloggingsite.
2025/2/15 1:12:56 17.84MB CISSP OSG OSG8 Official
1
一个简单的通讯录的javaWEB小项目,实现了联系人的添加、删除、修改、搜索分类的修改、添加回收站的恢复和彻底删除运行环境:myeclipse8.5win7orical数据库tomcat6.0服务器若遇到配置问题请发邮件到2750437223@qq.com
2025/2/14 2:51:50 1.42MB java MFC 通讯录 项目
1
计算机二级2019.03模拟软件(无忧考吧),已经实验MSCVB,理论上支持所有科目。
使用说明:1.先到无忧考吧官网下载对应题库http://ncre.wyk8.com/Category_25/Index.aspx,2.安装后将本补丁解压放在安装目录下,覆盖原文件。
3.再次打开,软件就可无限期使用!
2025/2/13 18:12:34 69KB 计算机二级 二级MS 二级VB 二级C
1
具体详情https://gitee.com/wuburen/guns#GunsV2.1新版Guns基于SpringBoot全面升级,完美整合springmvc+shiro+mybatis-plus+beetl!在不用写xml配置(V1.0)的基础上进一步简化项目配置,让您更专注于业务开发!抛弃传统springxml的配置方式,利用springboot+javabean方式配置spring,极大简化了pom.xml配置和spring配置.Guns项目代码简洁,注释丰富,上手容易,同时Guns包含许多基础模块(用户管理,角色管理,部门管理,字典管理等10个模块),可以直接作为一个后台管理系统的脚手架.如果您不喜欢用SpringBoot,或者您是一个spring初学者,您可以切换到GunsV1.0(点击这里)分支,GunsV1.0基于spring的javabean方式配置项目,同样简洁易上手.注:SpringBoot强大的AutoConfig和统一的依赖管理极大的简化了spring配置和maven依赖,在不了解其都配置了哪些东西的基础上可能会对初学者有一定困扰,所以建议初学者先看GunsV1.0##功能简介用户管理角色管理部门管理菜单管理字典管理业务日志登录日志监控管理通知管理代码生成##使用说明导入sql/guns.sql文件到mysql数据库以maven方式导入项目到ide修改application.yml中的数据库相关的配置,改为您本机的数据库配置启动项目,管理员账号admin/密码111111###如何启动项目Guns目前支持三种启动方式:在IDE里运行GunsApplication类中的main方法启动执行如下maven命令cleanpackage-Dmaven.test.skip=true并从target目录中找到guns-1.0.0-SNAPSHOT.jar,并在jar包的目录下执行如下java命令java-jarguns-1.0.0-SNAPSHOT.jar修改pom.xml中如下片段jar改为war并打包放入到tomcat中执行##所用框架###前端Bootstrapv3.3.6jQueryv2.1.4bootstrap-tablev1.9.0layerv2.1zTreecorev3.5.28WebUploader0.1.5###后端SpringBoot1.5.3.RELEASEMyBatis-Plus2.0.8MyBatis3.4.4Spring4.3.8.RELEASEBeetl2.7.15hibernate-validator5.3.5.FinalEhcache3.3.1Kaptcha2.3.2Fastjson1.2.31Shiro1.4.0Druid1.0.31##项目包结构说明├─main│││├─java│││││├─com.stylefeng.guns----------------项目主代码│││││││├─common----------------项目公用的部分(业务中经常调用的类,例如常量,异常,实体,注解,分页类,节点类)│││││││├─config----------------项目配置代码(例如mybtais-plus配置,ehcache配置等)│││││││├─core----------------项目运行的核心依靠(例如aop日志记录,拦截器,监听器,guns模板引擎,shiro权限检查等)│││││││├─modular----------------项目业务代码│││││││├─GunsApplication类----------------以main方法启动springboot的类│││││││└─GunsServletInitializer类----------------用servlet容器启动springboot的核心类│││││
2025/2/13 0:12:08 70B java SpringBoot guns guns(收费)
1
1.41.SEO大量优化URL路径绝对化,一定要更改index.php、news.php、m.php这三个文件的$SiteUrl="https://www.xxxxxx.com/qzrencai";//注意,最后不用加"/"2.增加首页HR工具箱
1
PCL-1.8.0-AllInOne-msvc2015-win64.exe.从网址http://unanancyowen.com/en/pcl18/下载过来的。
分享给不能fq的朋友。
文件大小为357MB.
2025/2/12 21:32:30 357.65MB PCL
1
vc++编程技术600个大型项目源码(一).docvc++编程技术600个大型项目源码(二).docvc++编程技术600个大型项目源码(三).docvc++编程技术600个大型项目源码(四).docvc++编程技术600个大型项目源码(六).docvc++编程技术600个大型项目源码(七).docvc++编程技术600个大型项目源码(八).docvc++编程技术600个大型项目源码(九).docvc++编程技术600个大型项目源码(十).docvc++编程技术600个大型项目源码(十一).doc有点可惜的是第五的,没有找到!不过,剩下的内容也够强大了,如matlab和vc混合编程,vc与Com技术,vc与asp的计算,图像处理,mfc控件,钩子技术,还有一小部分的OpenGL。
当然,内容不可能面面俱到,而且代码也是十分简单。
但对刚起步的vc++程序员还是很有学习与借鉴意义。
2025/2/12 17:12:43 1.97MB VC++
1
注意现在可以通过TerraformProvider注册表自动下载OCITerraformProvider。
有关如何开始的更多信息,请参阅和。
OracleCloudInfrastructure的TerraformProvider要求v0.10.1或更高版本1.11.4(推荐)注意:您可以使用任何1.8或更高版本来构建提供程序。
但是,goimports,govet和gofmt代码检查仅在使用1.11版时通过。
建立提供者将存储$GOPATH/src/github.com/terraform-providers/terraform-provider-oci到:$GOPATH/src/github.com/terraform-providers/terraform-provider-oci$mkdir-p$GOPATH/src/github.com/terraform-providers;cd$GOPATH/src/github.com/terraform-providers$gitclonegit@github.com
2025/2/12 15:44:35 17.9MB terraform iaas oracle orchestration
1
c#制作仿苹果优美界面需要加载皮肤动态链接库。
制作详情在http://jingyan.baidu.com/article/6c67b1d6ea3cd02787bb1eeb.html查看
2025/2/10 15:10:42 125KB 仿苹果 优美界面
1
共 1000 条记录 首页 上一页 下一页 尾页
在日常工作中,钉钉打卡成了我生活中不可或缺的一部分。然而,有时候这个看似简单的任务却给我带来了不少烦恼。 每天早晚,我总是得牢记打开钉钉应用,点击"工作台",再找到"考勤打卡"进行签到。有时候因为工作忙碌,会忘记打卡,导致考勤异常,影响当月的工作评价。而且,由于我使用的是苹果手机,有时候系统更新后,钉钉的某些功能会出现异常,使得打卡变得更加麻烦。 另外,我的家人使用的是安卓手机,他们也经常抱怨钉钉打卡的繁琐。尤其是对于那些不太熟悉手机操作的长辈来说,每次打卡都是一次挑战。他们总是担心自己会操作失误,导致打卡失败。 为了解决这些烦恼,我开始思考是否可以通过编写一个全自动化脚本来实现钉钉打卡。经过一段时间的摸索和学习,我终于成功编写出了一个适用于苹果和安卓系统的钉钉打卡脚本。
2024-04-09 15:03 15KB 钉钉 钉钉打卡