自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+
  • 博客(1)
  • 资源 (36)
  • 收藏
  • 关注

原创 理查德.克莱德曼

今天在论坛中无意中看到一篇帖子作者说非常喜欢理查德.克莱德曼的钢琴曲,我立即想到了,秋日私语,献给爱丽丝,爱情的纪念,给母亲的信……是啊,这些曲子我再熟悉不过了。    冬天     那是我高中二年级的第一个学期,虽然家在南方,但是,冬天还是蛮冷的,至今想起那时我一生当中到目前为止度过的最寒冷的冬天。从秋日的丝丝凉意,到冬天荒芜,狮子山麓的寂静。在自然界里这是再正常不过的一个冬天,可是,在我的生命中却如此的一个艰难而不同寻常的阶段。是的,每当我不如意,我会听到那首秋日私语。我不知道这首曲子的意思,可是它仿佛

2010-07-05 14:41:00 914 3

区块链,资本鼓吹的泡沫还是重塑世界的技术

区块链,资本鼓吹的泡沫还是重塑世界的技术 区块链,资本鼓吹的泡沫还是重塑世界的技术?.pdf 区块链,资本鼓吹的泡沫还是重塑世界的技术?.pdf

2019-11-13

CNN综述 A Survey of the Recent Architectures of Deep Convolutional Neural Networks

CNN综述 A Survey of the Recent Architectures of Deep Convolutional Neural Networks

2019-04-09

对话系统综述 Neural Approaches to Conversational AI

对话系统综述 Neural Approaches to Conversational AI

2019-04-09

2017人工智能趋势深度报告

2017人工智能趋势深度报告 2017人工智能趋势深度报告 2017人工智能趋势深度报告

2018-04-01

The Impact of Memory Subsystem Resource Sharing onDatacenter Applications

The Impact of Memory Subsystem Resource Sharing onDatacenter Applications

2012-02-29

Megastore Providing Scalable, Highly AvailableStorage for Interactive Services

Megastore Providing Scalable, Highly

2012-02-29

High PerformanceDatacenter Networks Architectures Algorithmsand Opportunities

High PerformanceDatacenter Networks Architectures Algorithmsand OpportunitiesHigh PerformanceDatacenter Networks Architectures Algorithmsand OpportunitiesHigh PerformanceDatacenter Networks Architectures Algorithmsand Opportunities

2012-02-29

Dapper, a Large-Scale Distributed Systems Tracing Infrastructure

Dapper, a Large-Scale Distributed Systems Tracing Infrastructure

2012-02-29

CouchDB

CouchDB

2012-02-29

云计算与海量数据处理

云计算与海量数据处理

2012-02-29

Data-Intensive+Text+Processing+with+MapReduce

Data-Intensive+Text+Processing+with+MapReduce

2012-02-29

数据结构复习

数据结构,总结,复习,考验 数据结构,总结,复习,考验 数据结构,总结,复习,考验

2011-10-02

map reduce ppt

mapredece 相关的PPT Large-Scale Data Processing Want to use 1000s of CPUs But don’t want hassle of managing things MapReduce Architecture provides Automatic parallelization & distribution Fault tolerance I/O scheduling Monitoring & status updates

2010-05-02

sql injection

Many people say they know what SQL injection is, but all they have heard about or experienced are trivial examples. SQL injection is one of the most devastating vulnerabilitie to impact a business, as it can lead to exposure of all of the sensitive information stored in an application’s database, including handy information such as usernames, passwords, names, addresses, phone numbers, and credit card details.

2010-01-23

Unix.Systems.Programming.Communication.Concurrency.And.Threads.eBook-LiB

This completely updated classic (originally titled Practical UNIX Programming) demonstrates how to design complex software to get the most from the UNIX operating system. UNIX Systems Programming provides a clear and easy-to-understand introduction tothe essentials of UNIX programming. Starting with short code snippetsthat illustrate how to use system calls, Robbins and Robbins movequickly to hands-on projects that help readers expand their skill levels. This practical guide thoroughly explores communication, concurrency,and multithreading. Known for its comprehensive and lucid explanations of complicated topics such as signals and concurrency, the book features practical examples, exercises, reusable code, and simplified libraries for use in network communication applications. A self-contained reference that relies on the latest UNIX standards,UNIX Systems Programming provides thorough coverage of files, signals,semaphores, POSIX threads, and client-server communication. Thisedition features all-new chapters on the Web, UDP, and server performance. The sample material has been tested extensively in theclassroom.

2009-10-13

The Art Of Unix Programming (Eric Raymond) - 2003 - (By Laxxuss)

Context Table of Contents 1. Philosophy Culture? What Culture? The Durability of Unix The Case against Learning Unix Culture What Unix Gets Wrong What Unix Gets Right Open-Source Software Cross-Platform Portability and Open Standards The Internet and the World Wide Web The Open-Source Community Flexibility All the Way Down Unix Is Fun to Hack ......

2009-10-13

UNIX Shells by Example, 3rd Edition

1.1 Definition and Function 1.2 System Startup and the Login Shell 1.3 Processes and the Shell 1.4 The Environment and Inheritance 1.5 Executing Commands from Scripts ......

2009-10-13

Interprocess Communications in Linux

Introduction Acknowledgments Chapter 1. Programs and Processes Section 1.1. Introduction Section 1.2. Library Functions Section 1.3. System Calls Section 1.4. Linking Object Code Section 1.5. Managing Failures Section 1.6. Executable File Format Section 1.7. System Memory Section 1.8. Process Memory Section 1.9. The u Area Section 1.10. Process Memory Addresses Section 1.11. Creating a Process Section 1.12. Summary Section 1.13. Key Terms and Concepts Chapter 2. Processing Environment Section 2.1. Introduction Section 2.2. Process ID Section 2.3. Parent Process ID Section 2.4. Process Group ID Section 2.5. Permissions Section 2.6. Real and Effective User and Group IDs Section 2.7. File System Information Section 2.8. File Information Section 2.9. Process Resource Limits Section 2.10. Signaling Processes Section 2.11. Command-Line Values Section 2.12. Environment Variables Section 2.13. The /proc Filesystem Section 2.14. Summary Section 2.15. Key Terms and Concepts Chapter 3. Using Processes Section 3.1. Introduction Section 3.2. The fork System Call Revisited Section 3.3. exec's Minions Section 3.4. Using fork and exec Together Section 3.5. Ending a Process Section 3.6. Waiting on Processes Section 3.7. Summary Section 3.8. Key Terms and Concepts Chapter 4. Primitive Communications Section 4.1. Introduction Section 4.2. Lock Files Section 4.3. Locking Files Section 4.4. More About Signals Section 4.5. Signal and Signal Management Calls Section 4.6. Summary Section 4.7. Key Terms and Concepts Chapter 5. Pipes Section 5.1. Introduction Section 5.2. Unnamed Pipes Section 5.3. Named Pipes Section 5.4. Summary Section 5.5. Key Terms and Concepts Chapter 6. Message Queues Section 6.1. Introduction Section 6.2. IPC System Calls: A Synopsis Section 6.3. Creating a Message Queue Section 6.4. Message Queue Control Section 6.5. Message Queue Operations Section 6.6. A Client朣erver Message Queue Example Section 6.7. Message Queue Class Section 6.8. Summary Section 6.9. Key Terms and Concepts Chapter 7. Semaphores Section 7.1. Introduction Section 7.2. Creating and Accessing Semaphore Sets Section 7.3. Semaphore Control Section 7.4. Semaphore Operations Section 7.5. Semaphore Class Section 7.6. Summary Section 7.7. Key Terms and Concepts Chapter 8. Shared Memory Section 8.1. Introduction Section 8.2. Creating a Shared Memory Segment Section 8.3. Shared Memory Control Section 8.4. Shared Memory Operations Section 8.5. Using a File as Shared Memory Section 8.6. Shared Memory Class Section 8.7. Summary Section 8.8. Key Terms and Concepts Chapter 9. Remote Procedure Calls Section 9.1. Introduction Section 9.2. Executing Remote Commands at a System Level Section 9.3. Executing Remote Commands in a Program Section 9.4. Transforming a Local Function Call into a Remote Procedure Section 9.5. Debugging RPC Applications Section 9.6. Using RPCGEN to Generate Templates and a MAKEFILE Section 9.7. Encoding and Decoding Arbitrary Data Types Section 9.8. Using Broadcasting to Search for an RPC Service Section 9.9. Summary Section 9.10. Key Terms and Concepts Chapter 10. Sockets Section 10.1. Introduction Section 10.2. Communication Basics Section 10.3. IPC Using Socketpair Section 10.4. Sockets: The Connection-Oriented Paradigm Section 10.5. Sockets: The Connectionless Paradigm Section 10.6. Multiplexing I/O with select Section 10.7. Peeking at Data Section 10.8. Out of Band Messages Section 10.9. Summary Section 10.10. Key Terms and Concepts Chapter 11. Threads Section 11.1. Introduction Section 11.2. Creating a Thread Section 11.3. Exiting a Thread Section 11.4. Basic Thread Management Section 11.5. Thread Attributes Section 11.6. Scheduling Threads Section 11.7. Using Signals in Threads Section 11.8. Thread Synchronization Section 11.9. Thread-Specific Data Section 11.10. Debugging Multithreaded Programs Section 11.11. Summary Section 11.12. Nomenclature and Key Concepts Appendix A. Using Linux Manual Pages Section A.1. Manual Page Sections Section A.2. Manual Page Format Section A.3. Standard Linux System Calls Appendix B. UNIX Error Messages Appendix C. RPC Syntax Diagrams Section C.1. Introduction Section C.2. RPC Definitions Section C.3. RPC Keywords Section C.4. Some RPC Examples Appendix D. Profiling Programs Section D.1. Introduction Section D.2. Sample Program for Profiling Section D.3. Generating Profile Data Section D.4. Viewing and Interpreting Profile Data Appendix E. Bibliography

2009-10-13

Linux Kernel Development Second Edition

The Linux kernel is one of the most interesting yet least understood open-source projects. It is also a basis for developing new kernel code. That is why Sams is excited to bring you the latest Linux kernel development information from a Novell insider in the second edition of Linux Kernel Development. This authoritative, practical guide will help you better understand the Linux kernel through updated coverage of all the major subsystems, new features associated with Linux 2.6 kernel and insider information on not-yet-released developments. You'll be able to take an in-depth look at Linux kernel from both a theoretical and an applied perspective as you cover a wide range of topics, including algorithms, system call interface, paging strategies and kernel synchronization. Get the top information right from the source in Linux Kernel Development.

2009-10-13

A Buffer Overflow Study Attacks and Defenses

Introduction On november 2, 1988 a new form of threat appeared with the Morris Worm, also known as the Internet Worm. This famous event caused heavy damages on the internet, by using two common unix programs, sendmail and fingerd. This was possible by exploiting a bu?er overflow in fingerd. This is probably one of the most outstanding attacks based on bu?er overflows. This kind of vulnerability has been found on largely spread and used daemons such as bind, wu-ftpd, or various telnetd implementations, as well as on applications such as Oracle or MS Outlook Express... The variety of vulnerable programs and possible ways to exploit them make clear that bu?er overflows represent a real threat. Generally, they allow an attacker to get a shell on a remote machine, or to obtain superuser rights. Bu?er overflows are commonly used in remote or local exploits. The first aim of this document is to present how bu?er overflows work and may compromise a system or a network security, and to focus on some existing protection solutions. Finally, we will try to point out the most interesting sets to secure an environment, and compare them on criteria such as e?ciency or performance loss. We are both third year computer science students at ENSEIRB (French national school of engineering), specialized in Networks and Distributed Systems. This study has been performed during our Network Administration project.

2009-10-13

Java虚拟机规范中文版

Java虚拟机规范中文版 Java虚拟机规范中文版 Java虚拟机规范中文版 Java虚拟机规范中文版

2009-10-13

精通 Struts源码

孙卫琴 精通 Struts源码 孙卫琴 精通 Struts源码 孙卫琴 精通 Struts源码 孙卫琴 精通 Struts源码

2009-10-13

http 协议详解

http_RFC2616.pdfhttp_RFC2616.pdfhttp_RFC2616.pdfhttp_RFC2616.pdfhttp_RFC2616.pdf

2009-09-15

防火墙与internet安全

Addison Wesley - Firewalls and Internet Security

2008-05-17

MySQL Cookbook

非常全面的介绍mysql,有丰富的例子

2008-05-17

Essential CVS

cvs知识--- Essential CVS

2008-05-17

ant使用指南

ant 使用介绍有例子

2008-05-11

struts api

struts api

2008-04-26

java & xml

java and xml

2008-04-08

Linux内核情景分析

Linux内核情景分析 下

2007-05-12

Linux内核情景分析

Linux内核情景分析

2007-05-12

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除