Product Descr iption The importance of computer security has increased dramatically during the past few years. Bishop provides a monumental reference for the theory and practice of computer security. This is a textbook intended for use at the advanc
本文阐述了哈希函数的构造方法有很多,但应注意两个原则:第一,函数值应在1至记录总数之间;第二,尽可能避免冲突。 设要存放的数据元素有n个,存放数据元素的内存单元有m个,设计哈希函数的目标就是要使通过哈希函数得到的n个数据元素的哈希地址尽可能均匀地分布在m个连续内存单元上,同时使计算过程尽可能简单以达到尽可能高的时间效率。 This paper describes the structure of the hash function of a lot of ways, but should pa
不仅对这些书籍进行了补充,而且在某种程度上取代了它们。大多数管理书籍中充斥着代码;它们有 sendmail.cf 示例、大量 shell 脚本、top 的命令行参数说明等等。Practice 所针对的知识主体要略微更抽象些,和 Mark Burgess 编写的 Principles of Network and System Administration 大体相同
Advanced communications cenarios demand the development of new systems where antenna theory, channel propagation and communication models are seen from a common perspective as a way to understand and optimize the system as a whole. In this context,
Software Defined Mobile Networks (SDMN). Beyond LTE Network Architecture. Wiley Series on Communications Networking & Distributed Systems Descr iption: Software–Defined Networking (SDN) is one of the promising technologies that provide the required
Architecting Modern Web Applications with ASP.NET Core and Microsoft Azure 2nd Edition (ASP.NET Core 2 support) 书籍章节目录: 1.Introduction 2.Characteristics of Modern Web Applications 3.Choosing Between Traditional Web Apps and Single Page Apps (SPAs) 4