自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+
  • 博客(3)
  • 资源 (7)
  • 收藏
  • 关注

转载 企业架构EA

虽是老文,依然要学习,原文地址:http://blog.csdn.net/cissyring/article/details/1764654   EA概念产生于1987年,在IBM的一个内部刊物上发表的一篇文章"A Framework for Information Systems Architecture" by J.A. Zachman,概念的提出是为了应对日益复杂的IT系统以及高投资、

2011-11-19 02:16:21 890

转载 SOA和EA的关系

SOA和EA的关系 原址:http://blog.csdn.net/cissyring/article/details/1764656 分类: EA SOA2007-08-30 00:09   最近SOA炒得火热,作为一种面向服务的体系结构,颇受各大厂商推崇。EA领域经过20多年的发展,在IT系统日益复杂、投资回报较低的今天,也再次引起人们的关注。SOA 和EA作为架构有

2011-11-19 02:14:57 471

原创 爱情里...没有谁会等谁一辈子...

       

2008-10-11 19:30:00 346

[生物数据挖掘].Biological.Data.Mining

This series aims to capture new developments and applications in data mining and knowledge discovery, while summarizing the computational tools and techniques useful in data analysis. This series encourages the integration of mathematical, statistical, and computational methods and techniques through the publication of a broad range of textbooks, reference works, and handbooks. The inclusion of concrete examples and applications is highly encouraged. The scope of the series includes, but is not limited to, titles in the areas of data mining and knowledge discovery methods and applications, modeling, algorithms, theory and foundations, data and knowledge visualization, data mining systems and tools, and privacy and security issues.

2013-07-22

数据挖掘:概念与技术 第三版 韩家炜

数据挖掘经典著作,韩家炜编,不比多说。内容覆盖广泛,条理明晰,学习数据挖掘的必读之书。

2013-07-22

Mastering Network Security.pdf

The book is specifically geared toward the individual who does not have ten years of experience in the security field—but is still expected to run a tight ship. If you are a security guru who is looking to fill in that last five percent of your knowledge base, this may not be the book for you. If, however, you are looking for a practical guide that will help you to identify your areas of greatest weakness, you have come to the right place. This book was written with the typical network or system administrator in mind, those administrators who have a good handle on networking and the servers they are expected to manage, but who need to find out what they can do to avoid being victimized by a security breach.

2010-03-01

管理:模型、方法和系统(Workflow Management-Models Methods and Systems)

This book is about the management of business processes. This is certainly not a new topic. Since the beginning of the Industrial Revolution, it has been written about from every possible point of view—economic, sociological, psychological, accountancy, mechanical engineering and business administration. In this book, we examine the management of business processes from the perspective of computing, or—to put it more broadly—of information technology. The reason is that information technology has made huge leaps forward in recent years, resulting in the creation of completely new ways of organizing business processes. The development of generic software packages for managing business processes—so-called workflow management systems (WFMS)—is particularly important in this respect.

2009-03-19

Prentice.Hall.PTR How Secure is Your Wireless Network--Safeguarding.Your.Wi-Fi.LAN

Title:How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN URL:http://www.amazon.com/exec/obidos/tg/detail/-/0131402064 ISBN:0131402064 Author:Lee Barken Publisher:Prentice Hall PTR Page:240 pages Edition:1st edition (August 29, 2003) Catalog:Computer networks Format:CHM Size:3.13 MB Supplier:Team LiB Summary:Now you can have the awesome benefits of wireless LANswithout falling victim to their notorious security flaws. Leadingwireless security expert Lee Barken shows you practicalworkarounds and fixes for the vulnerabilities in today'sWLANs, introduces high-security wireless protocols new to themarketplace, and offers step-by-step instructions for protectingall your wireless information, from the home to the enterprise.This is the definitive and easy-to-use WLAN security book you'vebeen searching for--whether you're a network administrator,security specialist, manager, or home user.

2008-12-13

Artech House Role Based Access Control

书名:《Role-Based.Access.Control》 作者:David F. Ferraiolo, D. Richard Kuhn and Ramaswamy Chandramouli 访问控制经典书

2008-09-15

C#完全参考手册

学习C#,可用的全参考手册。

2008-07-28

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除