VS2017下编译openssl-1.1.1g的debug/release版本,以及相关的工具:dmake、ActivePerl-5.26.0.2600-MSWin32-x86-64int-403866.exe、nasm-2.13.01-installer-x64.exe、openssl-1.1.1d.tar.gz
1
ReviewFromthereviews:"Thebookisdevotedtopublickeycryptography,whoseprincipalgoalistoallowtwoormorepeopletoexchangeconfidentialinformation….Thematerialisverywellorganized,anditisself-contained:noprerequisitesinhighermathematicsareneeded.Infact,everythingisexplainedandcarefullycovered….thereisabundanceofexamplesandproposedexercisesattheendofeachchapter.…Thisbookisidealasatextbookforacourseaimedatundergraduatemathematicsorcomputersciencestudents."(FabioMainardi,TheMathematicalAssociationofAmerica,October,2008)"Thisbookfocusesonpublickeycryptography….Hoffstein,Pipher,andSilverman…provideathoroughtreatmentofthetopicswhilekeepingthematerialaccessible.…Thebookusesexamplesthroughoutthetexttoillustratethetheorems,andprovidesalargenumberofexercises….Thevolumeincludesanicebibliography.…SummingUp:Highlyrecommended.Upper-divisionundergraduatethroughprofessionalcollections."(C.Bauer,Choice,Vol.46(7),March,2009)"Formostundergraduatestudentsinmathematicsorcomputerscience(CS),mathematicalcryptographyisachallengingsubject.…itiswritteninawaythatmakesyouwanttokeepreading.…Theauthorsofficiallytargetedthebookforadvancedundergraduateorbeginninggraduatestudents.Ibelievethatthisaudienceisappropriate.…itcouldevenbeusedwithstudentswhoarejustlearninghowtoexecuterigorousmathematicalproofs.…Istronglybelievethatitfindstherighttonefortoday’sstudents…."(BurkhardEnglert,ACMComputingReviews,March,2009)"Theexercisesandtextwouldmakeanexcellentcourseforundergraduateindependentstudy.…Thisisanexcellentbook.Hoffstein,PipherandSilvermanhavewrittenasgoodabookasispossibletoexplainpublickeycryptography.…Thisbookwouldprobablybebestsuitedforagraduatecoursethatfocusedonpublickeycryptography,forunder
2024/5/2 18:28:21 7.38MB 密码学
1
直接拷贝到perl的安装路径,直接替换C:\Perl64\site文件夹即可
2024/4/26 11:44:37 319KB perl dmake
1
IstartedthisbookwiththeintentionofbringinganewsideofSugarCRMtolight.SinceIbeganworkingatSugarCRM,Isawtheflexibilityandextensibilitythattheapplicationcouldprovide.Ilookedbackonmypreviouspositiondevelopinginternalbusinessapplications,andsawthatmanyofthefeaturesIaddedanddesignissuesIwouldwrestlewithwereproblemsthatSugarCRMhadalreadysolved.TheengineeringteamatSugarCRMhadbuilttheapplicationtosolvethisproblem,yetfewdevelopersoutsideofSugarCRMreallyknewhowpowerfultheunderlyingplatformwas.Iknewtherewereotherdevelopersinthissameboat,andthatifIcouldreachthemitwouldmaketheirjobsmucheasier.WhataCRMapplicationdoesordoesn’tdoisn’tauthoritativelydefined;instead,itsgoalistofillinthegapwhereacompanyneedstosolveproblemsintheirrelationshipswiththeircustomers.Sometimesthismeanskeepingtrackofmeetingsandphonecalls.Othertimes,thismeanstrackingtheprogressofanongoingproject.Itcouldalsomeanmanagingsupportcasesandproductdefects.Yetsometimesanapplicationmaynotcompletelycoverthis.Justaseverybusinessororganizationisunique,somustbewhatCRMwillmeantothem.UpuntilSugarCRM,thisapplicationspacewasfullofplayerswhothoughttheyhadtheCRMproblemsolved,andbuiltlargeproprietaryapplicationsthatwereexpensivetoimplementandsupportandnotoriouslydifficulttocustomizetomeettheirneeds.SugarCRMcameinandchangedthatscene,makingCRMsomethingthatisinexpensivetoimplement,easiertocustomize,andmoreapproachableforend-userstoworkwith.It’sdesignedtobeaCRMthatyouruserswon’thate,whichisthephilosophythatthefoundersofSugarCRMsetastheirparamountgoalwhenbuildingit.
2023/10/30 2:42:45 5.64MB CRM Sugar
1
Overthepastfewdecades,mathematicalmodelshavebecomeanincreasinglyimportanttoolforEarthscientiststounderstandandmakepredictionsabouthowourplanetfunctionsandevolvesthroughtimeandspace.Thesemodelsoftenconsistofpartialdifferentialequations(PDEs)thatarediscretizedwithanumericalmethodandsolvedonacomputer.Themostcommonlyuseddiscretizationmethodsarethefinitedifferencemethod(FDM),thefinitevolumemethod,thefiniteelementmethod(FEM),thediscreteelementmethod,theboundaryelementmethod,andvariousspectralmethods.
2023/8/7 17:32:55 4.88MB matlab 有限元建模
1
BeginningCryptographywithJavaWhilecryptographycanstillbeacontroversialtopicintheprogrammingcommunity,JavahasweatheredthatstormandprovidesarichsetofAPIsthatallowyou,thedeveloper,toeffectivelyincludecryptographyinapplications-ifyouknowhow.Thisbookteachesyouhow.ChaptersonethroughfivecoverthearchitectureoftheJCEandJCA,symmetricandasymmetrickeyencryptioninJava,messageauthenticationcodes,andhowtocreateJavaimplementationswiththeAPIprovidedbytheBouncyCastleASN.1packages,allwithplentyofexamples.Buildingonthatfoundation,thesecondhalfofthebooktakesyouintohigher-leveltopics,enablingyoutocreateandimplementsecureJavaapplicationsandmakeuseofstandardprotocolssuchasCMS,SSL,andS/MIME.WhatyouwilllearnfromthisbookHowtounderstandanduseJCE,JCA,andtheJSSEforencryptionandauthenticationThewaysinwhichpaddingmechanismsworkinciphersandhowtospotandfixtypicalerrorsAnunderstandingofhowauthenticationmechanismsareimplementedinJavaandwhytheyareusedMethodsfordescribingcryptographicobjectswithASN.1HowtocreatecertificaterevocationlistsandusetheOnlineCertificateStatusProtocol(OCSP)Real-worldWebsolutionsusingBouncyCastleAPIsWhothisbookisforThisbookisforJavadeveloperswhowanttousecryptographyintheirapplicationsortounderstandhowcryptographyisbeingusedinJavaapplications.KnowledgeoftheJavalanguageisnecessary,butyouneednotbefamiliarwithanyoftheAPIsdiscussed.WroxBeginningguidesarecraftedtomakelearningprogramminglanguagesandtechnologieseasierthanyouthink,providingastructured,tutorialformatthatwillguideyouthroughallthetechniquesinvolved.
2023/6/4 0:26:49 3.19MB Java Cryptography DavidHook 源码
1
KeyFeaturesLearnhowtouseYii2efficientlythroughclearexamplesandcorefeatures,andseehowtousetests,createreusablecodesnippets,corewidgets,deployment,andmoreThisbookprovidesyouwithawidespaceforpracticeapproachesandhelpsyoutolearnaboutthenewYii2framework.UnderstandthedifferencebetweentheYii1.x.xversionsusingusefulexamplesfromrealwebapplicationsBookDescriptionYiiisafree,opensourcewebapplicationdevelopmentframeworkwritteninPHP5thatpromotescleanDRYdesignandencouragesrapiddevelopment.Itworkstostreamlineyourapplicationdevelopmenttimeandhelpstoensureanextremelyefficient,extensible,andmaintainableendproduct.Beingextremelyperformanceoptimized,Yiiisaperfectchoiceforanysizeproject.However,ithasbeenbuiltwithsophisticated,enterpriseapplicationsinmind.Youhavefullcontrolovertheconfigurationfromhead-to-toe(presentation-to-persistence)toconformtoyourenterprisedevelopmentguidelines.Itcomespackagedwithtoolstohelptestanddebugyourapplication,andhasclearandcomprehensivedocumentation.ThisbookisacollectionofYii2recipes.Eachrecipeisrepresentedasafullandindependentitem,whichshowcasessolutionsfromrealweb-applications.SoyoucaneasilyreproducetheminyourenvironmentandlearnYii2fastandwithouttears.Allrecipesareexplainedwithstep-by-stepcodeexamplesandclearscreenshots.Yii2islikeasuitthatlooksgreatofftherack,butisalsoveryeasytotailortofityourneeds.Virtuallyeverycomponentoftheframeworkisextensible.Thisbookwillshowhowtouseofficialextensions,extendanycomponent,orwriteanewone.Thisbookwillhelpyoucreatemodernwebapplicationsquickly,andmakesuretheyperformwellusingexamplesandbusinesslogicfromreallife.YouwilldealwiththeYiico妹妹andline,migrations,andassets.Youwilllearnaboutrole-basedaccess,security,anddeployment
2023/3/24 10:41:43 8.22MB Yii Application Development
1
批量制造学生证、工作证等的软件,方便好用
2023/2/18 15:42:40 11.42MB 批量制作学生证
1
Xara3DMaker7激活工具注册机MAGIXXara3DMakerKeygenXara3DMaker7百毒一大把但是序列号貌似没用用这个注册激活工具可以搞定EMail恣意
2023/2/16 2:04:35 5.26MB Xara 3D Maker Keygen
1
cissp官方进修指南第八版(英文),改版后2018最新进修指南。
不用看cbk那么费劲,就看这个版本九百多页,八个知识域全覆盖,还省事。
DevelopmentEditor:KellyTalbotTechnicalEditors:JeffParker,BobSipes,andDavidSeidlCopyEditor:KimWimpsettEditorialManager:PeteGaughanProductionManager:KathleenwisorExecutiveeditor:imminatelProofreader:AmyschneiderIndexer:JohnnaVanHoosedinseProjectCoordinator,Cover:brentSavageCoverDesigner:wileyCoverImage:@JeremyWoodhouse/GettyImages,Inc.CopyrightC2018byJohnWileySons,InC,Indianapolis,IndianaPublishedsimultaneouslyinCanadaISBN:978-1-119-47593-4ISBN:978-1-119-47595-8(ebk)ISBN:978-1-119-47587-3(ebk)ManufacturedintheUnitedStatesofamericaNopartofthispublicationmaybereproduced,storedinaretrievalsystemortransmittedianyformorbyanymeans,electronic,mechanical,photocopying,recording,scanningorotherwise,exceptaspermittedunderSections107or108ofthe1976UnitedStatesCopyrightAct,withouteitherthepriorwrittenpermissionofthePublisher,orauthorizationthroughpaymentoftheappropriateper-copyfeetotheCopyrightClearanceCenter,222RosewoodDrive,Danvers,MAO1923,(978)750-8400,fax(978)646-8600RequeststothePublisherforpermissionshouldbeaddressedtothepermissionsDepartment,JohnWileysons,Inc.111RiverStreet,Hoboken,NJo7030,(201)748-6011,fax(201)748-6008,oronlineathttp://www.wiley.com/go/permissionsLimitofliability/DisclaimerofWarranty:Thepublisherandtheauthormakenorepresentationsorwarrantieswithrespecttotheaccuracyorcompletenessofthecontentsofthisworkandspecificallydisclaimallwarranties,includingwithoutlimitationwarrantiesoffitnessforaparticularpurpose.Nowarrantymaybecreatedorextendedbysalesorpromotionalmaterials.Theadviceandstrategiescontainedhereinmaynotbesuitableforeverysituation.Thisworkissoldwiththeunderstandingthatthepublisherisnotengagedinrenderinglegal,accounting,orotherprofessionalservices.Ifprofessionalassistanceisrequiredtheservicesofacompetentprofessionalpersonshouldbesought.Neitherthepublishernortheauthorshallbeliablefordamagesarisingherefrom.ThefactthatanorganizationorWebsiteisreferredtointhisworkasacitationand/orapotentialsourceoffurtherinformationdoesnotmeanthattheauthororthepublisherendorsestheinformationtheorganizationorWebsitemayprovideorrecommendationsitmaymakeFurtherreadersshouldbeawarethatInternetWebsiteslistedinthisworkmayhavechangedordisappearedbetweenwhenthisworkwaswrittenandwhenitisreadForgeneralinformationonourotherproductsandservicesortoobtaintechnicalsupportpleasecontactourCustomerCareDepartmentwithintheU.S.at(877)762-2974,outsidetheUS.at(317)5723993orfax(317)572-4002Wileypublishesinavarietyofprintandelectronicformatsandbyprint-on-demand.Somematerialincludedwithstandardprintversionsofthisbookmaynotbeincludedine-booksorinprint-On-demand.IfthisbookreferstomediasuchasaCDorDVdthatisnotincludedintheversionyoupurchasedyoumaydownloadthismaterialathttp://booksupport.wilev.comFormoreinformationaboutwileyproductsvisitwww.wiley.comLibraryofCongressControlNumber:2018933561TRADEMARKS:Wiley,theWileylogo,andtheSybexlogoaretrademarksorregisteredtrademarksofJohnWileySons,Incand/oritsaffiliates,intheUnitedStatesandothercountries,andmaynotbeusedwithoutwrittenpermission.CISSPisaregisteredtrademarkof(ISC)2,Inc.AllothertrademarksarethepropertyoftheirrespectiveownersJohnWileySons,Incisnotassociatedwithanyproductorvendormentionedinthisbook.ToDewittLatimer,mymentor,friend,andcolleague.Imissyoudearly.MikeChappleToCathy,yourperspectiveontheworldandlifeoftensurprisesme,challengesme,andmakesmeloveyouevenmoreJamesmichaelstewartToNimfa,thanksforsharingyourlifewithmeforthepast26yearsandlettingmeshareminewithyouDarrilgibsonDearFuture(ISC)2MemberCongratulationsonstartingyourjourneytoCISSPRcertificationEarningyourCISSPisanexcitingandrewardingmilestoneinyourcybersecuritycareer.Notonlydoesitdemonstrateyourabilitytodevelopandmanagenearlyallaspectsofanorganizationscybersecurityoperations,butyoualsosignaltoemployersyourcommitmenttolife-longlearningandtakinganactiveroleinfulfillingthe(isc)2visionofinspiringasafeandsecurecyberworldThematerialinthisstudyguideisbaseduponthe(isc)2cisspCommonBodyofKnowledge.ItwillhelpyoupreparefortheexamthatwillassessyourcompetencyinthefollowingeightdomainsaSecurityandriskmanagement■AssetsecuritySecurityArchitectureandengineeringaCommunicationandNetworksecurityaIdentityandAccessManagement(IAM)SecurityAssessmentandTesting■SecurityOperationsSoftwareDevelopmentSecurityWhilethisstudyguidewillhelpyouprepare,passingthecisspexamdependsonyourmasteryofthedomainscombinedwithyourabilitytoapplythoseconceptsusingyourreal-worldexperienceiwishyouthebestofluckasyoucontinueonyourpathtobecomeaCISSPandcertifiedmemberof(Isc)2Sincerely,Davidshearer.CISSPCEO(ISC)2Ackn。
w|edgmentsWe'dliketoexpressourthankstoSybexforcontinuingtosupportthisproject.Extrathankstotheeightheditiondevelopmentaleditor,kellyTalbot,andtechnicaleditors,JeffParker,BobSipes,andDavidSeidlwhoperformedamazingfeatsinguidingustoimprovethisbookThanksaswelltoouragent,CaroleJelen,forcontinuingtoassistinnailingdowntheseprojectsMikejames.anddarrilSpecialthanksgototheinformationsecurityteamattheUniversityofNotreDame,whoprovidedhoursofinterestingconversationanddebateonsecurityissuesthatinspiredandinformedmuchofthematerialinthisbookIwouldliketothanktheteamatwileywhoprovidedinvaluableassistancethroughoutthebookdevelopmentprocess.ialsooweadebtofgratitudetomyliteraryagent,CaroleJelenofWatersideProductions.Mycoauthors,JamesMichaelStewartanddarrilGibsonweregreatcollaborators.JeffParker,BobSipes,andDavidSeidl,ourdiligentandknowledgeabletechnicaleditors,providedvaluableinsightaswebroughtthiseditiontopressIdalsoliketothankthemanypeoplewhoparticipatedintheproductionofthisbookbutwhomIneverhadthechancetomeet:thegraphicsteam,theproductionstaff,andallofthoseinvolvedinbringingthisbooktopress-MikeChappleThankstoMikeChappleandDarrilGibsonforcontinuingtocontributetothisprojectThanksalsotoallmycisspcoursestudentswhohaveprovidedtheirinsightandinputtoimprovemytrainingcoursewareandultimatelythistome.Tomyadoringwife,CathyBuildingalifeandafamilytogetherhasbeenmorewonderfulthanIcouldhaveeverimagined.ToSlaydeandremi:youaregrowingupsofastandlearningatanoutstandingpace,andyoucontinuetodelightandimpressmedaily.YouarebothgrowingintoamazingindividualsTomymom,Johnnie:ItiswonderfultohaveyouclosebyToMarkNomatterhowmuchtimehaspassedorhowlittleweseeeachother,Ihavebeenandalwayswillbeyourfriend.andfinally,asalways,toElvis:Youwerewayaheadofthecurrentbaconobsessionwithyourpeanutbutter/banana/baconsandwich;ithinkthat'sproofyoutraveledthroughtimeJamesmichaelStewartThankstoJimMinatelandCaroleJelenforhelpinggetthisupdateinplacebefore(IsC)2releasedtheobjectives.Thishelpedusgetaheadstartonthisnewedition,andweappreciateyourefforts.It'sbeenapleasureworkingwithtalentedpeoplelikeJamesMichaelStewartandMikeChappleThankstobothofyouforallyourworkandcollaborativeeffortsonthisproject.Thetechnicaleditors,JeffParkerBobSipes,andDavidSeidl,provideduswithsomeoutstandingfeedback,andthisbookisbetterbecauseoftheireffortsThankstotheteamatSybex(includingprojectmanagers,editors,andgraphicsartists)foralltheworkyoudidhelpingusgetthisbooktoprint.Last,thankstomywife,Nimfa,forputtingupwithmyoddhoursasIworkedonthisbookDarrilgibsonAbouttheauthorsMikeChapple,CISSP,PhD,Security+,CISA,CySA+,isanassociateteachingprofessorofIT,analytics,andoperationsattheUniversityofNotreDame.InthepasthewaschiefinformationofficerofBrandInstituteandaninformationsecurityresearcherwiththenationalSecurityagencyandtheu.s.airForcehisprimaryareasofexpertiseincludenetworkintrusiondetectionandaccesscontrols.mikeisafrequentcontributortoTechTarget'sSearchSecuritysiteandtheauthorofmorethan25booksincludingthecompanionbooktothisstudyguide:CISSPOfficial(ISC)2PracticeTests,theCompTIACSA+StudyGuide,andCyberwarfare:InformationOperationsinaConnectedWorld.MikeoffersstudygroupsfortheCISSP,SSCP,Security+,andcSa+certificationsonhiswebsiteatwww.certmike.comJamesMichaelStewart,CISSP,CEH,ECSA,CHFI,Security+Network+,hasbeenwritingandtrainingformorethan20years,withacurrentfocusonsecurity.hehasbeenteachingCiSsPtrainingcoursessince2002,nottomentionothercoursesonInternetsecurityandethicalhacking/penetrationtestingHeistheauthorofandcontributortomorethan75booksandnumerouscoursewaresetsonsecuritycertification,Microsofttopics,andnetworkadministrationincludingtheSecurity+(SY0-501)Reviewguide.Moreinformationaboutmichaelcanbefoundathiswebsiteatwww.impactonline.comDarrilGibson,CISSP,Security+,CASP,istheCeoofYODa(shortforYouCanDoAnything),andhehasauthoredorcoauthoredmorethan40books.Darrilregularlywrites,consults,andteachesonawidevarietyoftechnicalandsecuritytopicsandholdsseveralcertificationsHeregularlypostsblogarticlesathttp://blogs.getcertifiedgetahead.com/aboutcertificationtopicsandusesthatsitetohelppeoplestayabreastofchangesincertificationexams.Heloveshearingfromreaders,especiallywhentheypassanexamafterusingoneofhisbooks,andyoucancontacthimthroughthelebloggingsite.
2023/2/8 11:30:06 18.38MB cissp 官方英文版
1
共 18 条记录 首页 上一页 下一页 尾页
在日常工作中,钉钉打卡成了我生活中不可或缺的一部分。然而,有时候这个看似简单的任务却给我带来了不少烦恼。 每天早晚,我总是得牢记打开钉钉应用,点击"工作台",再找到"考勤打卡"进行签到。有时候因为工作忙碌,会忘记打卡,导致考勤异常,影响当月的工作评价。而且,由于我使用的是苹果手机,有时候系统更新后,钉钉的某些功能会出现异常,使得打卡变得更加麻烦。 另外,我的家人使用的是安卓手机,他们也经常抱怨钉钉打卡的繁琐。尤其是对于那些不太熟悉手机操作的长辈来说,每次打卡都是一次挑战。他们总是担心自己会操作失误,导致打卡失败。 为了解决这些烦恼,我开始思考是否可以通过编写一个全自动化脚本来实现钉钉打卡。经过一段时间的摸索和学习,我终于成功编写出了一个适用于苹果和安卓系统的钉钉打卡脚本。
2024-04-09 15:03 15KB 钉钉 钉钉打卡