区块链,资本鼓吹的泡沫还是重塑世界的技术
区块链,资本鼓吹的泡沫还是重塑世界的技术
区块链,资本鼓吹的泡沫还是重塑世界的技术?.pdf
区块链,资本鼓吹的泡沫还是重塑世界的技术?.pdf
CNN综述 A Survey of the Recent Architectures of Deep Convolutional Neural Networks
CNN综述 A Survey of the Recent Architectures of Deep Convolutional Neural Networks
对话系统综述 Neural Approaches to Conversational AI
对话系统综述 Neural Approaches to Conversational AI
2017人工智能趋势深度报告
2017人工智能趋势深度报告
2017人工智能趋势深度报告
2017人工智能趋势深度报告
The Impact of Memory Subsystem Resource Sharing onDatacenter Applications
The Impact of Memory Subsystem Resource Sharing onDatacenter Applications
High PerformanceDatacenter Networks Architectures Algorithmsand Opportunities
High PerformanceDatacenter Networks Architectures Algorithmsand OpportunitiesHigh PerformanceDatacenter Networks Architectures Algorithmsand OpportunitiesHigh PerformanceDatacenter Networks Architectures Algorithmsand Opportunities
Dapper, a Large-Scale Distributed Systems Tracing Infrastructure
Dapper, a Large-Scale Distributed Systems Tracing Infrastructure
Data-Intensive+Text+Processing+with+MapReduce
Data-Intensive+Text+Processing+with+MapReduce
数据结构复习
数据结构,总结,复习,考验
数据结构,总结,复习,考验
数据结构,总结,复习,考验
map reduce ppt
mapredece 相关的PPT
Large-Scale Data Processing
Want to use 1000s of CPUs
But don’t want hassle of managing things
MapReduce Architecture provides
Automatic parallelization & distribution
Fault tolerance
I/O scheduling
Monitoring & status updates
sql injection
Many people say they know what SQL injection is, but all they have heard about or
experienced are trivial examples. SQL injection is one of the most devastating vulnerabilitie
to impact a business, as it can lead to exposure of all of the sensitive information stored in
an application’s database, including handy information such as usernames, passwords,
names, addresses, phone numbers, and credit card details.
Unix.Systems.Programming.Communication.Concurrency.And.Threads.eBook-LiB
This completely updated classic (originally titled Practical UNIX Programming) demonstrates how to design complex software to get the most from the UNIX operating system. UNIX Systems Programming provides a clear and easy-to-understand introduction tothe essentials of UNIX programming. Starting with short code snippetsthat illustrate how to use system calls, Robbins and Robbins movequickly to hands-on projects that help readers expand their skill levels.
This practical guide thoroughly explores communication, concurrency,and multithreading. Known for its comprehensive and lucid explanations of complicated topics such as signals and concurrency, the book features practical examples, exercises, reusable code, and simplified libraries for use in network communication applications.
A self-contained reference that relies on the latest UNIX standards,UNIX Systems Programming provides thorough coverage of files, signals,semaphores, POSIX threads, and client-server communication. Thisedition features all-new chapters on the Web, UDP, and server performance. The sample material has been tested extensively in theclassroom.
The Art Of Unix Programming (Eric Raymond) - 2003 - (By Laxxuss)
Context
Table of Contents
1. Philosophy
Culture? What Culture?
The Durability of Unix
The Case against Learning Unix Culture
What Unix Gets Wrong
What Unix Gets Right
Open-Source Software
Cross-Platform Portability and Open Standards
The Internet and the World Wide Web
The Open-Source Community
Flexibility All the Way Down
Unix Is Fun to Hack
......
UNIX Shells by Example, 3rd Edition
1.1 Definition and Function
1.2 System Startup and the Login Shell
1.3 Processes and the Shell
1.4 The Environment and Inheritance
1.5 Executing Commands from Scripts
......
Interprocess Communications in Linux
Introduction
Acknowledgments
Chapter 1. Programs and Processes
Section 1.1. Introduction
Section 1.2. Library Functions
Section 1.3. System Calls
Section 1.4. Linking Object Code
Section 1.5. Managing Failures
Section 1.6. Executable File Format
Section 1.7. System Memory
Section 1.8. Process Memory
Section 1.9. The u Area
Section 1.10. Process Memory Addresses
Section 1.11. Creating a Process
Section 1.12. Summary
Section 1.13. Key Terms and Concepts
Chapter 2. Processing Environment
Section 2.1. Introduction
Section 2.2. Process ID
Section 2.3. Parent Process ID
Section 2.4. Process Group ID
Section 2.5. Permissions
Section 2.6. Real and Effective User and Group IDs
Section 2.7. File System Information
Section 2.8. File Information
Section 2.9. Process Resource Limits
Section 2.10. Signaling Processes
Section 2.11. Command-Line Values
Section 2.12. Environment Variables
Section 2.13. The /proc Filesystem
Section 2.14. Summary
Section 2.15. Key Terms and Concepts
Chapter 3. Using Processes
Section 3.1. Introduction
Section 3.2. The fork System Call Revisited
Section 3.3. exec's Minions
Section 3.4. Using fork and exec Together
Section 3.5. Ending a Process
Section 3.6. Waiting on Processes
Section 3.7. Summary
Section 3.8. Key Terms and Concepts
Chapter 4. Primitive Communications
Section 4.1. Introduction
Section 4.2. Lock Files
Section 4.3. Locking Files
Section 4.4. More About Signals
Section 4.5. Signal and Signal Management Calls
Section 4.6. Summary
Section 4.7. Key Terms and Concepts
Chapter 5. Pipes
Section 5.1. Introduction
Section 5.2. Unnamed Pipes
Section 5.3. Named Pipes
Section 5.4. Summary
Section 5.5. Key Terms and Concepts
Chapter 6. Message Queues
Section 6.1. Introduction
Section 6.2. IPC System Calls: A Synopsis
Section 6.3. Creating a Message Queue
Section 6.4. Message Queue Control
Section 6.5. Message Queue Operations
Section 6.6. A Client朣erver Message Queue Example
Section 6.7. Message Queue Class
Section 6.8. Summary
Section 6.9. Key Terms and Concepts
Chapter 7. Semaphores
Section 7.1. Introduction
Section 7.2. Creating and Accessing Semaphore Sets
Section 7.3. Semaphore Control
Section 7.4. Semaphore Operations
Section 7.5. Semaphore Class
Section 7.6. Summary
Section 7.7. Key Terms and Concepts
Chapter 8. Shared Memory
Section 8.1. Introduction
Section 8.2. Creating a Shared Memory Segment
Section 8.3. Shared Memory Control
Section 8.4. Shared Memory Operations
Section 8.5. Using a File as Shared Memory
Section 8.6. Shared Memory Class
Section 8.7. Summary
Section 8.8. Key Terms and Concepts
Chapter 9. Remote Procedure Calls
Section 9.1. Introduction
Section 9.2. Executing Remote Commands at a System Level
Section 9.3. Executing Remote Commands in a Program
Section 9.4. Transforming a Local Function Call into a Remote Procedure
Section 9.5. Debugging RPC Applications
Section 9.6. Using RPCGEN to Generate Templates and a MAKEFILE
Section 9.7. Encoding and Decoding Arbitrary Data Types
Section 9.8. Using Broadcasting to Search for an RPC Service
Section 9.9. Summary
Section 9.10. Key Terms and Concepts
Chapter 10. Sockets
Section 10.1. Introduction
Section 10.2. Communication Basics
Section 10.3. IPC Using Socketpair
Section 10.4. Sockets: The Connection-Oriented Paradigm
Section 10.5. Sockets: The Connectionless Paradigm
Section 10.6. Multiplexing I/O with select
Section 10.7. Peeking at Data
Section 10.8. Out of Band Messages
Section 10.9. Summary
Section 10.10. Key Terms and Concepts
Chapter 11. Threads
Section 11.1. Introduction
Section 11.2. Creating a Thread
Section 11.3. Exiting a Thread
Section 11.4. Basic Thread Management
Section 11.5. Thread Attributes
Section 11.6. Scheduling Threads
Section 11.7. Using Signals in Threads
Section 11.8. Thread Synchronization
Section 11.9. Thread-Specific Data
Section 11.10. Debugging Multithreaded Programs
Section 11.11. Summary
Section 11.12. Nomenclature and Key Concepts
Appendix A. Using Linux Manual Pages
Section A.1. Manual Page Sections
Section A.2. Manual Page Format
Section A.3. Standard Linux System Calls
Appendix B. UNIX Error Messages
Appendix C. RPC Syntax Diagrams
Section C.1. Introduction
Section C.2. RPC Definitions
Section C.3. RPC Keywords
Section C.4. Some RPC Examples
Appendix D. Profiling Programs
Section D.1. Introduction
Section D.2. Sample Program for Profiling
Section D.3. Generating Profile Data
Section D.4. Viewing and Interpreting Profile Data
Appendix E. Bibliography
Linux Kernel Development Second Edition
The Linux kernel is one of the most interesting yet least understood open-source projects. It is also a basis for developing new kernel code. That is why Sams is excited to bring you the latest Linux kernel development information from a Novell insider in the second edition of Linux Kernel Development. This authoritative, practical guide will help you better understand the Linux kernel through updated coverage of all the major subsystems, new features associated with Linux 2.6 kernel and insider information on not-yet-released developments. You'll be able to take an in-depth look at Linux kernel from both a theoretical and an applied perspective as you cover a wide range of topics, including algorithms, system call interface, paging strategies and kernel synchronization. Get the top information right from the source in Linux Kernel Development.
A Buffer Overflow Study Attacks and Defenses
Introduction
On november 2, 1988 a new form of threat appeared with the Morris Worm, also known as the Internet
Worm. This famous event caused heavy damages on the internet, by using two common unix programs,
sendmail and fingerd. This was possible by exploiting a bu?er overflow in fingerd. This is probably one
of the most outstanding attacks based on bu?er overflows.
This kind of vulnerability has been found on largely spread and used daemons such as bind, wu-ftpd,
or various telnetd implementations, as well as on applications such as Oracle or MS Outlook Express...
The variety of vulnerable programs and possible ways to exploit them make clear that bu?er overflows
represent a real threat. Generally, they allow an attacker to get a shell on a remote machine, or to obtain
superuser rights. Bu?er overflows are commonly used in remote or local exploits.
The first aim of this document is to present how bu?er overflows work and may compromise a system
or a network security, and to focus on some existing protection solutions. Finally, we will try to point
out the most interesting sets to secure an environment, and compare them on criteria such as e?ciency
or performance loss.
We are both third year computer science students at ENSEIRB (French national school of engineering),
specialized in Networks and Distributed Systems. This study has been performed during our Network
Administration project.
Java虚拟机规范中文版
Java虚拟机规范中文版 Java虚拟机规范中文版 Java虚拟机规范中文版 Java虚拟机规范中文版
精通 Struts源码
孙卫琴 精通 Struts源码
孙卫琴 精通 Struts源码
孙卫琴 精通 Struts源码
孙卫琴 精通 Struts源码
http 协议详解
http_RFC2616.pdfhttp_RFC2616.pdfhttp_RFC2616.pdfhttp_RFC2616.pdfhttp_RFC2616.pdf
防火墙与internet安全
Addison Wesley - Firewalls and Internet Security
MySQL Cookbook
非常全面的介绍mysql,有丰富的例子
Essential CVS
cvs知识--- Essential CVS
Linux内核情景分析
Linux内核情景分析 下