悟空视频

    在线播放云盘网盘BT下载影视图书

    A Secure Base - 图书

    2005
    导演:John Bowlby
    在线阅读本书 For many people today, giving time and attention to children means sacrificing other interests and activities. Yet a healthy parent-child bond is not only vital for well-being, but an essential part of what it means to be human. Secure children are confident, using a parent as a "secure base" while they explore the world. Bowlby's work showed that the early interactions...(展开全部)
    A Secure Base
    图书

    Secure By Design - 图书

    导演:Daniel Deogun
    Summary Secure by Design teaches developers how to use design to drive security in software development. This book is full of patterns, best practices, and mindsets that you can directly apply to your real world development. You'll also learn to spot weaknesses in legacy code and how to address them. Foreword by Daniel Terhorst-North. Purchase of the print book includes a free ...(展开全部)
    Secure By Design
    搜索《Secure By Design》
    图书

    Secure By Design - 图书

    导演:Daniel Deogun
    Summary Secure by Design teaches developers how to use design to drive security in software development. This book is full of patterns, best practices, and mindsets that you can directly apply to your real world development. You'll also learn to spot weaknesses in legacy code and how to address them. Foreword by Daniel Terhorst-North. Purchase of the print book includes a free ...(展开全部)
    Secure By Design
    搜索《Secure By Design》
    图书

    Writing Secure Code: Practical Strategies and Proven Techniques for Building Secure Applications in - 图书

    2002
    导演:David LeBlanc
    Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Short, easily digested chapters reveal proven...(展开全部)
    Writing Secure Code: Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World
    搜索《Writing Secure Code: Practical Strategies and Proven Techniques for Building Secure Applications in a Networked World》
    图书

    The CERT C Secure Coding Standard - 图书

    2008
    导演:Robert C·Seacord
    "I'm an enthusiastic supporter of the CERT Secure Coding Initiative. Programmers have lots of sources of advice on correctness, clarity, maintainability, performance, and even safety. Advice on how specific language features affect security has been missing. The CERT(R) C Secure Coding Standardfills this need." -Randy Meyers, Chairman of ANSI C "For years we have relied upon t...(展开全部)
    The CERT C Secure Coding Standard
    搜索《The CERT C Secure Coding Standard》
    图书

    The CERT C Secure Coding Standard - 图书

    2008
    导演:Robert C·Seacord
    "I'm an enthusiastic supporter of the CERT Secure Coding Initiative. Programmers have lots of sources of advice on correctness, clarity, maintainability, performance, and even safety. Advice on how specific language features affect security has been missing. The CERT(R) C Secure Coding Standardfills this need." -Randy Meyers, Chairman of ANSI C "For years we have relied upon t...(展开全部)
    The CERT C Secure Coding Standard
    搜索《The CERT C Secure Coding Standard》
    图书

    Secure Coding in C and C++ - 图书

    导演:Robert C·Seacord
    Learn the Root Causes of Software Vulnerabilities and How to Avoid Them Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed tens of thousands of vulnerability reports since 1988, CERT has determined that a relatively small number of root causes account for most of the vulnerabilities. Secure Coding in C and C++, Second E...(展开全部)
    Secure Coding in C and C++
    搜索《Secure Coding in C and C++》
    图书

    Secure Coding in C and C++ - 图书

    导演:Robert C·Seacord
    "The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append it as an afterthought. That's the point of Se...(展开全部)
    Secure Coding in C and C++
    搜索《Secure Coding in C and C++》
    图书

    SSH, The Secure Shell: The Definitive Guide - 图书

    导演:Daniel J. Barrett
    Dan Barrett has been immersed in Internet technology since 1985. Currently working as a software engineer, Dan has also been a heavy metal singer, Unix system administrator, university lecturer, web designer, and humorist. He has written several O'Reilly books, as well as monthly columns for Compute! and Keyboard Magazine. Dan and his family reside in Boston. Richard E. Silverm...(展开全部)
    SSH, The Secure Shell: The Definitive Guide
    搜索《SSH, The Secure Shell: The Definitive Guide》
    图书

    Concurrency Control and Recovery in Data Base Systems - 图书

    导演:Philip A. Bernstein
    ’m currently a Principal Researcher at Microsoft Corporation, where I've worked since 1994. I'm also an Affiliate Professor of computer science at University of Washington. Over the past 35 years, I’ve been a product architect at Microsoft and at Digital Equipment Corp. (gone but not forgotten), a professor at Harvard University and Wang Institute of Graduate Studies, and a VP ...(展开全部)
    Concurrency Control and Recovery in Data Base Systems
    搜索《Concurrency Control and Recovery in Data Base Systems》
    图书
    加载中...