挪用了复位校准函数ADC_ResetCalibration()以及末了校准函数ADC_StartCalibration(),必需查验标志位期待校准实现,确保实现后才末了ADC转换.(建议是每一次上电后都校准一次咯)ADC_SoftwareStartConvCmd(ADC1,ENABLE);配置配备枚举ADC1的方式为软件触发方式.挪用这个函数之后,ADC就末了举行转换了,每一次转换实现后,由DMA抑制器把转换从ADC数据寄存器(ADC_DR)中转移到变量ADC_ConvertedValue中,当DMA传输实现后,在main函数中使用ADC_ConvertedValue的内容便是ADC的转换值了.盘算电压值:在main函数中,ADC_ConvertedValueLoca是一个float尺度变量,它留存了有转换值盘算进去的电压值,盘算的公式是ADC通用的实际电压=ADC转换值*LSBLSB为Vref+接的参考电压/ADC的精度(LSB=3.3/2的12次方)PS:这外面ADC_ConvertedValue是用volatile润色的,用volatile申明的尺度变量展现能够被某些编译器未知的因素变更,譬如:操作体系、硬件大概另内线程等。
由于ADC_ConvertedValue这个变量值随时都是会被DMA抑制器窜改的,所以用volatile来润色它,确保每一次读取到的都是实时的ADC转
2023/3/27 7:36:01 45.05MB STM32F4  DMA AD
1
压缩感知稀疏贝叶斯算法,包含SBL,TSBL和TMSBL算法。
亲身测试能够使用
2023/3/19 15:26:36 478KB CS,bayesian
1
安装方法:1、下载附件中的压缩包,解压并拷贝mod_dosevasive22.dll到Apache安装目录下的modules目录(当然也可以是其他目录,需要自己修改路径)。
2、修改Apache的配置文件http.conf。
添加以下内容LoadModuledosevasive22_modulemodules/mod_dosevasive22.soDOSHashTableSize3097DOSPageCount3DOSSiteCount50DOSPageInterval1DOSSiteInterval1DOSBlockingPeriod10其中DOSHashTableSize3097记录黑名单的尺寸DOSPageCount3每个页面被判断为dos攻击的读取次数DOSSiteCount50每个站点被判断为dos攻击的读取部件(object)的个数DOSPageInterval1读取页面间隔秒DOSSiteInterval1读取站点间隔秒DOSBlockingPeriod10被封时间间隔秒mod_dosevasivev1.10什么是mod_dosevasive?mod_dosevasive是一种提供躲避HTTPDOS/DDOS攻击或暴力强制攻击的apache模块。
它同样可以用作网络探测和管理的工具,通过简单的配置,就可以同ipchains(ip链?)防火墙,路由器等设备进行对话。
并通过email或系统日志提供报告。
发现攻击是通过创建一个内建的IP地址和URIs的动态哈希表来完成,并且阻止同一ip在以下的情况:1.在同一秒多次请求同一页面2.对同一child(对象?)作出超过50个并发请求3.被列入黑名单的ip这种方式在单点攻击和分布式多点攻击的状况下都能很好工作,但如同其它的防黑软件一样,只是针对于那些对网络带宽和处理器消耗的攻击,所以这就是为什么我们要推荐你将它与你的防火墙和路由器配合使用,因为这样才能提供最大限度的保护。
这个模块有一个内建的滤除机制和级别设定,对付不同情况,正因如此合法请求不会遭到妨碍,即使一个用户数次连击“刷新”,也不会遭到影响,除非,他是故意这样做的。
mod_dosevasive完全可以通过apache配置文件来配置,很容易就可以集成到你的web服务器,并且容易使用。
DOSHashTableSize----------------哈希表的大小决定每个子级哈希表的顶级节点数,越多则越可避免反复的查表,但会占据更多内存,如果你的服务器要应付很多访问,那就增大它。
Thevalueyouspecifywillautomaticallybetiereduptothenextprimenumberintheprimeslist(seemod_dosevasive.cforalistofprimesused).DOSPageCount------------规定请求同一页面(URI)的时间间隔犯规的次数,一旦超过,用户ip将被列入黑名单DOSSiteCount------------规定请求站内同一物件的时间间隔犯规的次数,一旦超过,用户ip将被列入黑名单DOSPageInterval---------------同一页面的规定间隔时间,默认为1秒DOSSiteInterval---------------站内同一物件的时间间隔,默认为1秒DOSBlockingPeriod-----------------Theblockingperiod是规定列入黑名单内ip的禁止时限,在时限内,用户继续访问将收到403(Forbidden)的错误提示,并且计时器将重置。
由于列入黑名单后每次访问都会重新计时,所以不必将时限设置太大。
在Dos攻击下,计时器也会保持重置DOSEmailNotify--------------假如这个选项被设置,每个ip被列入黑名单时,都将发送email通知。
但有机制防止重复发送相同的通知注意:请确定mod_dosevasive.c(ormod_dosevasive20.c)已正确配置。
默认配置是"/bin/mail-t%s"%s是email发送的目的地址,假如你是linux或其它使用别的邮箱的操作系统,你需要修改这里DOSSystemCommand----------------假如设置了此项,当有ip被列入黑名单,指定的系统命令将被执行,此项功能被设计为受攻击时可以执行ip过滤器和其它的工具软件,有内建机制避免对相同攻击作重复反应用
2023/3/8 3:43:58 4.89MB apache win ddos mod_dos
1
应用大恒DH-HV1351UM-ML数字摄像机设备进行单帧图像采集保存,VC单文档,源代码和程序,大恒DH-HV1351UM-ML数字摄像机usblib和头文件
2023/2/12 11:41:35 1.87MB 大恒 DH HV1351UM-ML 单帧图像采集
1
cissp官方进修指南第八版(英文),改版后2018最新进修指南。
不用看cbk那么费劲,就看这个版本九百多页,八个知识域全覆盖,还省事。
DevelopmentEditor:KellyTalbotTechnicalEditors:JeffParker,BobSipes,andDavidSeidlCopyEditor:KimWimpsettEditorialManager:PeteGaughanProductionManager:KathleenwisorExecutiveeditor:imminatelProofreader:AmyschneiderIndexer:JohnnaVanHoosedinseProjectCoordinator,Cover:brentSavageCoverDesigner:wileyCoverImage:@JeremyWoodhouse/GettyImages,Inc.CopyrightC2018byJohnWileySons,InC,Indianapolis,IndianaPublishedsimultaneouslyinCanadaISBN:978-1-119-47593-4ISBN:978-1-119-47595-8(ebk)ISBN:978-1-119-47587-3(ebk)ManufacturedintheUnitedStatesofamericaNopartofthispublicationmaybereproduced,storedinaretrievalsystemortransmittedianyformorbyanymeans,electronic,mechanical,photocopying,recording,scanningorotherwise,exceptaspermittedunderSections107or108ofthe1976UnitedStatesCopyrightAct,withouteitherthepriorwrittenpermissionofthePublisher,orauthorizationthroughpaymentoftheappropriateper-copyfeetotheCopyrightClearanceCenter,222RosewoodDrive,Danvers,MAO1923,(978)750-8400,fax(978)646-8600RequeststothePublisherforpermissionshouldbeaddressedtothepermissionsDepartment,JohnWileysons,Inc.111RiverStreet,Hoboken,NJo7030,(201)748-6011,fax(201)748-6008,oronlineathttp://www.wiley.com/go/permissionsLimitofliability/DisclaimerofWarranty:Thepublisherandtheauthormakenorepresentationsorwarrantieswithrespecttotheaccuracyorcompletenessofthecontentsofthisworkandspecificallydisclaimallwarranties,includingwithoutlimitationwarrantiesoffitnessforaparticularpurpose.Nowarrantymaybecreatedorextendedbysalesorpromotionalmaterials.Theadviceandstrategiescontainedhereinmaynotbesuitableforeverysituation.Thisworkissoldwiththeunderstandingthatthepublisherisnotengagedinrenderinglegal,accounting,orotherprofessionalservices.Ifprofessionalassistanceisrequiredtheservicesofacompetentprofessionalpersonshouldbesought.Neitherthepublishernortheauthorshallbeliablefordamagesarisingherefrom.ThefactthatanorganizationorWebsiteisreferredtointhisworkasacitationand/orapotentialsourceoffurtherinformationdoesnotmeanthattheauthororthepublisherendorsestheinformationtheorganizationorWebsitemayprovideorrecommendationsitmaymakeFurtherreadersshouldbeawarethatInternetWebsiteslistedinthisworkmayhavechangedordisappearedbetweenwhenthisworkwaswrittenandwhenitisreadForgeneralinformationonourotherproductsandservicesortoobtaintechnicalsupportpleasecontactourCustomerCareDepartmentwithintheU.S.at(877)762-2974,outsidetheUS.at(317)5723993orfax(317)572-4002Wileypublishesinavarietyofprintandelectronicformatsandbyprint-on-demand.Somematerialincludedwithstandardprintversionsofthisbookmaynotbeincludedine-booksorinprint-On-demand.IfthisbookreferstomediasuchasaCDorDVdthatisnotincludedintheversionyoupurchasedyoumaydownloadthismaterialathttp://booksupport.wilev.comFormoreinformationaboutwileyproductsvisitwww.wiley.comLibraryofCongressControlNumber:2018933561TRADEMARKS:Wiley,theWileylogo,andtheSybexlogoaretrademarksorregisteredtrademarksofJohnWileySons,Incand/oritsaffiliates,intheUnitedStatesandothercountries,andmaynotbeusedwithoutwrittenpermission.CISSPisaregisteredtrademarkof(ISC)2,Inc.AllothertrademarksarethepropertyoftheirrespectiveownersJohnWileySons,Incisnotassociatedwithanyproductorvendormentionedinthisbook.ToDewittLatimer,mymentor,friend,andcolleague.Imissyoudearly.MikeChappleToCathy,yourperspectiveontheworldandlifeoftensurprisesme,challengesme,andmakesmeloveyouevenmoreJamesmichaelstewartToNimfa,thanksforsharingyourlifewithmeforthepast26yearsandlettingmeshareminewithyouDarrilgibsonDearFuture(ISC)2MemberCongratulationsonstartingyourjourneytoCISSPRcertificationEarningyourCISSPisanexcitingandrewardingmilestoneinyourcybersecuritycareer.Notonlydoesitdemonstrateyourabilitytodevelopandmanagenearlyallaspectsofanorganizationscybersecurityoperations,butyoualsosignaltoemployersyourcommitmenttolife-longlearningandtakinganactiveroleinfulfillingthe(isc)2visionofinspiringasafeandsecurecyberworldThematerialinthisstudyguideisbaseduponthe(isc)2cisspCommonBodyofKnowledge.ItwillhelpyoupreparefortheexamthatwillassessyourcompetencyinthefollowingeightdomainsaSecurityandriskmanagement■AssetsecuritySecurityArchitectureandengineeringaCommunicationandNetworksecurityaIdentityandAccessManagement(IAM)SecurityAssessmentandTesting■SecurityOperationsSoftwareDevelopmentSecurityWhilethisstudyguidewillhelpyouprepare,passingthecisspexamdependsonyourmasteryofthedomainscombinedwithyourabilitytoapplythoseconceptsusingyourreal-worldexperienceiwishyouthebestofluckasyoucontinueonyourpathtobecomeaCISSPandcertifiedmemberof(Isc)2Sincerely,Davidshearer.CISSPCEO(ISC)2Ackn。
w|edgmentsWe'dliketoexpressourthankstoSybexforcontinuingtosupportthisproject.Extrathankstotheeightheditiondevelopmentaleditor,kellyTalbot,andtechnicaleditors,JeffParker,BobSipes,andDavidSeidlwhoperformedamazingfeatsinguidingustoimprovethisbookThanksaswelltoouragent,CaroleJelen,forcontinuingtoassistinnailingdowntheseprojectsMikejames.anddarrilSpecialthanksgototheinformationsecurityteamattheUniversityofNotreDame,whoprovidedhoursofinterestingconversationanddebateonsecurityissuesthatinspiredandinformedmuchofthematerialinthisbookIwouldliketothanktheteamatwileywhoprovidedinvaluableassistancethroughoutthebookdevelopmentprocess.ialsooweadebtofgratitudetomyliteraryagent,CaroleJelenofWatersideProductions.Mycoauthors,JamesMichaelStewartanddarrilGibsonweregreatcollaborators.JeffParker,BobSipes,andDavidSeidl,ourdiligentandknowledgeabletechnicaleditors,providedvaluableinsightaswebroughtthiseditiontopressIdalsoliketothankthemanypeoplewhoparticipatedintheproductionofthisbookbutwhomIneverhadthechancetomeet:thegraphicsteam,theproductionstaff,andallofthoseinvolvedinbringingthisbooktopress-MikeChappleThankstoMikeChappleandDarrilGibsonforcontinuingtocontributetothisprojectThanksalsotoallmycisspcoursestudentswhohaveprovidedtheirinsightandinputtoimprovemytrainingcoursewareandultimatelythistome.Tomyadoringwife,CathyBuildingalifeandafamilytogetherhasbeenmorewonderfulthanIcouldhaveeverimagined.ToSlaydeandremi:youaregrowingupsofastandlearningatanoutstandingpace,andyoucontinuetodelightandimpressmedaily.YouarebothgrowingintoamazingindividualsTomymom,Johnnie:ItiswonderfultohaveyouclosebyToMarkNomatterhowmuchtimehaspassedorhowlittleweseeeachother,Ihavebeenandalwayswillbeyourfriend.andfinally,asalways,toElvis:Youwerewayaheadofthecurrentbaconobsessionwithyourpeanutbutter/banana/baconsandwich;ithinkthat'sproofyoutraveledthroughtimeJamesmichaelStewartThankstoJimMinatelandCaroleJelenforhelpinggetthisupdateinplacebefore(IsC)2releasedtheobjectives.Thishelpedusgetaheadstartonthisnewedition,andweappreciateyourefforts.It'sbeenapleasureworkingwithtalentedpeoplelikeJamesMichaelStewartandMikeChappleThankstobothofyouforallyourworkandcollaborativeeffortsonthisproject.Thetechnicaleditors,JeffParkerBobSipes,andDavidSeidl,provideduswithsomeoutstandingfeedback,andthisbookisbetterbecauseoftheireffortsThankstotheteamatSybex(includingprojectmanagers,editors,andgraphicsartists)foralltheworkyoudidhelpingusgetthisbooktoprint.Last,thankstomywife,Nimfa,forputtingupwithmyoddhoursasIworkedonthisbookDarrilgibsonAbouttheauthorsMikeChapple,CISSP,PhD,Security+,CISA,CySA+,isanassociateteachingprofessorofIT,analytics,andoperationsattheUniversityofNotreDame.InthepasthewaschiefinformationofficerofBrandInstituteandaninformationsecurityresearcherwiththenationalSecurityagencyandtheu.s.airForcehisprimaryareasofexpertiseincludenetworkintrusiondetectionandaccesscontrols.mikeisafrequentcontributortoTechTarget'sSearchSecuritysiteandtheauthorofmorethan25booksincludingthecompanionbooktothisstudyguide:CISSPOfficial(ISC)2PracticeTests,theCompTIACSA+StudyGuide,andCyberwarfare:InformationOperationsinaConnectedWorld.MikeoffersstudygroupsfortheCISSP,SSCP,Security+,andcSa+certificationsonhiswebsiteatwww.certmike.comJamesMichaelStewart,CISSP,CEH,ECSA,CHFI,Security+Network+,hasbeenwritingandtrainingformorethan20years,withacurrentfocusonsecurity.hehasbeenteachingCiSsPtrainingcoursessince2002,nottomentionothercoursesonInternetsecurityandethicalhacking/penetrationtestingHeistheauthorofandcontributortomorethan75booksandnumerouscoursewaresetsonsecuritycertification,Microsofttopics,andnetworkadministrationincludingtheSecurity+(SY0-501)Reviewguide.Moreinformationaboutmichaelcanbefoundathiswebsiteatwww.impactonline.comDarrilGibson,CISSP,Security+,CASP,istheCeoofYODa(shortforYouCanDoAnything),andhehasauthoredorcoauthoredmorethan40books.Darrilregularlywrites,consults,andteachesonawidevarietyoftechnicalandsecuritytopicsandholdsseveralcertificationsHeregularlypostsblogarticlesathttp://blogs.getcertifiedgetahead.com/aboutcertificationtopicsandusesthatsitetohelppeoplestayabreastofchangesincertificationexams.Heloveshearingfromreaders,especiallywhentheypassanexamafterusingoneofhisbooks,andyoucancontacthimthroughthelebloggingsite.
2023/2/8 11:30:06 18.38MB cissp 官方英文版
1
在LINUX上,要把Systemback产生的sblive转换为iso,需求使用这个。
下载后:sudomakesudomakeinstall/opt/schily/bin/mkisofs-iso-level3-r-Vsblive-cache-inodes-J-l-bisolinux/isolinux.bin-no-emul-boot-boot-load-size4-boot-info-table-cisolinux/boot.cat-osblive.isosblive
2018/9/9 19:02:53 2.6MB cdrtools LINUX
1
wordpress的一款SEO优化插件,AllinOneSEOPack1.6.12.2发布当前,在wp中文论坛看到有朋友跟进了简体中文汉化包,于是分享给大家。
插件截图:汉化包使用方法:上传到解压后上传.mo文件到wp-content/plugins/AllinOneSEOPack/目录下即可!更新说明(Somefeatures):SupportforCustomPostTypesAdvancedCanonicalURLsFinetunePageNavigationalLinksBuilt-inAPIsootherplugins/themescanaccessandextendfunctionalityONLYplugintoprovideSEOIntegrationforWPe-CommercesitesNonceSecuritySupportforCMS-styleWordPressinstallationsAutomaticallyoptimizesyourtitlesforsearchenginesGeneratesMETAtagsautomaticallyAvoidsthetypicalduplicatecontentfoundonWordPressblogsForbeginners,youdon'tevenhavetolookattheoptions,itworksout-of-the-box.Justinstall.Foradvancedusers,youcanfine-tuneeverythingYoucanoverrideanytitleandsetanyMETAdescriptionandanyMETAkeywordsyouwant.Backward-Compatibilitywithmanyotherplugins,likeAutoMeta,UltimateTagWarriorandothers.
2015/8/5 20:03:10 191KB 模板插件-博客插件
1
1.Other.swift中配置相应的参数和图片保存途径2.OSSUploadManager().uploadImage(image:UIImage,type:EnumPicType,success:@escapingOSSUploadBlock)上传单张图片3.OSSUploadManager().uploadImagesArr(imageArr:Array,type:EnumPicType,success:@escapingOSSUploadImagesBlock)上传多张图片
2016/10/24 7:48:53 4KB swift OSS iOS
1
下面说明刷机的方法:1、下载刷机包解压缩后运行USBDriver目录下面的pc_usb_driver_update.bat2、在关机状态下,按住“左功能键+音量上键”后再长按电源键开机,进入USB连接模式后插入数据线连接电脑,电脑会自动安装所需要的驱动程序,如果在复制完成时没有响应的话要拨出数据线后取下手机电池重新用组合键激活端口后再插入数据线。
大家可以到电脑的设备管理中看看相应的端口能否出现,没有出现的话要重做这些步骤直到出现手机端口。
3、运行刷机包中的绿色图标(USBLoader2.3.exe),在AP连接标签中看虚拟端口能否和你的设备管理器的一致,否则不能进入下一步。
4、点击浏览选择刷机包中的Flash.bin文件,然后点击下载会弹出DOS窗口且窗口中的进度条应该一点一点地增加,同时手机会进入下载文件的界面出现下载进度条。
整个过程仅两三分钟就可以完成,当电脑中的DOS窗口关闭时手机上面也会显示完成信息,这时拨出数据线和电池再装入电池就可以开机使用精简系统的了
2020/2/23 22:24:54 26.29MB 天语W366
1
Eachchapterofthehandbookislargelyself-containedandcanbereadinisolation,providedthereaderisgenerallyfamiliarwiththearea.Crossreferencesamongthechapterscapturetheimportantinterrelationshipsintheinformationpresentedintheindividualchapters.Chapter1alsoincludesabroadoverviewofdigitalcolorimagingsystemswithreferencesto,andconnectionsbetween,thematerialintheotherchapters,whichmaynotbedirectlyapparent.Thisisintendedtofacilitatetheunderstandingofdigitalcolorimagingfromasystemsperspective,whichisbecomingincreasinglyimportantintoday’sopen,interconnectedworld.Additionalmaterialrelatedtothebookwillbemadeavailableonthepublisher’swebsitewww.crcpress.com.Inparticular,duetoconcernsofincreasedcostandthelimitationsofcoloraccuracyintheprintingprocess,anumberofimagesthatwereoriginallyincolorhavebeenincludedonlyasblack-and-whitefiguresinthebook;full-colorelectronicversionsofthesefiguresareavailableonline.
2016/1/11 8:45:11 13.88MB Digital Color Imaging
1
共 48 条记录 首页 上一页 下一页 尾页
在日常工作中,钉钉打卡成了我生活中不可或缺的一部分。然而,有时候这个看似简单的任务却给我带来了不少烦恼。 每天早晚,我总是得牢记打开钉钉应用,点击"工作台",再找到"考勤打卡"进行签到。有时候因为工作忙碌,会忘记打卡,导致考勤异常,影响当月的工作评价。而且,由于我使用的是苹果手机,有时候系统更新后,钉钉的某些功能会出现异常,使得打卡变得更加麻烦。 另外,我的家人使用的是安卓手机,他们也经常抱怨钉钉打卡的繁琐。尤其是对于那些不太熟悉手机操作的长辈来说,每次打卡都是一次挑战。他们总是担心自己会操作失误,导致打卡失败。 为了解决这些烦恼,我开始思考是否可以通过编写一个全自动化脚本来实现钉钉打卡。经过一段时间的摸索和学习,我终于成功编写出了一个适用于苹果和安卓系统的钉钉打卡脚本。
2024-04-09 15:03 15KB 钉钉 钉钉打卡