自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+
  • 博客(3)
  • 资源 (10)
  • 收藏
  • 关注

原创 IP地址的基因

IP地址的基因是一个32位或128位的二进制串,问题来了,第一个问题是为什么是二进制。这个问题得从我们现在使用的电子计算机说起。我们的计算机的核心是CPU,按照冯诺依曼的计算机结构即存储tk...

2021-05-28 06:47:34 197

原创 2021-05-27

今天,我将要开始一段新的旅程,那就是要围绕IP地址写些东西,一是表达一些自己独特的想法,二是对已有知识的梳理和我的视角出发的审视,不管这段旅程能够持续多长时间,但至少我现在是下了较大决心,也是有了许多想法,同时还有些非份之想,但现有还不便透露,等到时机成熟了再说。由于最近几天包括以前都经常听许多人讲网络知识,出现频率最高占比最大的内容是IP地址,那时一起都觉得IP地址如此简单,哪里值得如此大张旗鼓地宣传呢,可是随着不断听别人在说,心里开始有些微妙的变化,终于从量变到质变,今天脑子里开始突发奇...

2021-05-27 14:31:28 107 1

原创 china-pub的世界一流网络水平

首先,希望能够让大家看到这个帖子。我通常是在亚马逊订书,当然以前也在china-pub订过书,但总是感觉不是让人很满意,这次因为要给儿子买一本终极米谜的书,亚马逊自己没有货,商家的运费需要三十五元,于是便到cp看看,发现有这本书,为了提高利用率,顺便买了一本奇思妙想,可是让我感到无比震惊的是CP告诉我说没有这本书了,最后我花了四十多元钱买了一本标价是三十二元钱的书,我不知道是CP脑子进水了还是我自

2012-04-01 19:14:20 240

A Collaborative Security Framework__for Software-Defined Wireless__Sensor Networ

Abstract— With the advent of 5G, technologies such as Software-Defined Networks (SDNs) and Network Function Virtualization (NFV) have been developed to facilitate simple programmable control of Wireless Sensor Networks (WSNs). However, WSNs are typically deployed in potentially untrusted environment

2020-11-29

Professional ASP.NET Design Patterns

Filled with lots of code, instead of endless prose like some books, this book strives to connect the dots and make these patterns real, applicable and relevant in your daily life as a developer.

2012-07-05

Database Modeling and Design 5th Edition

Logical database design is largely the domain of applica- tion designers, who design the logical structure of the data- base to suit application requirements for data manipulation and structured queries. The definition of database tables for a particular vendor is considered to be within the domain of logical design in this book, although many database practitioners refer to this step as physical design.

2012-07-28

Counteracting Attacks From Malicious End Hosts__in Software Defined Networks

This paper proposes security techniques for counteracting attacks from malicious end hosts in a software defined networking (SDN) environment. This paper describes the design of a security architecture, which comprises a security management application running in the SDN controller for specifying

2020-12-16

Real World Instrumentation with Python

python也可以广泛用于工业控制相关软件的开发,此书就告诉你他可以帮助你如何做!

2013-05-07

I-HMM-Based Multidimensional Network__Security Risk Assessment

Cyber-physical systems (CPS) are vulnerable to network attacks because communication relies on the network that links the various components in the CPS. The importance of network security is selfevident. In this study, we conduct a network security risk assessment from the perspectives of the host

2020-12-16

attack graph tool

generate attack graph with XSB which is a kind of prolog reasoning tool.

2009-06-06

Architecting Microsoft Dot NET Solutions for the Enterprise

In this book, you ll take a structured, realistic approach to resolving software complexity that places architectural integrity at its core.

2012-06-30

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除