本書詳細介紹了在最新的Struts1.1以及不久將推出的Struts1.2版本上設計和開發Java Web應用的各種技術。本書第1章到第3章為入門篇,通過兩個Struts應用實例,引導讀者把握設計、開發和部署Struts應用的整體流程,充分體會Struts框架在開放大型、可擴展的Web應用方面發揮的優勢。第4章到第7章深入探討了Struts框架的核心組件ActionServlet和RequestProcessor的實現原理,詳細介紹了開發Struts應用的模型、視圖和控制器的各種技術,細致的描述了Struts配置文件的每個元素的使用方法。第8章到第9章介紹了開發Struts應用的一些實用技術,如Struts框架的擴展點、Struts應用的國際化,Validator驗證框架和異常處理機制等。第12章到第16章結合具體的Struts應用實例,詳細介紹了Struts的標簽庫以及Tiles框架的使用方法。第17章和第18章介紹如何采用EJB和Web服務來實現Struts框架的模型。第19章到第21章介紹了如何采用第三方軟件,如Apache Common Logging API、Log4J、ANT和StrutsTestCase,來控制Struts應用的輸出日志、管理以及測試Struts應用項目。
RSA ( Rivest Shamir Adleman )is crypthograph system that used to give a secret information and digital signature . Its security based on Integer Factorization Problem (IFP). RSA uses an asymetric key. RSA was created by Rivest, Shamir, and Adleman in 1977. Every user have a pair of key, public key and private key. Public key (e) . You may choose any number for e with these requirements, 1< e <Æ (n), where Æ (n)= (p-1) (q-1) ( p and q are first-rate), gcd (e,Æ (n))=1 (gcd= greatest Common divisor). Private key (d). d=(1/e) mod(Æ (n)) Encyption (C) . C=Mª mod(n), a = e (public key), n=pq Descryption (D) . D=C° mod(n), o = d (private key
This book is about writing TinyOS systems and applications in the nesC language. This chapter gives a
brief overview of TinyOS and its intended uses. TinyOS is an open-source project which a large number of
research universities and companies contribute to. The main TinyOS website, http://www.tinyos.net,
has instructions for downloading and installing the TinyOS programming environment. The website has a
great deal of useful information which this book doesn’t cover, such as Common hardware platforms and
how to install code on a node.
matlab有限元網格劃分程序
DistMesh is a simple MATLAB code for generation of unstructured triangular and tetrahedral meshes. It was developed by Per-Olof Persson (now at UC Berkeley) and Gilbert Strang in the Department of Mathematics at MIT. A detailed description of the program is provided in our SIAM Review paper, see documentation below.
One reason that the code is short and simple is that the geometries are specified by Signed Distance Functions. These give the shortest distance from any point in space to the boundary of the domain. The sign is negative inside the region and positive outside. A simple example is the unit circle in 2-D, which has the distance function d=r-1, where r is the distance from the origin. For more complicated geometries the distance function can be computed by interpolation between values on a grid, a Common representation for level set methods.
For the actual mesh generation, DistMesh uses the Delaunay triangulation routine in MATLAB and tries to optimize the node locations by a force-based smoothing procedure. The topology is regularly updated by Delaunay. The boundary points are only allowed to move tangentially to the boundary by projections using the distance function. This iterative procedure typically results in very well-shaped meshes.
Our aim with this code is simplicity, so that everyone can understand the code and modify it according to their needs. The code is not entirely robust (that is, it might not terminate and return a well-shaped mesh), and it is relatively slow. However, our current research shows that these issues can be resolved in an optimized C++ code, and we believe our simple MATLAB code is important for demonstration of the underlying principles.
To use the code, simply download it from below and run it from MATLAB. For a quick demonstration, type "meshdemo2d" or "meshdemond". For more details see the documentation.
The Universal Radio Hacker (URH) is a software for investigating unknown wireless protocols. Features include
* __hardware interfaces__ for Common Software Defined Radios
* __easy demodulation__ of signals
* __assigning participants__ to keep overview of your data
* __customizable decodings__ to crack even sophisticated encodings like CC1101 data whitening
* __assign labels__ to reveal the logic of the protocol
* __fuzzing component__ to find security leaks
* __modulation support__ to inject the data back into the system
* __simulation environment__ to perform stateful attacks