找回密码
 注册
搜索
热搜: java php web
查看: 549|回复: 4

The Myths of Security: What the Computer Security Industry Doesn’t Want You to K

[复制链接]
发表于 2009-12-18 20:11:27 | 显示全部楼层 |阅读模式


作者:John Viega
出版日期:June 29, 2009
出版社:O'Reilly
页数:260
ISBN:ISBN-10: 0596523025 ISBN-13: 978-0596523022
文件格式:PDF

Product Description
If you think computer security has improved in recent years, The Mythsof Security will shake you out of your complacency. Longtime securityprofessional John Viega, formerly Chief Security Architect at McAfee,reports on the sorry state of the industry, and offers concretesuggestions for professionals and individuals confronting the issue.Why is security so bad? With many more people online than just a fewyears ago, there are more attackers — and they’re truly motivated.Attacks are sophisticated, subtle, and harder to detect than ever. But,as Viega notes, few people take the time to understand the situationand protect themselves accordingly. This book tells you:Why it’s easierfor bad guys to “own” your computer than you think Why anti-virussoftware doesn’t work well — and one simple way to fix it Whether AppleOS X is more secure than Windows What Windows needs to do better How tomake strong authentication pervasive Why patch management is so badWhether there’s anything you can do about identity theft Five easysteps for fixing application security, and moreProvocative, insightful, and always controversial, The Myths ofSecurity not only addresses IT professionals who deal with securityissues, but also speaks to Mac and PC users who spend time online.
About the Author
John Viega is CTO of the SaaS Business Unit at McAfee, his second stintat McAfee. Previously, he was their Chief Security Architect, afterwhich he founded and served as CEO of Stonewall Software, which focusedon making anti-virus technology faster, better and cheaper. John wasalso the founder of Secure Software (now part of Fortify).
John is author of many security books, including Building SecureSoftware (Addison-Wesley), Network Security with OpenSSL (O’Reilly),and the forthcoming Myths of Security (O’Reilly). He is responsible fornumerous software security tools and is the original author of Mailman,the GNU mailing list manager. He has done extensive standards work inthe IEEE and IETF and co-invented GCM, a cryptographic algorithm thatNIST has standardized. John is also an active advisor to severalsecurity companies, including Fortify and Bit9. He holds a MS and BAfrom the University of Virginia.

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?注册

×
发表于 2011-2-11 15:42:21 | 显示全部楼层
呵呵~~看看不想让我知道什么
回复

使用道具 举报

发表于 2011-2-16 10:02:09 | 显示全部楼层
河南火电一建和河南二建火电哪个好啊,知道的请回答一下,据说是河南二建火电好,不知道是不是真的,请知道的朋友告诉我一下,谢谢啦啊。
回复

使用道具 举报

发表于 2011-2-17 07:11:38 | 显示全部楼层
粘钢加固施工工艺一.粘钢施加固工工艺:  
流程:粘贴面处理 → 加压固定及卸荷系统准备(根据实际情况和设计要求,卸荷步骤有时省去) → 胶粘剂配制 → 涂胶和粘贴 → 固化、卸加压固定系统 → 检验

1.粘贴面处理
1.混凝土面应凿除粉饰层,油垢、污物,然后用角磨机打磨除去1-2mm厚表层,较大凹陷处用找平胶修补平整,打磨完毕用压缩空气吹净浮尘,最后用棉布沾丙酮拭净表面,待粘贴面完全干燥后备用。
2.钢板粘贴面应用角磨机进行粗糙、除锈处理,直至打磨出现光泽,使用前若洁净仅用干布擦拭即可。否则可用棉布沾丙酮拭净表面,待完全干燥后备用。
3.该工序所用主要物资:护目镜、防尘口罩、冲击电锤及扁铲、手锤、角磨机、金刚石磨片、砂轮片、空压机、棉布、清洗容剂。

2.
加压固定及卸荷系统准备
  
1.加固构件所承受的活荷载如人员、办公机具宜暂时移去,并尽量减小施工临时荷载。
  
2.加压固定宜采用千斤顶、垫板、顶杆所组成的系统,该系统不仅能产生较大压力,而且加压固定的同时卸去了部分加固构件承担的荷载,能更好的使后粘钢板与原构件协同受力,加固效果最好,施工效率较高。
  
3.加压固定也可采用膨胀螺栓、角钢、垫板所组成的系统,该系统需要在加固构件上合适位置钻孔固定膨胀螺栓,仅能产生较小压力,不能产生卸荷效果,适合侧面钢板的粘贴。

3.粘钢胶配制
1.建筑结构胶为A、B两组份,取洁净容器(塑料或金属盆,不得有油污、水、杂质)和称重衡器按说明书配合比混合,并用搅拌器搅拌约5-10分钟至色泽均匀为止。搅拌时最好沿同一方向搅拌,尽量避免混入空气形成气泡,配置场所宜通风良好。
2.该工序所用主要物资:搅拌器、容器、衡器、腻刀、手套。

4.涂胶和粘贴

1.胶粘剂配制好后,用腻刀涂抹在已处理好钢板面上(或混凝土表面),胶断面宜成三角形,中间厚3毫米左右,边缘厚1毫米左右,然后将钢板粘贴在混凝土表面,用准备好的固定加压系统固定,适当加压,以胶液刚从钢板边缝挤出为度。
2.该工序所用主要物资:加压固定及卸荷系统,腻刀、手套。

5.固化、卸加压固定系统

1.该工序所用主要物资:扳手、手套、时钟、温度计。

6.检验

1.JGL型结构胶操作性能极好,正常操作可达到100%的饱满度。检验时可用小锤轻击粘贴钢板,从音响判断粘贴效果,也可采用超生仪检测。若锚固区有效粘结面积少于90%,非锚固区有效粘结面积少于70%,用钻孔注胶粘贴钻孔时钻两个孔一个作为排气孔一个作为注胶孔。
2.对重要构件也可采用载荷检验,一般采用分级加载至正常荷载的标准值,检测结果较直观、可靠,但费用较高,耗时也较长。需要千斤顶或配重(常用沙袋、砖块)、百分表
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 注册

本版积分规则

Archiver|手机版|小黑屋|软晨网(RuanChen.com)

GMT+8, 2024-11-13 09:10

Powered by Discuz! X3.5

Copyright © 2001-2023 Tencent Cloud.

快速回复 返回顶部 返回列表