ROSTCM是专为即将毕业的用户推出的一款专业论文查重软件,可以方便用户查看自己的论文是否被剽窃了,或者论文的重复率,拥有全网分析、浏览分析、微博分析,情感分析等特色。
下载解压即可使用!
2025/2/19 8:26:36 10.47MB rost cm6
1
大数据组件,官方版本:CDH5.9.0操作系统:CentOS7/RHEL7完整系列:CDH-5.9.0-1.cdh5.9.0.p0.23-el7.parcel(该文件被分割成三个压缩包,例如:.aa/.ab.ac)CDH-5.9.0-1.cdh5.9.0.p0.23-el7.parcel.sha由于CSDN资源文件大小的限制,分割成三个压缩文件了,下载后合并解压即可
2025/2/18 14:41:07 500MB CDH5.9.0 CDH 大数据
1
这是基于J2ME平台的java休闲游戏源码。
下载解压后直接编译运行。
2025/2/15 9:08:57 733KB 接礼物 java
1
qt闹钟alarm.zip源码等解压后在qt软件中打开即可看到其功能望大家恩能够有所帮助
2025/2/15 9:44:45 16KB 基于qt
1
基于(ISC)2CISSPCommonBodyofKnowledge,可以辅助allinone加深对8个域知识点了解,最新的知识点已经在2018年4月15日CISSP考试中广泛体现。
本学习指南重点突出知识点概念并伴有相应测试题,结合allinone8后面测试题、光盘题和《CISSPOfficial(ISC)2PracticeTests2018年第二版》英文版&官方练习题及解题详解(1300题左右),备考题库已足够了解所有知识点本书含21章节,各域对应的章节如下:1-4章对应Domain1SecurityandRiskMgmt第5章对应Domain2Assetsecurity资产安全第6,7,8,9,10章对应Domain3安全架构与工程第11,12章,通讯与网络安全第13,14章,身份与访问管理IAM第15章对应域安全评估与测试第16,17,18,19章对应域7安全运维第20,21章软件开发安全DevelopmentEditor:KellyTalbotTechnicalEditors:JeffParker,BobSipes,andDavidSeidlCopyEditor:KimWimpsettEditorialManager:PeteGaughanProductionManager:KathleenwisorExecutiveeditor:imminatelProofreader:AmyschneiderIndexer:JohnnaVanHoosedinseProjectCoordinator,Cover:brentSavageCoverDesigner:wileyCoverImage:@JeremyWoodhouse/GettyImages,Inc.CopyrightC2018byJohnWileySons,InC,Indianapolis,IndianaPublishedsimultaneouslyinCanadaISBN:978-1-119-47593-4ISBN:978-1-119-47595-8(ebk)ISBN:978-1-119-47587-3(ebk)ManufacturedintheUnitedStatesofamericaNopartofthispublicationmaybereproduced,storedinaretrievalsystemortransmittedianyformorbyanymeans,electronic,mechanical,photocopying,recording,scanningorotherwise,exceptaspermittedunderSections107or108ofthe1976UnitedStatesCopyrightAct,withouteitherthepriorwrittenpermissionofthePublisher,orauthorizationthroughpaymentoftheappropriateper-copyfeetotheCopyrightClearanceCenter,222RosewoodDrive,Danvers,MAO1923,(978)750-8400,fax(978)646-8600RequeststothePublisherforpermissionshouldbeaddressedtothepermissionsDepartment,JohnWileysons,Inc.111RiverStreet,Hoboken,NJo7030,(201)748-6011,fax(201)748-6008,oronlineathttp://www.wiley.com/go/permissionsLimitofliability/DisclaimerofWarranty:Thepublisherandtheauthormakenorepresentationsorwarrantieswithrespecttotheaccuracyorcompletenessofthecontentsofthisworkandspecificallydisclaimallwarranties,includingwithoutlimitationwarrantiesoffitnessforaparticularpurpose.Nowarrantymaybecreatedorextendedbysalesorpromotionalmaterials.Theadviceandstrategiescontainedhereinmaynotbesuitableforeverysituation.Thisworkissoldwiththeunderstandingthatthepublisherisnotengagedinrenderinglegal,accounting,orotherprofessionalservices.Ifprofessionalassistanceisrequiredtheservicesofacompetentprofessionalpersonshouldbesought.Neitherthepublishernortheauthorshallbeliablefordamagesarisingherefrom.ThefactthatanorganizationorWebsiteisreferredtointhisworkasacitationand/orapotentialsourceoffurtherinformationdoesnotmeanthattheauthororthepublisherendorsestheinformationtheorganizationorWebsitemayprovideorrecommendationsitmaymakeFurtherreadersshouldbeawarethatInternetWebsiteslistedinthisworkmayhavechangedordisappearedbetweenwhenthisworkwaswrittenandwhenitisreadForgeneralinformationonourotherproductsandservicesortoobtaintechnicalsupportpleasecontactourCustomerCareDepartmentwithintheU.S.at(877)762-2974,outsidetheUS.at(317)5723993orfax(317)572-4002Wileypublishesinavarietyofprintandelectronicformatsandbyprint-on-demand.Somematerialincludedwithstandardprintversionsofthisbookmaynotbeincludedine-booksorinprint-On-demand.IfthisbookreferstomediasuchasaCDorDVdthatisnotincludedintheversionyoupurchasedyoumaydownloadthismaterialathttp://booksupport.wilev.comFormoreinformationaboutwileyproductsvisitwww.wiley.comLibraryofCongressControlNumber:2018933561TRADEMARKS:Wiley,theWileylogo,andtheSybexlogoaretrademarksorregisteredtrademarksofJohnWileySons,Incand/oritsaffiliates,intheUnitedStatesandothercountries,andmaynotbeusedwithoutwrittenpermission.CISSPisaregisteredtrademarkof(ISC)2,Inc.AllothertrademarksarethepropertyoftheirrespectiveownersJohnWileySons,Incisnotassociatedwithanyproductorvendormentionedinthisbook.ToDewittLatimer,mymentor,friend,andcolleague.Imissyoudearly.MikeChappleToCathy,yourperspectiveontheworldandlifeoftensurprisesme,challengesme,andmakesmeloveyouevenmoreJamesmichaelstewartToNimfa,thanksforsharingyourlifewithmeforthepast26yearsandlettingmeshareminewithyouDarrilgibsonDearFuture(ISC)2MemberCongratulationsonstartingyourjourneytoCISSPRcertificationEarningyourCISSPisanexcitingandrewardingmilestoneinyourcybersecuritycareer.Notonlydoesitdemonstrateyourabilitytodevelopandmanagenearlyallaspectsofanorganizationscybersecurityoperations,butyoualsosignaltoemployersyourcommitmenttolife-longlearningandtakinganactiveroleinfulfillingthe(isc)2visionofinspiringasafeandsecurecyberworldThematerialinthisstudyguideisbaseduponthe(isc)2cisspCommonBodyofKnowledge.ItwillhelpyoupreparefortheexamthatwillassessyourcompetencyinthefollowingeightdomainsaSecurityandriskmanagement■AssetsecuritySecurityArchitectureandengineeringaCommunicationandNetworksecurityaIdentityandAccessManagement(IAM)SecurityAssessmentandTesting■SecurityOperationsSoftwareDevelopmentSecurityWhilethisstudyguidewillhelpyouprepare,passingthecisspexamdependsonyourmasteryofthedomainscombinedwithyourabilitytoapplythoseconceptsusingyourreal-worldexperienceiwishyouthebestofluckasyoucontinueonyourpathtobecomeaCISSPandcertifiedmemberof(Isc)2Sincerely,Davidshearer.CISSPCEO(ISC)2Ackn。
w|edgmentsWe'dliketoexpressourthankstoSybexforcontinuingtosupportthisproject.Extrathankstotheeightheditiondevelopmentaleditor,kellyTalbot,andtechnicaleditors,JeffParker,BobSipes,andDavidSeidlwhoperformedamazingfeatsinguidingustoimprovethisbookThanksaswelltoouragent,CaroleJelen,forcontinuingtoassistinnailingdowntheseprojectsMikejames.anddarrilSpecialthanksgototheinformationsecurityteamattheUniversityofNotreDame,whoprovidedhoursofinterestingconversationanddebateonsecurityissuesthatinspiredandinformedmuchofthematerialinthisbookIwouldliketothanktheteamatwileywhoprovidedinvaluableassistancethroughoutthebookdevelopmentprocess.ialsooweadebtofgratitudetomyliteraryagent,CaroleJelenofWatersideProductions.Mycoauthors,JamesMichaelStewartanddarrilGibsonweregreatcollaborators.JeffParker,BobSipes,andDavidSeidl,ourdiligentandknowledgeabletechnicaleditors,providedvaluableinsightaswebroughtthiseditiontopressIdalsoliketothankthemanypeoplewhoparticipatedintheproductionofthisbookbutwhomIneverhadthechancetomeet:thegraphicsteam,theproductionstaff,andallofthoseinvolvedinbringingthisbooktopress-MikeChappleThankstoMikeChappleandDarrilGibsonforcontinuingtocontributetothisprojectThanksalsotoallmycisspcoursestudentswhohaveprovidedtheirinsightandinputtoimprovemytrainingcoursewareandultimatelythistome.Tomyadoringwife,CathyBuildingalifeandafamilytogetherhasbeenmorewonderfulthanIcouldhaveeverimagined.ToSlaydeandremi:youaregrowingupsofastandlearningatanoutstandingpace,andyoucontinuetodelightandimpressmedaily.YouarebothgrowingintoamazingindividualsTomymom,Johnnie:ItiswonderfultohaveyouclosebyToMarkNomatterhowmuchtimehaspassedorhowlittleweseeeachother,Ihavebeenandalwayswillbeyourfriend.andfinally,asalways,toElvis:Youwerewayaheadofthecurrentbaconobsessionwithyourpeanutbutter/banana/baconsandwich;ithinkthat'sproofyoutraveledthroughtimeJamesmichaelStewartThankstoJimMinatelandCaroleJelenforhelpinggetthisupdateinplacebefore(IsC)2releasedtheobjectives.Thishelpedusgetaheadstartonthisnewedition,andweappreciateyourefforts.It'sbeenapleasureworkingwithtalentedpeoplelikeJamesMichaelStewartandMikeChappleThankstobothofyouforallyourworkandcollaborativeeffortsonthisproject.Thetechnicaleditors,JeffParkerBobSipes,andDavidSeidl,provideduswithsomeoutstandingfeedback,andthisbookisbetterbecauseoftheireffortsThankstotheteamatSybex(includingprojectmanagers,editors,andgraphicsartists)foralltheworkyoudidhelpingusgetthisbooktoprint.Last,thankstomywife,Nimfa,forputtingupwithmyoddhoursasIworkedonthisbookDarrilgibsonAbouttheauthorsMikeChapple,CISSP,PhD,Security+,CISA,CySA+,isanassociateteachingprofessorofIT,analytics,andoperationsattheUniversityofNotreDame.InthepasthewaschiefinformationofficerofBrandInstituteandaninformationsecurityresearcherwiththenationalSecurityagencyandtheu.s.airForcehisprimaryareasofexpertiseincludenetworkintrusiondetectionandaccesscontrols.mikeisafrequentcontributortoTechTarget'sSearchSecuritysiteandtheauthorofmorethan25booksincludingthecompanionbooktothisstudyguide:CISSPOfficial(ISC)2PracticeTests,theCompTIACSA+StudyGuide,andCyberwarfare:InformationOperationsinaConnectedWorld.MikeoffersstudygroupsfortheCISSP,SSCP,Security+,andcSa+certificationsonhiswebsiteatwww.certmike.comJamesMichaelStewart,CISSP,CEH,ECSA,CHFI,Security+Network+,hasbeenwritingandtrainingformorethan20years,withacurrentfocusonsecurity.hehasbeenteachingCiSsPtrainingcoursessince2002,nottomentionothercoursesonInternetsecurityandethicalhacking/penetrationtestingHeistheauthorofandcontributortomorethan75booksandnumerouscoursewaresetsonsecuritycertification,Microsofttopics,andnetworkadministrationincludingtheSecurity+(SY0-501)Reviewguide.Moreinformationaboutmichaelcanbefoundathiswebsiteatwww.impactonline.comDarrilGibson,CISSP,Security+,CASP,istheCeoofYODa(shortforYouCanDoAnything),andhehasauthoredorcoauthoredmorethan40books.Darrilregularlywrites,consults,andteachesonawidevarietyoftechnicalandsecuritytopicsandholdsseveralcertificationsHeregularlypostsblogarticlesathttp://blogs.getcertifiedgetahead.com/aboutcertificationtopicsandusesthatsitetohelppeoplestayabreastofchangesincertificationexams.Heloveshearingfromreaders,especiallywhentheypassanexamafterusingoneofhisbooks,andyoucancontacthimthroughthelebloggingsite.
2025/2/15 1:12:56 17.84MB CISSP OSG OSG8 Official
1
1.首先,要获得Win10WindowsApps文件夹访问权限的具体操作方法如下:步骤:第一步:设置显示隐藏文件夹,打开C:\ProgramFiles文件夹,右击WindowsApps文件夹,选择“属性”,在安全里面选择“高级”第二步:更改所有者,为Everyone,确定。
第三步:最后会出现“Windows安全”窗口,等待系统设置好安全信息就可以了。
2.查:通过系统内置的WindowsPowerShellI命令,尝试解决Win10应用商店消失的问题。
一、在开始菜单,右键打开WindowsPowerShell(管理员),在WindowsPowerShell(管理员)页面,输入以下命令,获取您电脑所安装的Windows10内置程序的版本:Get-AppxPackage-allusers检查是否有附件中安装包,没有的话,下载附件,解压到WindowsApps文件夹:Name:Microsoft.WindowsStorePublisher:CN=MicrosoftCorporation,O=MicrosoftCorporation,L=Redmond,S=Washington,C=USArchitecture:X64ResourceId:Version:11811.1001.27.0PackageFullName:Microsoft.WindowsStore_11811.1001.27.0_x64__8wekyb3d8bbweInstallLocation:C:\ProgramFiles\WindowsApps\Microsoft.WindowsStore_11811.1001.27.0_x64__8wekyb3d8bbweIsFramework:FalsePackageFamilyName:Microsoft.WindowsStore_8wekyb3d8bbwePublisherId:8wekyb3d8bbwePackageUserInformation:{S-1-5-21-457848557-3406337263-1732915882-1001[ZunPC]:Installed}IsResourcePackage:FalseIsBundle:FalseIsDevelopmentMode:FalseNonRemovable:FalseDependencies:{Microsoft.NET.Native.Framework.1.7_1.7.27413.0_x64__8wekyb3d8bbwe,Microsoft.NET.Native.Runtime.1.7_1.7.25531.0_x64__8wekyb3d8bbwe,Microsoft.VCLibs.140.00_14.0.27323.0_x64__8wekyb3d8bbwe,Microsoft.WindowsStore_11811.1001.27.0_neutral_split.scale-100_8wekyb3d8bbwe...}IsPartiallyStaged:FalseSignatureKind:StoreStatus:Ok3.安装依存的运行库Microsoft.NET.Native.Framework.1.7和Microsoft.VCLibs.140.00_14.0.27323.0_x64:在WindowsPowerShell(管理员)页面,输入以下命令,安装:Add-appxpackage-register"C:\ProgramFiles\WindowsApps\Microsoft.NET.Native.Framework.1.7_1.7.27413.0_x64__8wekyb3d8bbwe\appxmanifest.xml"-disabledevelopmentmode(黄色标识的部分,为第二部分中复制的内容)Add-ap
2025/2/14 4:33:43 20.35MB Win10 应用商店安装
1
STM32是一款基于ARMCortex-M内核的微控制器,广泛应用于嵌入式系统设计中,尤其是在传感器接口和控制领域。
FXAS21002是一款高性能的数字陀螺仪,适用于各种动态应用,如航姿参考系统、运动检测以及游戏控制等。
在使用FXAS21002与STM32进行通信时,由于某些情况下硬件I2C接口可能不适用或已满载,开发者会选择使用软件模拟I2C(也称为bit-banging)来实现通信。
I2C(Inter-IntegratedCircuit)是一种多主控、双向二线制总线协议,用于连接微控制器和其他设备,如传感器、存储器等。
在模拟I2C中,STM32通过GPIO引脚来模拟SCL(时钟)和SDA(数据)信号,从而实现与FXAS21002的通信。
STM32的模拟I2C实现需要编写特定的中断服务程序和状态机,以确保正确地生成I2C时序。
这包括起始条件、停止条件、数据传输和应答/非应答信号的生成。
为了与FXAS21002进行有效通信,你需要设置STM32的GPIO引脚为推挽输出模式,并在适当的时机切换它们的状态以模拟I2C信号。
FXAS21002陀螺仪提供了多种工作模式,包括单轴、双轴和三轴测量,以及不同的数据速率和电源管理模式。
在配置陀螺仪之前,需要通过I2C发送特定的寄存器地址和配置字节。
例如,可以设置陀螺仪的测量范围、低通滤波器配置、数据输出速率等。
在测试程序中,通常会包含初始化序列,用于配置STM32的GPIO和定时器(用于生成I2C时钟),然后是读写FXAS21002寄存器的函数。
读取陀螺仪的数据后,可以通过ADC转换将模拟信号转化为数字值,再进行相应的计算,如角度速度解算。
FXAS21002陀螺仪的数据手册(如PDF文档"FXAS21002【陀螺仪】.pdf")会提供详细的寄存器映射、命令集和操作指南。
开发者需要熟悉这些信息,以便正确地配置和读取陀螺仪数据。
在实际应用中,可能还需要考虑噪声处理、温度补偿、校准算法等高级话题,以提高测量精度和稳定性。
总的来说,STM32模拟I2C与FXAS21002陀螺仪的交互是一个涉及硬件接口、通信协议和传感器数据处理的综合过程。
通过深入理解I2C协议、FXAS21002的特性以及STM32的GPIO和定时器功能,开发者可以构建出可靠且高效的陀螺仪测试程序。
2025/2/14 2:44:28 3.81MB
1
>测试环境Eclipse+Maven+Hadoop2.9.0.将文件解压到hadoop的bin目录下2:将hadoop.dll复制到C:\Window\System32下3:添加环境变量HADOOP_HOME,指向hadoop目录4:将%HADOOP_HOME%\bin加入到path里面5:重启myeclipse或者eclipse。
2025/2/14 1:37:54 766KB 2.9.0 Hadoop
1
根据船舶、桨、舵等建立船舶MMG数学模型,使用龙格库塔方法解算微分方程,求得纵向速度v、横向速度u、船首向转速r、计算旋回性能,代码是自己整理与编辑,希望帮助到有需要的人,目前我在做船舶运动仿真。
也欢迎一起交流讨论(软件版本2020a,所以低版本注释看起来会是乱码,但不影响运行)。
1
计算机二级2019.03模拟软件(无忧考吧),已经实验MSCVB,理论上支持所有科目。
使用说明:1.先到无忧考吧官网下载对应题库http://ncre.wyk8.com/Category_25/Index.aspx,2.安装后将本补丁解压放在安装目录下,覆盖原文件。
3.再次打开,软件就可无限期使用!
2025/2/13 18:12:34 69KB 计算机二级 二级MS 二级VB 二级C
1
共 1000 条记录 首页 上一页 下一页 尾页
在日常工作中,钉钉打卡成了我生活中不可或缺的一部分。然而,有时候这个看似简单的任务却给我带来了不少烦恼。 每天早晚,我总是得牢记打开钉钉应用,点击"工作台",再找到"考勤打卡"进行签到。有时候因为工作忙碌,会忘记打卡,导致考勤异常,影响当月的工作评价。而且,由于我使用的是苹果手机,有时候系统更新后,钉钉的某些功能会出现异常,使得打卡变得更加麻烦。 另外,我的家人使用的是安卓手机,他们也经常抱怨钉钉打卡的繁琐。尤其是对于那些不太熟悉手机操作的长辈来说,每次打卡都是一次挑战。他们总是担心自己会操作失误,导致打卡失败。 为了解决这些烦恼,我开始思考是否可以通过编写一个全自动化脚本来实现钉钉打卡。经过一段时间的摸索和学习,我终于成功编写出了一个适用于苹果和安卓系统的钉钉打卡脚本。
2024-04-09 15:03 15KB 钉钉 钉钉打卡