Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security

简介: http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118896696.

http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118896696.html


目录
相关文章
|
算法 生物认证 开发工具
Guideline 5.1.2 - Legal - Privacy - Data Use and Sharing
你的应用程序收集的设备信息可能包括以下一些:attributesOfItemAtPath:error:, NSLocaleCountryCode, NSFileSystemSize, NSHomeDirectory,和serviceSubscriberCellularProviders。
236 0
|
安全
Information Systems Security Assessment – Open information security framework
The Information Systems Security Assessment Framework (ISSAF) seeks to integrate the following m...
930 0
strange behavior:why u31000 is accessed for Extension project
Created by Wang, Jerry, last modified on May 20, 2015
92 0
strange behavior:why u31000 is accessed for Extension project
|
SQL 编译器 API
Efficiently Compiling Efficient Query Plans for Modern Hardware 论文解读
这应该是SQL查询编译的一篇经典文章了,作者是著名的Thomas Neumann,主要讲解了TUM的HyPer数据库中对于CodeGen的应用。 在morsel-driven那篇paper 中,介绍了HyPer的整个执行框架,会以task为单位处理一个morsel的数据,而执行的处理逻辑(一个pipeline job)就被编译为一个函数。这篇paper则具体讲如何实现动态编译。
373 0
Efficiently Compiling Efficient Query Plans for Modern Hardware 论文解读
|
JavaScript 前端开发
Guidelines for Function Compute Development - Troubleshoot Timeout Issues
Endless codes and endless bugs When you write code, you may inadvertently introduce some hidden bugs, even if you test a large proportion of the codes to the maximum extent possible.
1599 0
SAP QM Early Lot Creation 04 Inspection Lot Demo
SAP QM Early Lot Creation 04 Inspection Lot Demo   save it.
1214 0
|
安全
Security Analytics: Detecting Advanced Threats and Fraud
https://www.brighttalk.com/webcast/574/136917
838 0